ACS - Advanced Computer Solutions

ACS Blog

IT Defense in Depth Part II
July 31, 2018

In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses.


IT Defense in Depth Part I
July 24, 2018

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. 


You're Fired! Now Give Me Your Passwrd
July 19, 2018

"You're FIRED!" ( now give me your password)

Losing an employee is not usually a good experience.


How much does downtime cost your business?
July 16, 2018

Business owners must make a lot of decisions. One of the most important decision is how much do I need to invest in my business to keep it at maximum profitability. It’s very difficult to make good decisions if we don’t have good data.

60% Of Business Fail After Ransomware Infection
July 13, 2018

Ransomware (or cryptolocker) are the most dangerous viruses ever created for small businesses.

Password Basics That Are still Ignored
July 11, 2018

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords.


Is Your Website Mobile Optimized
July 6, 2018

Smaller firms often struggle just to keep up with maintaining a website.


4 reasons you will never be secure using your Mirotik, Netgear, Linksys or other consumer grade devices.
July 2, 2018

4 reasons you will never be secure using your Mirotik, Netgear, Linksys or other consumer grade devices.

The VPNFilter vulnerability has opened a lot of eyes to the world of network security. The very thought that a foreign governments military has complete access to our internet life is terrifying. The ramifications of the vulnerability are real, stolen data, stolen identities, theft, and fraud. It should really be no surprise that the VPNFilter vulnerability exists, and here are the reasons why.

Records 41 - 48 of 269 — Jump to page First 1 2 3 4 5 6 7 8 9 10 11 Last