iTecs IT Outsourcing and Support Blog
As Zoom grows due to the coronavirus induced work from home style of conducting business. Immature and nefarious actors are hijacking and listening in on business and personal meetings around the world. We've heard reports of Youtube videos of Neo-Nazi sort of content suddenly shown in meetings, to loud ear gouging noises played until people leave the session.
Zoom is working with other companies to stop the disruption of meetings, but is it too late? The company's reputation as a secure and private solution to working from home and teleconferencing is diminishing. iTecs is advising clients to try different solutions if Zoom intrusion concerns are unacceptable. With a broad market of solutions out there, your business model, needs, and security goals will affect which product to use for your business.
Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.Read More
G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.Read More
The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.Read More