Java Critical Update End User Instructions

A significant security vulnerability with Java (software that is installed on most computers) was recently discovered. We are advising all our customers to update their Java to the most recent update, which has fixed the security hole. How to update Java on your computer:  https://www.corp-infotech.com/resources/java-update-end-user-instructions/ Please follow the instructions immediately to ensure your computer isafe.…

Watch out for tech support phone scams

For users of Windows systems the threat of a security breach is an ever-present one that has many security experts constantly worrying. The thing is, many systems are secure enough from outside attacks, and many scammers know this. As a result, scammers have switched tactics and have taken to masquerading as Windows technicians, hoping to…

Do you have a social media policy?

When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the majority of attacks. The major problem with this is that many don’t look beyond what they already do, and this is where security issues can harm them. One such security threat comes from social media.…

Admin access to systems could be trouble

Security of technical systems and devices used in the office environment is an issue that is important to many companies. Businesses often go to great lengths to ensure that their systems are secure from external threats, yet often fail to take into account inner threats. One of the most common inner security threats is that…

Ever wondered what mobile encryption is?

Security is a hot button issue, with nearly every company focusing on some form of security and many focusing on security related to the technology they use. This ensures company networks are secure from attack, and businesses often have drafted usage policies for employees to follow when using their computers. While this is a good…

Risks of unrestricted access to Internet

Freedom is something many take for granted, especially when it comes to the Internet. We tend to think that countries that block certain sites on the Internet, like China and their ‘great firewall’ are infringing on basic rights. While blocking sites and access might seem pernicious, there is some benefit that comes from it, especially…

Windows 8 breaks common security issues

Security issues seem to follow cycles. An exploit or security weakness is found in an operating system and all of a sudden, there’s tons of hackers taking advantage of it. Then, the OS developers and security companies develop and implement a fix and things die down for a few weeks, only to have another exploit…

Three forms of SME security threats

Standing in lines isn’t all that fun. Standing in lines waiting for a security check, like those conducted at airports is worse. There’s always this feeling of having to rush to get your laptop out of your bag and all the metal out of your pockets. Whether it’s the security of our country or our…