You may have heard the buzz about Windows 7 reaching its End of Life date, and the risks associated with the continued use of an obsolete operating system (OS). Essentially, if you or your business is relying on an OS that has reached its End of Life (EoL) date, then you are relying on software that is no longer receiving support. No more security updates or exploit patches are released for that software. That means that every new exploit or hack found for that OS is a permanent risk to you and your business. Not exactly something we want to deal with, right?

Read More

Microsoft has announced that January 14th, 2020, is the official End of Life date for Windows 7. On that day, the company will stop supporting Windows 7 on laptops and desktops, and will no longer patch it with security updates.

If you are among the 400 million users still using Windows 7, this news should concern you. The technology will continue to function after the expiration date, but using it will put you at great risk for cybercrime if you continue to use expired Microsoft products.

IT professionals have been talking about the importance of upgrading to Windows 10 to avoid this malicious activity, but that can be a confusing process.

Read More

People want to experience fast and reliable wireless Internet at home and as more and more devices use the Internet we want to improve our coverage to help keep everything connected. In March, we published “Install your WiFi In the Attic” as a way to help home owner’s get started with a mesh WiFi environment to help create an ‘umbrella of signal’ in the home.  Our goal today in our article “Install your WiFi Router in the Attic Part II” is to communicate how to add additional WiFi routers to extend the coverage even further distances such as the patio or garage.

Read More

Today marks the fiftieth edition of our Predictably Better newsletter and we have thoroughly enjoyed sharing our technology and business experiences with you on everything from our business plan to complex topics such as the cloud and disaster recovery planning and we are looking forward to sharing our screenshots of the fourteen years of the Digux website.

Read More

Did you know that cyber-crime cost businesses over $3 trillion in 2016? This may seem like a huge sum, however, the bad news is that experts expect this to double to $6 trillion in the next three years.

If you are a small-to-medium-size business you may be wondering what you can do to defend yourself and your business against such threats.

The good news is that there are experts here to help. Check out our list of 5 basic security improvements that all companies should make. 

Read More

Technology is inescapable. It’s integrated throughout every facet of our life. From how we work and live our lives, technology will grow for as long as humans continue to advance in their capabilities.

But for many small businesses just starting up, IT operations are probably low on the list of priorities.

As a small business, you might have outsourced IT support. Maybe hired a small IT company, or even a single “IT Guy” to manage your security and maintain your networks - but didn’t worry about investing in an end-to-end cybersecurity solution as much as finding the perfect office space - or the right employees.

Read More

TruMethods hosted their 8th annual member only Schnizzfest this past week in Philadelphia designed specifically for managed service providers (MSPs) from around the world to get together and focus on the process of improving their business.

Read More

Most of us have WiFi Internet at home and use it for either work or personal related tasks. Sometimes depending on where we are in the home the signal can be low and it slows down our connection which can be frustrating. Over the years we have received several requests from people asking us what they can do to improve WiFi connectivity at home so we wanted to provide some DIY instructions on how to install your WiFi router in the attic.

Read More

The Server Message Block, or SMB, has been the cornerstone of workplace operations for years now. With radical shifts in technology and the way we do business, things are going through changes and fast.

The SMB needs of today need to incorporate this technology. But throwing in new technology without a plan for connection and security is suicide. 

Understanding what pieces need protection, which ones need focus, and how to tie it all together will be what makes or breaks a company. 

Read More

Did you know that 60% of small businesses have had to deal with a ransomware attack, in which entire networks are encrypted and these businesses are having to pay big money to try and get their data back.

Massive amounts of money are being spent on cybercrime activity like ransomware attacks every year.

The thing is, it's relatively easy to protect your business from a Ransomware attack with the right plan in place - but it’s important that small businesses don't think that they're too small to be a victim.

Read More

The Internet is a global system full of unethical hackers who operate under very loose moral codes, spend most of their time outsmarting their victims, and blackmailing businesses especially those who have invested very little into a comprehensive security plan. Unfortunately, for usthese hackers have no regard for anyone else or our feelings and spend countless hours trying to steal our hard-earned money or damage the technology we rely on to operate our business.

Read More

Our friends over at HP published an informative article on the cloud that is worth reading. 

If your business is interested in making a cloud-related technology change this article can certainly help provide clarity into the different cloud options with details on how and why they work. Cost, compliance, risk, and functionality are typically the most common questions most business owners have when evaluating the cloud. If you are interested in starting a conversation please send us a message from our contact page.

Read More

© 2019 Attentus.Tech. All Rights Reserved.