CASS Tech Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_huge_spending_on_security_400.jpgIf you were considering increasing your investment into your information security in 2018, you certainly aren’t alone. Gartner released a report that indicated a considerable rise in plans to invest in key security considerations.

b2ap3_thumbnail_business_card_apps_400.jpgIt’s just good business to hand out your business card to prospective clients, and it has been for a very long time. As far back as the Renaissance, special guests were announced with name cards that displayed who the guest was and what types of greetings were due. It wasn’t until the Industrial Revolution that business cards became primarily a means of displaying trades or professional skills. Business cards are mostly used for marketing and networking in the modern age, and your organization should be using them.

b2ap3_thumbnail_meltdown_spectre_two_400.jpgYou’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

20-Year-Old Exploit Finds New Life as ROBOT

Posted by on in Alerts

b2ap3_thumbnail_robot_threat_arrived_400.jpgThere is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

b2ap3_thumbnail_cellphone_discarded_repurpose_400.jpgUnless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

b2ap3_thumbnail_keyboard_as_a_weapon_400.jpgTo many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

b2ap3_thumbnail_destroy_harddrive_400.jpgWhen a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

b2ap3_thumbnail_sad_computer_bandaid_400.jpgThe term “best practice” has been used by businesses for years to describe the optimal way of performing a particular task. However, before fully adopting them into business operations, it is important for these practices to be examined and deemed to be beneficial to an individual company’s circumstances. If they are not, a company risks much by adopting a misplaced best practice.

b2ap3_thumbnail_green_wifi_world_400.jpgFor the modern business, having a strategy to manage your employee's smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

These Gifts Can Come with Security Issues

Posted by on in Security

b2ap3_thumbnail_christmas_balls_400.jpgThe holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Tagged in: Holiday Privacy Security

b2ap3_thumbnail_dark_cortana_logo_400.jpgOne of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

b2ap3_thumbnail_holiday_traditional_laptop_400.jpgMerry Christmas! We know that for the small business owner, even on Christmas day, business doesn’t completely stop. Sure you can spend time with loved ones and take a couple days off from the grind, but tomorrow is another day. According to one study, people are gifting technology more than ever, so much so that new traditions that include technology, are replacing the once-held notion that technology was a distraction.

b2ap3_thumbnail_selecting_an_msp_400.jpgIdentifying a qualified managed service provider can be challenging--especially if you don’t know what to look for. You should be able to gauge the worth of an IT provider based on a couple of key qualifications, just like you would if you were selecting an employee. What are some of the primary features that you want to look for in a managed service provider?

Tip of the Week: Using Excel to Excel-lerate

Posted by on in How-To

b2ap3_thumbnail_excel_shortcuts_400.jpgMicrosoft Excel has been around for quite some time, but it’s one of the trickier Microsoft Office solutions to master. You might know all about some of the more common Excel tricks, but do you know these power shortcuts that can help you fully take advantage of the spreadsheet software? Here are some obscure Excel shortcuts that your organization can take advantage of.

You Should Care About Blockchain Technology

Posted by on in Technology

b2ap3_thumbnail_the_blockchain_400.jpgWe often go into depth about technology, management, and other business-oriented topics, and occasionally we decide to talk about a technology that may not be all that familiar to people with the hope that a short primer on the subject will ultimately help our readers to become curious and do their own research to understand the technology better. With Bitcoin being a trending topic in the news, understanding what a blockchain is will help you understand how this technology will drive data security in the coming years.

b2ap3_thumbnail_build_a_better_business_with_collaboration_400.jpgIn the modern business setting, collaboration drives productivity. As a result, many software developers are producing software with collaboration in mind. Since these developers are all in competition with each other for market share, they are typically trying to build on more advanced features to outmaneuver the other companies. Some of the biggest names in the industry have recently updated their products to make collaboration a priority. This week we’ll take a look at updates made to Facebook Workplace, Gmail, and Slack.

Tip of the Week: The Basics of Data Backup

Posted by on in How-To

b2ap3_thumbnail_basics_of_data_backup_400.jpgData backup and disaster recovery are two of the linchpins of any business that relies on data and IT solutions storing information. Your business needs to have a plan for when operations are interrupted due to an unforeseeable data loss event. There are a few ways that you can keep your data backups as safe and efficient as possible.

How Fake News Can Influence Business

Posted by on in Miscellaneous

b2ap3_thumbnail_technology_s_role_in_fake_news_400.jpgInformation is one of the most valuable assets available to businesses, but to be fair, there’s an awful lot of falsified information found on the Internet. Due to the increased focus on data acquisition and dissemination, false information is more harmful and easy to manipulate than ever before. The thing about this is that “fake news” is actually reliant on technology to work.

b2ap3_thumbnail_ddos_attack_green_400.jpgHow quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the effects they could have on your operations? If asked these questions, most businesses should want to say yes, but in reality, over half lack the means to defend against DDoS.

Without These Tools, Your Network Isn’t Secure

Posted by on in Security

b2ap3_thumbnail_network_security_basic_400.jpgYour business might have a limited budget, but this shouldn’t hold you back from implementing the best and strongest security solutions. However, security is a complicated process for any business. This is problematic, especially since common threats and vulnerabilities show up frequently in the business environment. We’ll walk you through some security basics so that you can optimize your organization's protection.

Categories

Newsletter (265)
C.A.S.S Blog (872)
IT Blog (329)
Technology (125)
Security (118)
How-To (86)
Business (68)
Cloud (37)
Alerts (22)
Tips (2)

Mobile? Grab this Article!

QR-Code dieser Seite

Latest Blogs

Proper Hard Drive Disposal is An Involved Process
When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines...
Continue Reading...

Contact Us

Learn more about what CASS Tech can do for your business.

Call for IT Support

Call us today    (248) 538-7374

37000 Grand River Ave.
Suite 130

Farmington Hills, Michigan 48335

twitter linkedin #