If you are running Windows and your operating system is up to date you are safe to use your wireless connection. See this link: http://bit.ly/2igiX4c The problem remains and will continue for any other operating system, especially phones. Using phones on a router that has not been updated will open them to a security breach. Assume […]
IT Secrets
You’re Likely At Risk from a New Wi-Fi Security Flaw
Please take a few minutes to digest this. We received notice just a few minutes ago that all wireless connections are not secure as discovered today. Here is a link that discusses the technical details but the short answer is this: Any wireless connection can be intercepted and opened completely to be read in plain text. As an example, […]
Backup vs. Business Continuity: Plan Better For Your Business
The Best Solutions for Business Continuity Business data protection is of the utmost importance for us at Higher State, so we know it is for you too. If our business is interrupted, clients lose access to data and their own businesses are placed at risk. This means that at HST we don’t simply back up […]
Highlights From a Great TECH & TACOS Meetup!
Wow! It was such a pleasure hosting TECH & TACOS today with our partner, Public Consulting Group, and our sponsor, Datto. At HST, we love connecting with new folks and catching up with our clients and partners. Attendees participated in an engaging panel discussion about preparation for data backup, recovery and business continuity. Some Important […]
8 Questions to Create a Thorough Disaster Recovery Plan
When we were kids, one of the best things that could happen was a snow day. Growing up in Texas, these were pretty rare for us. But boy, were we were always so excited when they did.! A free day to play in the snow and ice was a dream come true for an elementary […]
5 Reasons Why Disaster Recovery is Important for Your Business
It feels like we hear about data breaches and technology disasters on an almost daily basis. Target, Yahoo, Home Depot and Weebly are just some of the major players who have experienced data breaches or hacks in recent years. (If you’re curious about learning more about some of the larger data breaches that have occurred, check […]
A Tale of Two Systems: How to Prepare for Ransomware
A System on Lock Down Last November, the entire Romantik Seehotel Jaegerwirt hotel found themselves at the mercy of an anonymous group of thieves. Their electronic key card system failed. None of the 180 guests could access their rooms. Hotel staff knew that guests were likely to be upset and the 4-star hotel’s reputation was on […]
3 Simple Questions to Help Prepare for Disaster Recovery
“There is no short cut to achievement. Life requires thorough preparation.” – George Washington Carver What will your business do is faced with a disaster? A disaster could occur in the form of a large storm or flood. Or it could be something as simple as an employee losing an unsecured laptop with sensitive company […]
Mobile Device Security: 4 Dangerous New Threats
More and more people are using their mobile device for work. This means that attackers are constantly working to find new entry points and vulnerabilities. How Many New Vulnerabilities are There? Google’s Andriod operating system averaged 5,768 malware attacks DAILY over a 6 month period according to CYRENS 2013 security report, And today, 99% of new […]
4 Tips to Create a Successful BYOD Policy
With all the different mobile devices available these days, you know doubt have your favorites. I know I do. And many people (myself included) feel very strongly about their choices. But it’s not just about providing for individual preference. For many users, the more comfortable and familiar they feel with a particular device, the easier […]