Cyber Security Tips

There has been a tremendous uptick in cyber attacks this year. We are getting at least a call per week, sometimes a couple a week, on significantly compromised businesses calling for help. The following are some common factors that we see in these cases and some tips to help improve you cyber security. Common Factors…

Continue reading

CornCon 2018

  At this year’s CornCon cybersecurity conference (https://corncon.net/) we learned about several USB devices an intruder could use to break into or even destroy a computer. The USB Killer (https://usbkill.com/products/usb-killer-v3) is a device that draws power from a USB port to charge up capacitors and then dump hundreds of volts back into the machine over…

Continue reading

Integrated Marketing Course: Key Website Points

Having recently returned from an Integrated Marketing Course offered by the American Marketing Association, has motivated me to reiterate the following key website points:   What Should a Website Do? Validate: It should be clear what your business is selling within 3 seconds of a user landing on your website. Educate: Provide something of value…

Continue reading

Meltdown and Spectre Vulnerabilities

April 13, 2018     Twin State Technical Services      ref: Meltdown and Spectre Vulnerabilities It seems fitting on Friday the 13th to talk about some of the scarier results in technology vulnerabilities. The design flaws in chipsets will take 3 – 5 years of architecture redevelopment to completely eliminate – so as a consumer, you don’t need…

Continue reading

The European Union is Moving at a Faster Pace in Defining Individual Privacy Rights

Companies like Microsoft now issue versions of software to meet compliance requirements for national and global governing bodies – for example, Microsoft version N. The European community has a strong commitment to informing citizens of how to know and exercise their rights of protection to their own personal information. This is also causing our software…

Continue reading