Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials that was executed by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from...

Top 10 New Business Features in Windows 8

With Windows 8 now available, what are the best features for business use? Here are ten new or enhanced features! 1. Trusted boot/secure boot (UEFI) This implements a secure boot process and allows the machine to verify the integrity of the network environment, thus...

Virus ALERT: Data Recovery "S.M.A.R.T. Repair"

Axxys Technologies Inc. has recently seen its first instance of the Data Recovery “S.M.A.R.T. Repair” virus. This is an extremely tedious infection to remove, so we wanted to make you aware of this outbreak and inform you how to spot it. But first, and...

IT Security Policy: A Must Have

I know we all feel that we do our best when it comes to securing both the physical and tangible assets of our businesses. Most companies feel that by simply locking doors, controlling who has keys and alarm codes, changing passwords, and engaging in other basic...

Documenting Your Network – Part 3 of 5

Moving right along with our previous discussion on documenting your network, some of the other critical documents you should have and keep up to date for your network: PC Setup Guide: The PC Setup Guide is used to ensure a consistent setup and configuration of...