Profile cover photo
Profile photo
RESULTS Technology
6 followers -
IT Services, IT Support and Computer Services for St.Louis, MO
IT Services, IT Support and Computer Services for St.Louis, MO

6 followers
About
Posts

Post has attachment
NSA to secure phones with virtualization - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization. US government approved The NSA maintai...
Add a comment...

Post has attachment
Alexa devices to become extension phones - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting Alexa, Amazon’s counterpart to Microsoft’s Cortana and Apple’s Siri, is an intelligent personal assistant that can perform various tasks for its ‘master.’ Based on a recently released patent, the eCommerce company is set to reveal a wireless phone system powered by this artificial intelligence (AI) technology. Here’s what you need to know. How it works Amazon’s 3D-ena...
Add a comment...

Post has attachment
How did WannaCry spread so far? - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different. Ransomware review Ransomware is a specific type of malware program that either ...
Add a comment...

Post has attachment
Protect your data from WannaCry - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the ransom. What’s more alarming, however, is that the global success of this malware will likely spawn even more potent variants. To protect your business from r...
Add a comment...

Post has attachment
How good is your web browser’s security? - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start. Microsoft Internet Explorer (IE)/Edge...
Add a comment...

Post has attachment
Containers in Windows Server 2016 - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting If you’re a business owner interested in utilizing virtualization technology, you have a lot of options for how to go about that. However, there is one virtualization vendor you’re probably already comfortable with: Microsoft. Read on for more information on the new and exciting features packaged with the Windows operating system. A brief history of Windows Server The Window...
Add a comment...

Post has attachment
Warning: Do not install “Google Defender” - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens. If you use Gmail, you need to know how to avoid this. Broadly defined, “phishing” is any form of fraud in...
Add a comment...

Post has attachment
Do ugly websites really cost you money? - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting eCommerce websites take longer to create than regular websites. That’s because finding the right plugins and fine-tuning other components such as the blog page takes a lot of time. Only when you’re certain that everything’s in place should you go live with your website. Until then, take the time to double-check everything; the last thing you want is a messy website rid...
Add a comment...

Post has attachment
How virtualization roots out malware - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting Every IT solution in your organization will encounter malware at some point or another. Some solutions are malware liabilities, others are assets. When it comes to virtualization, there are several cyber security benefits for improving your malware readiness. One of our favorites is called sandboxing, and it’s a good one for you to know about. What is sandboxing? Sandboxi...
Add a comment...

Post has attachment
Avoid VoIP eavesdropping with these tricks - RESULTS Technology RESULTS Technology - IT Services, IT Support and IT Consulting As of late, eavesdropping has been making the headlines due to the surge in frequency. Making it an ideal time to review how well your Voice-over-Internet-Protocol (VoIP) phone systems are protected. However, this isn’t entirely new to VoIP, Vomit and Peskyspy are just some of the prolific VoIP eavesdropping attacks that have gained infamy since 2007. Spare your bus...
Add a comment...
Wait while more posts are being loaded