I.T. Solutions of South Florida Blog

I.T. Solutions of South Florida has been serving the Lake Worth area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Did Your Business Suffer Downtime During Hurricane Irma?

Did Your Business Suffer Downtime During Hurricane Irma?

Wow! Hurricane Irma certainly packed a punch!

Most of Florida was clobbered by this enormous storm, leaving 15 million Floridians without power.

While some businesses were without power, losing revenue by the minute, we are proud to say that 100% of our clients that choose to host their business in our hardened datacenter had ZERO DOWNTIME. Their employees never skipped a beat, working remotely before, during and after the storm. Now that’s impressive!

Continue reading

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business IT Services Business Computing Internet Hosted Solutions IT Support Productivity Email Malware Managed Service Provider Backup Computer Microsoft Hardware Small Business Windows 10 Internet of Things Network Data Managed IT Services Workplace Tips Mobile Devices Business Continuity Smartphone Microsoft Office Miscellaneous Disaster Recovery Google Mobile Device Management Office Communication Ransomware Virtualization Spam Social Media Gmail BYOD Innovation VoIP Outsourced IT WiFi Office Tips Windows Smartphones User Tips App Hacking Phishing Passwords Recovery Wireless Technology Upgrade Saving Money Efficiency Big Data Server Data Management Hard Drives Holiday Bring Your Own Device Vendor Management Budget Employer-Employee Relationship Customer Service Facebook Password Software Browser Presentation Apple IT solutions Network Security Android Going Green IT service Customer Relationship Management The Internet of Things Outlook Humor Social Administration Analyitcs Retail Data storage Two-factor Authentication User Virtual Desktop Mobile Computing Data Backup Hosted Solution Best Practice Avoiding Downtime Hacker Business Growth Tech Support Settings Competition Encryption Robot Business Owner Operating System Apps Chrome Lithium-ion battery End of Support LiFi Mobile Device Marketing Information Technology Running Cable Safety Artificial Intelligence Computers Managed IT Content Filtering Analytics Cybercrime Florida Website Wireless Risk Management Firewall Telephony Proactive Buisness Google Drive Office 365 Solid State Drive VPN Education Writing Training Printing iPhone Refrigeration Fishing Trending Google Docs IBM Augmented Reality Gadgets Social Engineering File Sharing Computing Co-managed IT Tournament CIO Fun Alt Codes Users Files Google Wallet Cost Management Entrepreneur User Error Storage Search Typing Compliance PowerPoint Drink Drones Specifications Business Management Assessment Save Money Dark Data communications Remote Monitoring Cryptocurrency Heating/Cooling Regulations Geek Money Undo Consultation IP Address Unified Communications Hiring/Firing Bitcoin Flexibility Bytes Laptop Mouse eWaste MSP Downtime Mobile Office Cortana Windows 8 Computer Care Halloween Save Time Environment MSPmentor YouTube Network Congestion Hacks Scary Stories Backups Deep Learning Troubleshooting Word Data Recovery Display Help Desk Knowledge Remote Computing Business Intelligence Consumers Engineer Sports Legal Domains Wi-Fi Lenovo Monitors SaaS Experience Current Events Application Phone System Technical Public Speaking 5G Identities Superfish Bandwidth Automation

Blog Archive

Upcoming Events

No events