Security Breach Disclosures

As a consumer in the digital age, it is likely that your personal information has been compromised as part of a security breach somewhere. Some notable corporate breaches in recent years have included companies such as Home Depot, Yahoo, and Equifax, but the reality is that there are many more that you probably haven’t heard of unless your personal information ...

Facial Recognition Isn’t Foolproof: Data Security Considerations

The latest versions of facial recognition software (such as that included on the iPhone X) have certainly improved baseline device security without negatively impacting the user experience, but even these enhanced biometric authentication methods are not perfect. As such, it is important for businesses to continue to closely monitor how company data is accessed from mobile devices and not just ...

Think Twice Before Saving Passwords to Your Browser

In this digital age where seemingly everything requires a password, and password requirements are increasingly strict, it is understandable that users can feel overwhelmed when it comes to remembering all of their login credentials for various websites. But as convenient as the idea may sound, the IT experts at ATB encourage you to forego saving passwords and usernames in your ...

Your Business Has Recovered from a Cyber Attack. Now What?

If your business has been the victim of some sort of IT security breach, you’re definitely not alone. But believe it or not, what you do next might make your company stand out. It should be obvious (especially if you’ve been working with ATB for any period of time) that if you’ve experienced a cyber attack, even a seemingly minor ...

Protecting Your Computer from CPU Flaws

If you’ve been an ATB client for any period of time, you already know that we generally recommend staying current with all updates and patches to protect your computers’ vulnerabilities. However, when it comes to two current CPU flaws known as Spectre and Meltdown, you may want to seek professional IT advice before making any updates to “fix” these issues. ...

Smart Security for Voice Assistants

Voice-activated assistants such as Amazon Echo and Google Home are increasingly popular – and can be a fun and useful tool at home or in the office – but like most internet-connected technologies, they aren’t without security risks. One of the primary security concerns surrounding smart devices is their ability to “listen.” Did you know that once your voice assistant ...

The VoIP Crossroads: Pros and Cons of Open Source vs. Proprietary

Voice over Internet Protocol, better known as VoIP, is quickly becoming the standard for voice (and multi-media) communication across businesses large and small. There are many benefits associated with VoIP, including cost savings, real-time conferencing capabilities, the ability to share media – including live stream video as part of a singular transmission – and enhanced teleworking functionality. But assuming you’ve ...

Cybersecurity: The Future of Ransomware in 2018 and Beyond

If 2017 proved anything it’s that cybersecurity is an ongoing concern and total prevention may be impossible, but being prepared can help ensure the consequences of an attack are limited. From the Equifax breach, to state-sponsored attacks by foreign adversaries, to Russian manipulation of social media during the election and beyond, to the WannaCry ransomware attacks, and to countless other ...

Guest WiFi Access Doesn’t Need to Compromise Network Security

In this day and age, visitors to your place of business (and even your home) probably expect to have access to WiFi. But if you’re still just sharing your network login credentials with anyone who walks through the door, it is probably time to rethink your WiFi protocols and separate guest access from the primary network. There are several advantages ...

Understanding Virtualization

Virtualization isn’t just for large corporations and enterprises anymore. Companies of all sizes can benefit from virtualization, whether you’re looking to reduce IT costs, enhance security, increase operational efficiencies, or do some combination thereof. But before we get into the details of the various types of virtualization, it is important to have a general understanding of what virtualization is. At ...