by Networking Technologies | Dec 27, 2018 | Blog
At Networking Technologies, we see the opportunity to not only address our client’s needs but also serve as a technology resource for their organization. This model of addressing issues while providing insights was a perfect fit for Chris Heck, who joined the...
by Networking Technologies | Dec 27, 2018 | Blog
used with permission from HP Tech@Work Wild things are coming your way There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond...
by Networking Technologies | Dec 27, 2018 | Blog
used with permission from FTC.gov by Andrew Smith, Director, FTC Bureau of Consumer Protection An employee catches up on some work while visiting the local coffee shop. She grabs her Double Mocha to go, but accidentally leaves behind a flash drive with hundreds of...
by Networking Technologies | Dec 27, 2018 | Blog
used with permission from Norton by Symantec Believe it or not, accessing the deep web is easier than you think. In fact, you probably already have. The media hasn’t done a great job of differentiating what’s considered the deep web and what is the dark web — two...
by Networking Technologies | Dec 27, 2018 | Blog
used with permission from HP Tech@Work Test your knowledge here You already know what phishing and spyware are, but how about spearfishing? Shodan? Zombies? Here’s a glossary of some hacker lingo that you and your IT team should be aware of. Brute Force Attack When a...
Recent Comments