Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Warning: Attempt to modify property 'Array' of non-object in /home/absolute/public_html/libraries/joomla/registry/registry.php on line 342

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; plgSystemJobboard has a deprecated constructor in /home/absolute/public_html/plugins/system/jobboard/jobboard.php on line 41

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; plgSystemJobboard_Schedule has a deprecated constructor in /home/absolute/public_html/plugins/system/jobboard_schedule/jobboard_schedule.php on line 23

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; plgSystemMetagenerator has a deprecated constructor in /home/absolute/public_html/plugins/system/metagenerator/metagenerator.php on line 15

Warning: Declaration of JCacheControllerPage::store($wrkarounds = true) should be compatible with JCacheController::store($data, $id, $group = NULL) in /home/absolute/public_html/libraries/joomla/cache/controller/page.php on line 199

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; plgSystemJComments has a deprecated constructor in /home/absolute/public_html/plugins/system/jcomments/jcomments.php on line 19

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461

Warning: count(): Parameter must be an array or an object that implements Countable in /home/absolute/public_html/libraries/joomla/application/application.php on line 481

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; JoomlaTuneDBTable has a deprecated constructor in /home/absolute/public_html/components/com_jcomments/libraries/joomlatune/joomla/jtable_15.php on line 4

Warning: count(): Parameter must be an array or an object that implements Countable in /home/absolute/public_html/plugins/system/gantry/gantry.php on line 406

Warning: count(): Parameter must be an array or an object that implements Countable in /home/absolute/public_html/libraries/joomla/application/application.php on line 481

Warning: count(): Parameter must be an array or an object that implements Countable in /home/absolute/public_html/libraries/joomla/application/application.php on line 481

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; Color has a deprecated constructor in /home/absolute/public_html/templates/rt_metropolis/features/color.php on line 11

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/gantry.class.php on line 1043

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 460

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/rokcommon/RokCommon/Service/ContainerImpl.php on line 461
Security - Absolute IT Networks Blog | Westminster, Maryland | Absolute IT Networks
Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/gantry.class.php on line 1043

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/gantry.class.php on line 1043

Warning: count(): Parameter must be an array or an object that implements Countable in /home/absolute/public_html/libraries/joomla/application/application.php on line 481

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/renderers/gantrymodulesrenderer.class.php on line 85

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/renderers/gantrymodulesrenderer.class.php on line 85
(410) 846-4700

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/renderers/gantrymodulesrenderer.class.php on line 85

Absolute IT Networks Blog

Absolute IT Networks has been serving the Westminster area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes

How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes

Warning: Declaration of JParameter::loadSetupFile($path) should be compatible with JRegistry::loadSetupFile() in /home/absolute/public_html/libraries/joomla/html/parameter.php on line 512

Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; plgContentJComments has a deprecated constructor in /home/absolute/public_html/plugins/content/jcomments/jcomments.php on line 25

If you’re like every other small business out there, you know that the more employees you hire, the more technology that you have to procure. However, when you have more end-users, you provide more avenues for threats to slip into your network infrastructure unnoticed. When all it takes is one simple mistake from a single end-user, how can you minimize the chances of falling victim to an untimely hacking attack?

Continue reading
575 Hits
0 Comments

Tip of the Week: The Top 5 Mistakes that Ruin Mobile Devices

Tip of the Week: The Top 5 Mistakes that Ruin Mobile Devices

To get the most life out of your smartphone, you’re going to want to properly take care of it. Of course, this is easier said than done for a small device that’s prone to being dropped and subject to the many dangers of being transported. Here are five smartphone practices to avoid if you want your device to last.

Continue reading
586 Hits
0 Comments

It Only Takes 8 Seconds for a Hacker to Open Your Garage Door

It Only Takes 8 Seconds for a Hacker to Open Your Garage Door


b2ap3_thumbnail_garage_hackers_400.jpgHackers have proven to be a crafty and suspicious lot, and can take advantage of even the most benign technology to infiltrate networks. However, we don’t often associate them with objects in the physical world. Now, even something as simple as a decade-old communications device can be used to open the right garage doors.

Continue reading
493 Hits
0 Comments

Do You Use Steam for PC Gaming? Watch Out for this New Malware!

Do You Use Steam for PC Gaming? Watch Out for this New Malware!

b2ap3_thumbnail_steam_malware_problems_400.jpgMalware has traditionally targeted industries that are exceptionally profitable. For example, hackers like to target retailers for their wealth of financial credentials. One of the most profitable industries, entertainment, is also subject to similar torment, including Steam, the PC gamer’s most valuable tool for gaming binges.

Continue reading
499 Hits
0 Comments

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

b2ap3_thumbnail_lg_rolling_bot_400.jpgConsumer technology continues to grow more versatile and connected, allowing users to perform functions previously unheard of. One such piece of consumer tech is the latest in rolling security bots, the LG Rolling Bot. Basically, what you see is what you get; it’s a rolling security robot that can be controlled remotely through a smartphone.

Continue reading
771 Hits
0 Comments

The Super-Creepy Reason Why You’ll Want to Secure Your Surveillance Camera

The Super-Creepy Reason Why You’ll Want to Secure Your Surveillance Camera

b2ap3_thumbnail_dvr_iot_issues_400.jpgWith approximately 5.5 million new devices being connected to the Internet everyday, the Internet of Things presents the biggest security challenge to date for IT professionals. Essentially, an IoT device that’s not secured can easily fall prey to hackers, and with so many different devices being connected, it’s easy to overlook a device or two, like your security cameras.

Continue reading
671 Hits
0 Comments

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Continue reading
426 Hits
0 Comments

736 Million Records Were Exposed to Data Theft in 2015

736 Million Records Were Exposed to Data Theft in 2015

b2ap3_thumbnail_stolen_data_problems_400.jpg2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to hackers were passwords and email addresses.

Continue reading
733 Hits
0 Comments

Why You Need to Think Through Which Employees Have Access to What Files

Why You Need to Think Through Which Employees Have Access to What Files

b2ap3_thumbnail_windows_admin_400.jpgIt’s clear that your IT department should have administrator privileges with your business’s technology, but the average employee is another story altogether. Administrator privileges provide users with the ability to do many things, such as install programs and access admin settings. Administrator privileges are exactly what you want to keep users away from, and it turns out that the majority of flaws in the Windows operating system depend on these privileges.

Continue reading
748 Hits
0 Comments

Tip of the Week: How to Add a PIN to Your Windows 10 Login

Tip of the Week: How to Add a PIN to Your Windows 10 Login

b2ap3_thumbnail_windows_10_pin_400.jpgThe fact that so many businesses are rushing to take advantage of two-factor authentication displays how the password has lost its edge as a security credential. Passwords simply aren’t good enough anymore, and hackers are always finding ways to crack even the most complex passwords. This is why many businesses are looking to improve security through alternative means.

Continue reading
426 Hits
0 Comments

Baseball Executive Pleads Guilty to Hacking Rival

Baseball Executive Pleads Guilty to Hacking Rival

b2ap3_thumbnail_baseball_hacker_400.jpgIT can be like baseball. When a team is up to bat in a game of baseball, the team at bat is allowed to keep two coaches on the field. They are called the first base coach and the third base coach. While both coaches’ responsibilities mostly have to do with baserunning, the third base coach also takes on the responsibility of relaying “signs” from the manager in the dugout to the batter at the plate.

Continue reading
807 Hits
0 Comments

Microsoft Ends Support For Internet Explorer 8, 9, and 10, What’s This Mean For Your Business?

Microsoft Ends Support For Internet Explorer 8, 9, and 10, What’s This Mean For Your Business?

b2ap3_thumbnail_ie_8_9_10_goes_bye_bye_400.jpgBad news for users still running outdated versions of Internet Explorer - Microsoft has ended support for its legacy web browser. What this means is that Internet Explorer 8, 9, and 10, will no longer be issued critical patches and security updates, making its continued use a security risk.

Continue reading
451 Hits
0 Comments

How Shadow IT Puts Your Entire Business In Jeopardy

How Shadow IT Puts Your Entire Business In Jeopardy

b2ap3_thumbnail_shadow_it_400.jpgThe average small and medium-sized business has trouble with the implementation of comprehensive IT solutions, mainly due to these organizations having fewer resources to allocate towards these solutions. This often leads to end-users implementing their own solutions, which can be dangerous under the wrong circumstances. By allowing this “shadow IT” to run rampant in your office, you’re putting business continuity, data storage compliance, and security on the line.

Continue reading
774 Hits
0 Comments

Tip of the Week: Spot a DDoS Attack Before it Takes Down Your Network

Tip of the Week: Spot a DDoS Attack Before it Takes Down Your Network

b2ap3_thumbnail_d_d_o_s_400.jpgDirect denial of service attacks are a major problem for businesses. On one hand, they’re difficult to prevent entirely, incredibly annoying, and costly. Hackers are realizing just how annoying DDoS attacks can be, and are capitalizing on them in order to both make a quick buck, and to take jabs at organizations that aren’t necessarily doing anything wrong.

Continue reading
709 Hits
0 Comments

Hacking Attacks Can Have Deadly Consequences

Hacking Attacks Can Have Deadly Consequences

b2ap3_thumbnail_life_threatening_hack_400.jpgWe all know that hackers are never good news. All they want to do is ruin someone’s day by planting a threat in an innocent person’s PC or steal some data from a business. However, some hackers could potentially have much more dangerous (and deadly) agendas, like sabotaging hospital equipment.

Continue reading
663 Hits
0 Comments

How a Cloud Service Without Role-Based Access Controls is Asking For Trouble

How a Cloud Service Without Role-Based Access Controls is Asking For Trouble

b2ap3_thumbnail_cloud_security_400.jpgCloud computing started out as a trend, but it’s become a staple in the modern business environment. A recent poll of IT and business executives by Harvard Business Review and Verizon shows that 84 percent of respondents have increased their use of cloud services in the past year, 39 percent of which “increased significantly.” The issue that comes from such an increase is the idea of employees accessing information that they aren’t supposed to.

Continue reading
411 Hits
0 Comments

Tip of the Week: Make Your Password Rhyme Every Time

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

Continue reading
547 Hits
0 Comments

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpgWith new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

Continue reading
835 Hits
0 Comments

Tip of the Week: How to Protect Yourself, Your Staff, and Your Kids From Sharing Too Much Online

Tip of the Week: How to Protect Yourself, Your Staff, and Your Kids From Sharing Too Much Online

b2ap3_thumbnail_do_you_share_too_much_400.jpgAttention people of the Internet, October is Cyber Security Month! Make sure that you share this information with everyone on the Internet that you know. In a situation like this, sharing content with everyone to raise awareness of a worthy cause is perfectly fine. Although, what’s not alright is the sharing of your personal information online.

Continue reading
584 Hits
0 Comments

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpgWith social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

Continue reading
748 Hits
0 Comments

Blog Archive

January
February
March
April
June
July
August
September
October
November
December
January
February
March
April
May
June
July
September
October
November
December

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Best Practices Technology Tip of the Week Privacy Hackers Windows 10 Google Backup Cloud Productivity Innovation Efficiency Miscellaneous Mobile Devices Microsoft Upgrade Internet Automation Malware Hosted Solutions Business Computing Workplace Tips Computer Office Disaster Recovery Email Business Save Money Windows Hardware Social Media Quick Tips Server Gmail User Tips Data Software Browser Application Smartphones Ransomware Business Continuity Managed Service Provider Mouse Office Tips Robot User Error Data storage Small Business Recovery Social Engineering Internet Exlporer Health Fax Server History Retail Remote Computing Safety Bandwidth Google Drive VoIP Cybercrime Operating System Network Apple Telephone Systems Microsoft Office IT solutions DDoS Smartphone Government Cleaning Environment Distributed Denial of Service PDF Chromecast Downtime Encryption Risk Management Maintenance Law Enforcement Tech Support Bring Your Own Device Notifications Employer-Employee Relationship IT Services Budget iPhone Shadow IT Wearable Technology Collaboration Facebook Customer Relationship Management Mobile Device Management Monitor WiFi Computers Streaming Media Customer Service Saving Money Business Management Reputation Network Security Wireless Shortcut Files Android Running Cable Entertainment Settings Going Green Customers Best Practice Holiday End of Support Sports communications Passwords Marketing Mobile Computing Laptop Hacking Virtualization SharePoint Internet exploMicrosoft VPN Chrome People Touchpad Physical Security Data Management Networking Social Advertising YouTube App Mobile Office Biometrics Programming Gadgets Spam Private Cloud The Internet of Things Meetings Two-factor Authentication Relocation Social Networking Public Cloud NarrowBand Black Market Lithium-ion battery Humor Uninterrupted Power Supply eWaste Hybrid Cloud Wireless Technology Internet of Things Office 365

Mobile? Grab this Article!

QR-Code

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/renderers/gantrymodulesrenderer.class.php on line 85

Deprecated: Function create_function() is deprecated in /home/absolute/public_html/libraries/gantry/core/renderers/gantrymodulesrenderer.class.php on line 85