If haven’t heard the news, Apple’s new Mac OS High Sierra has a huge security flaw that allows full admin access without a password. Basically if you leave your Mac sitting around, someone can simply go into the user security settings and login easily. We’ve got 3 quick and easy steps for you to prevent and fix this issue.
Viewing entries tagged
While the summer travel season is long gone, Thanksgiving and the Winter Holidays are fast approaching so there’s no better time to update your travel checklist with these 4 to do’s before and during your trip. Find out how to protect your data on the road.
Booked flights on kayak….check. Lovely apartment on airbnb...check. Bags packed and ready to go...check. That’s it, right? Well, not quite...we at Jones IT have 4 must have items for your preflight checklist before that business trip or journey of a lifetime.
Keyloggers...trojans...session hijackers...Do these worry you? We cover the aforementioned phishing scams along with a couple others you should learn about with tips to avoid falling victim to these attacks. Find out what you can do to protect yourself by reading part 2 of our phishing blog series.
Ever get an email that's too good to be true? An urgent request from your bank for private information? Message from a relative asking to wire some money? Click on link in your inbox you shouldn't have? These everyday examples of phishing & IT security breaches put your company data at risk along with the possibility of identity theft. Here are 5 things you can do prevent phishing from happening to you!
The internet is a vast sea of information, tools, entertainment, news, and more. It is easy to get lost if you do not know exactly what you are looking for. Here are seven handy websites that I have found useful. Hope you will too!
“I’ve been doing this for a long time, but this is the first time I’m seeing mainstream technology have real applications for people with disabilities,” Karen of SFCD explains. She proceeds to show me how she is able to control just about everything in the room, from the fan to the lights, with her voice or the iPad she holds in her hand. The iPad is running several communication applications that allow her to type out simple sentences telling the room what to do. Karen illustrates this by tapping a few buttons on her iPad, causing it to say, “Amazon, turn on the fan.” Sure enough, the fan across the room turns on with a pleasing whir. This is what assistive technology is all about, and it’s pretty incredible.
We are, essentially, technology guinea pigs. We try out apps, network equipment, computers, and more to find the best tools for the job. Here are some of our favorite lesser known apps.
If you use a computer, you need to care about malicious software. Malicious software is any piece of code designed to harm a computer system and it has been around for a very long time. Viruses have only become more sophisticated and costly, but there are many options for protecting yourself and your business from attack.
Computers are a lot like cars. They’re expensive, incredibly useful, and will fall apart without regular maintenance. You wouldn’t go years without checking or changing your oil, or let the weird noise in your car fester without getting it looked at by a professional. But many people don’t look at computers the same way. They will go months without updating, shooing away notifications, and thinking, “I just spent $900 on this, it should just WORK!” Your car performs a lot better with the recommended maintenance and services, and so will your computer. More importantly, your computer will be much less susceptible to attack.
Your device is the portal through which you communicate with friends, family, and the people you work with. Replacing a device is costly, but you can’t put a price on the data you hold in it. Consider how much worse it would be if someone got a hold of the data you can access with that device: bank accounts, passwords, emails, photos, correspondence with friends, and more. This is precisely why security is important.