<img src="https://secure.leadforensics.com/69529.png" style="display:none;"> Apogee IT Services
Blog  |  FAQ
  • Apogee Aim Higher Website header
    What's going on in IT.

Apogee Blog

The Future of Password Protection

Posted on June 26, 2019

Password proliferation and protection has become a problem for both individuals and businesses. Most people have so many passwords for both work and home that they frequently forget and have to reset them. To eliminate changing passwords so often, some people even scribble them on sticky notes or use the same password over and over, leaving them vulnerable to attacks.

Read More

Tagged: IT News, Security, Security breach, Phishing, Cyberthieves, Cyber Security, Safety, password

Businesses Would Be Wise To Have Disaster-Recovery Plan

Posted on June 17, 2019

Businesses can’t afford hiatuses in production – particularly small organizations. That makes it essential for owners or executives to have disaster-recovery plans, but only 25 percent of small businesses have one in place.

Read More

Tagged: technology, Banking, IT Services, Security breach, Phishing, Security Threats, Bitcoin, Formjacking, Internet, Cyberthieves, Facebook, Cyber Security, Business, Computer, disaster, disaster recovery

5G Evolution

Posted on June 13, 2019

The roll out of 5G is going to be transformational. 

Read More

Tagged: Security, Nonprofit Organizations, Legal, Interested, Internet, Etiquette, IOT, Cyber, Cyberthieves, Facebook, Twitter, LinkedIn, Social Media, Instagram, MSP, Cyber Security, Business, Computer, 5G

Businesses Shouldn’t Ignore Cyber-Liability Insurance

Posted on June 10, 2019

The odds a company will suffer a cyberattack grow daily.

Read More

Will the Internet of Things Transfigure the Cloud?

Posted on June 05, 2019
If your car needs data, it is not looking for it in the data center. If your windmill needs data, it is not coming from the cloud. In both cases, and in all cases, when we look at the Internet of Things (IoT), the data is generated locally and is to be used locally, at the device.
Read More

Virtual dynamite served through USB sticks

Posted on June 03, 2019

A receptionist is having a routine day. What could go wrong? In walks a job candidate. He says he has an interview but is caught in a dilemma. He spilled coffee on his resume and asks the receptionist to print a new one. He hands over his USB stick. The receptionist plugs it in, prints the resume, but doesn’t realize a virus was uploaded and soon will spread throughout the company’s network. 

Read More

Tagged: IOT, Cyber, Cyberthieves, Facebook, Twitter, LinkedIn, Social Media, Instagram, MSP, Cyber Security, Business, Patch, Safety, Computer, USB

TrickBot: No Treat For Victims

Posted on May 28, 2019

Financial gain drives cyberthieves to find new ways to infiltrate networks. So, it shouldn’t be surprising banks are a primary target.

Read More

Tagged: Phishing, Formjacking, IOT, Facebook, Twitter, LinkedIn, Social Media, Instagram, MSP, Cyber Security, Safety, Computer

Safety Tips For When You Use A Public Computer

Posted on May 22, 2019

Like the average urban individual, you may have a number of computing devices at home that connect to the Internet and store personal information. They are part and parcel of everyday life, enabling us to search for information on the World Wide Web, communicate with family and friends, perform financial transactions, play games online, process and store music, photos and videos, as well as, other things.

Read More

Tagged: Internet, MSP, Cyber Security, Safety, Computer

Don’t Count Out Ransomware

Posted on May 21, 2019

Is ransomware making a comeback? The attack declined by 45 percent in 2018 from the previous year, but it recently has proved to be a headache for towns and businesses.

Read More

Tagged: Ransomware, Twitter, Cyber Security

MSPs Could Provide Security Lifeline To Businesses

Posted on May 20, 2019

A growing market for strong cybersecurity has companies in a bind from which they can’t escape. Escalating threats, costs and responsibilities are making it nearly impossible for businesses to keep up with the pace, forcing them to place burdens on their understaffed IT departments.

Read More

Tagged: MSP, Cyber Security, Business

Learn More