Michael Goldstein Talks Crucial IT Security Tips on CNR Radio Show
[youtube https://www.youtube.com/watch?v=5LkjEUnncgk] LAN Infotech President and CEO Michael Goldstein recently sat down with host Philip Bell to talk security with the CNR radio show in Fort...
In-House Vs. Outsourced IT Services: Making The Crucial Right Choice for Your Business
Regardless of the size of your business or the industry you’re in, IT support costs money. What’s important is how your business utilizes your IT – with the right understanding and a strategic...
CryptoJoker is No Laughing Matter
New Ransomware Demands Ransom in Bitcoins to Get Your Files Back With a new year comes new challenges, new hopes, new resolutions, and of course, new ransomware. The newest discovered ransomware...
What Law Firms Need from Technology in 2016
With the way technology is constantly changing and evolving, many law firms expect that they will soon need to purchase new technology, however, spending efforts may not be all that is required in...
The Security Challenges of Corporate Communication Via Email
Email, without a doubt, is still the preferred method of communication for businesses, but it is not without its considerable cybersecurity risks. Email concerns have become one of the most pressing...
New Disaster Relief Bill to Assist Small Businesses in the Wake of a Disaster
It’s difficult to forget the havoc that Hurricane Katrina wreaked on the residents of New Orleans in August of 2005. With more than 1200 people killed, over 108 billion dollar’s worth of property...
Pros and Cons of Having a Server Hosted Off-Site
Every business owner is forced to make the decision regarding hosting their servers on or off site. The decision is an important one, and careful consideration of your unique needs should be taken...
Cybercriminals are Using a Dangerous New Form of Ransomware to Hijack Your Files
Cybercriminals have always been smart, fast, and incredibly adaptive. Just as you’re constantly looking for new ways to improve workflow and productivity with technology while keeping data safe,...
Business Continuity Planning: Is It Time for You to Plan for the Inevitable?
Most business owners are aware that downtime is inevitable as interruptions can take on many forms – from virus infections to power outages to floods to human errors. Would you be prepared to lose...
Sneaky Ways Your Credit Card Is Skimmed
Spot the Sneaky Tools Used to Skim Your Account Number/Pins at ATMs Row of Credit Cards Credit card skimmers are one of the most successful tools nowadays in cybercrime, with thieves attaching them...
1 In 3 Chance Your Healthcare Information Breached
Did You Know 34% of Healthcare Records in the US Have Been Breached? Data breaches are a costly threat to health care, and unfortunately, nobody is free from the worry. With 10 out of 20...
Windows 10 Update Withdrawn for Overwriting Privacy Settings
Microsoft withdrew downloads for Windows 10 version 1511, which became available in the middle of November 2015 after being announced as a major upgrade for the operating system. The update was to...