In 2018, we wrote a blog post that detailed when law firms should consider switching to managed services. The article discussed the various technology issues that signal the need for a change in how their IT is managed. One area we talked about was falling behind the IT security curve, or in other words, not proactively keeping systems protected from the latest cyber threats. In 2019, that issue has taken on even more importance as there are mounting concerns surrounding access control, data integrity, and other IT security threats – specifically ransomware.
Spotting a bad email is a daunting task, especially for an employee with more pressing matters. Questionable emails are cluttered with wording in small type and display fancy designs. They bait you into believing you’re in trouble or hit the jackpot. For example:
Your mortgage payment is past due. Please click on the link below to make a payment and avoid late fees.
Data breaches have become so common, they don’t cause much panic among users. A new one seems to arrive before the previous one has been rectified. “Collection #1” is the most recent breach. It’s a big one, more than twice the size of the Marriot attack in December.
Written by Twilla King, Senior at Robert Morris University
As we near the final days of my internship, I am excited to reflect and update you all on my experiences over the past several weeks. I cannot believe my twelve-week internship at Apogee is coming to an end. It seems like just yesterday I pulled into the parking lot nervous about what my experience would be like. If you would have asked me eleven weeks ago what I expected to take away from working at Apogee, I would have told you that I simply hoped to learn new things and get pushed out of my comfort zone. I’m proud to say that my experience at Apogee has completely exceeded my expectations. Since my last blog, I've become even more emerged in the ins and outs of a business on the rise.
"I am proud to say that my experience at Apogee has completely exceeded my expectations."
They say all good things must come to an end, and with the reign of Windows 7, this is no exception. Windows 7 is almost nine years old, at least two and a half versions behind Windows 10 and approaching an end of Microsoft support. After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7.
On November 30, 2018, Marriott announced a massive data breach of their Starwood guest reservation database, exposing the personal information of 500 million guest who stayed at hotel chains including W, St. Regis, Sheraton, and Westin. If you have stayed at a Marriott owned property any time prior to September 10th of this year, you may be affected.
A manufacturing business is loyal to the production of tangible objects that are high in quality and competitive in cost. A common misconception is that manufacturing companies do not rely profoundly on technology. However, businesses in the manufacturing industry are actually heavy duty users of technology. Engineers demand on computers and software for design. A large amount of information is generated and used during the design, manufacture, and use of a product to satisfy any customer needs. Since a large amount of information is generated, the use of information technology can enable substantial improvements of operation, organization, and effectiveness of a manufacturing process and activities.
Every aspect of a company is more adequately connected and integrated using information technology, since IT strives to make things simpler in the manufacturing sector.
Don’t take the bait.
It’s a simple request. But how certain are you that your employees won’t bite? Very? Somewhat? Not sure? Or not at all? Business leaders should embrace these questions to be certain employees won’t sink the company.
There was a time when the phrase “we’ve gone fishing” had a simple meaning. It was about spending a day on the lake or river and hoping to bring home dinner. But the relaxing hobby takes on a new spelling -- “phishing” -- and different definition in today’s world of technology.
Phishing for workers -- casting emails instead of fishing line to lure unprepared victims -- has become a primary sport for hackers to steal information from company employees. The annual Bassmaster champion pales in comparison to an information-plundering winner. The competition is so intense, a new phishing champion’s reign might last no longer than a few seconds.
Pittsburgh Technical College has one it partner for its new women in steam program and.. it's us!
Apogee IT Services is excited to be the IT sponsor of the new Women in STEAM outreach program at Pittsburgh Technical College (PTC). PTC’s Women in STEAM is a student-led organization dedicated to empowering and engaging young women into higher level learning to prepare them for their future careers in science, technology, engineering, art, and math fields. Women in STEAM is designed to guide young women in recognizing the important roles they will have as future leaders in Technology. The program also works to create a sense of community through peer to peer activities that promote innovation and collaboration between academic programs by sharing their experiences and providing support to one another.