Tech Tips


Warning: Foreign Hackers Compromised Citrix Systems

To view the original article from LAN Infotech click here. Citrix said the FBI warned them on Wednesday, March 6th that hackers compromised its IT systems and stole “business documents.” Citrix doesn’t know precisely which documents the hackers obtained nor how they got in. It’s suspected that this is a sophisticated cyber espionage campaign supported by a nation-state. The consequences of the Citrix security incident could affect a broader range of targets, as the company holds sensitive data for many companies, including critical infrastructures for governments and enterprises. For more information click here. Feel... Read More

How To Create Information Gathering Forms With Microsoft Office 365

To view the original article from LAN Infotech click here. It may surprise you, but Microsoft Office 365 has a fantastic solution for creating simple quizzes, polls and surveys — and you already have access to this functionality! Microsoft Forms is relatively new, as it was only launched in June 2016, but this lightweight web app is an excellent way to gather feedback or plan activities. You can even use the information offline, which makes... Read More

How Composing Email On Multiple Devices Keeps Business Moving

To view the original article from LAN Infotech click here. Email is one of the primary forms of communication for today’s active businessperson, but there are certainly some challenges when you’re on the go. It’s not unusual to start an email on one device and save it as a draft to finish up later from your desktop. This productivity hack allows you to quickly jot down ideas on your mobile phone and save the email... Read More

New Threat Advisory: TrickBot (Warnings/Recommendations)

To view the original article from LAN Infotech click here. Don’t Get Tricked By TrickBot TrickBot is up to its tricks again. Once cyber experts get a handle on it, TrickBot releases new modules that advance its capabilities. Here’s what you need to know to protect your organization from TrickBot. What Is TrickBot? The Multi-State Information Sharing and Analysis Center (MS-ISAC) recently released a security primer on TrickBot. Originally developed in 2016 as a Windows-based... Read More

2018 Cyber Crime Statistics

To view the original article from LAN Infotech click here. Cybercrime continues to increase in severity as more businesses take their operations to the cloud. Javelin Strategy & Research published the 2018 Identity Fraud: Fraud Enters a New Era of Complexity report, which states in 2017 alone, there were close to 17 million victims of identity fraud. Cybercriminals are using advancements in technology to their advantage and are carrying out complex identity fraud schemes to steal as... Read More

Don’t Take A Recess From Business Continuity: Protect Your Law Firm

As attorneys, you’re committed to providing your clients with the best legal advice and service possible. In order to do so, you recognize that in the world of law, time stops for no one. Court dates are appointed, not chosen. Contracts have deadlines. Client meetings are a must. Any type of power outage, therefore, is a huge threat to law firms. As a lawyer you have a finite amount of time to build your case,... Read More

What Makes An Excellent South Florida IT Company (Research/Information)

To view the original article from LAN Infotech click here. CRN’s 2019 MSP 500 Managed Security 100 It can be difficult to determine what Managed IT Services Company you should select for your business in South Florida. But CRN and the Channel Company have done the work for you. They conducted a thorough assessment and came up with the 100 Best Managed Security Providers in North America. And, once again, LAN Infotech is on the... Read More

Simplify Your Cybersecurity Efforts

To view the original article from LAN Infotech click here. There’s one thing most professionals can agree on: cybersecurity planning and implementation is a tedious and complicated task. This is especially true for business professionals who are busy enough trying to focus on mission-critical business and fulfill organizational objectives. Trying to put together an efficient and proactive cybersecurity plan can be an overwhelming task, which leads many organizations to avoid it or sweep it under... Read More
1 2 3 7