fbpx

Chris Heck – System and Cloud Specialist

At Networking Technologies, we see the opportunity to not only address our client’s needs but also serve as a technology resource for their organization. This model of addressing issues while providing insights was a perfect fit for Chris Heck, who joined the...

5 predictions for your future

used with permission from HP Tech@Work Wild things are coming your way There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond...

How to safely access the deep and dark webs

used with permission from Norton by Symantec Believe it or not, accessing the deep web is easier than you think. In fact, you probably already have. The media hasn’t done a great job of differentiating what’s considered the deep web and what is the dark web — two...

Level up your hacker lingo

used with permission from HP Tech@Work Test your knowledge here You already know what phishing and spyware are, but how about spearfishing? Shodan? Zombies? Here’s a glossary of some hacker lingo that you and your IT team should be aware of. Brute Force Attack When a...