Onward Technologies Blog

Onward Technologies has been serving the Chicago area since 1985, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

0 Comments
Continue reading

The Time Has Come for SQL Server 2008 and 2008 R2

The Time Has Come for SQL Server 2008 and 2008 R2

Software solutions don’t last forever. While patches and security updates can stave off the inevitable for quite some time, it’s impossible to maintain a specific solution forever. Support is eventually cut off, and businesses are left exposed if they haven’t taken the time to prepare. In the case of Microsoft SQL Server 2008 and 2008 R2, you are running out of time.

0 Comments
Continue reading

Getting to Know About Phishing Attacks Can Keep Your Business Safe

Getting to Know About Phishing Attacks Can Keep Your Business Safe

There’s a big reason why phishing is a primary threat to businesses, and it’s because this method gives hackers a relatively risk-free way of gaining access to a network or other resources. Even being aware of the issue is often not enough to prevent it, as hackers are known to get quite aggressive and crafty with their phishing campaigns. If only a fraction of the 57 billion phishing emails that go out every year are taken seriously, hackers make quite a bit of profit off of users.

0 Comments
Continue reading

What is Encryption, Anyways?

What is Encryption, Anyways?

You hear about encryption being used all the time, almost to the point of it being synonymous with security, but what does it really mean to have encryption on your business’ data and devices? We’ll walk you through how encryption can help you in your day-to-day struggle to secure the integrity of your organization’s communication and infrastructure.

0 Comments
Continue reading

Three Give-Aways that Your Security Approach Needs a Change

Three Give-Aways that Your Security Approach Needs a Change

It only makes sense that you would want only the best security for your organization. It’s natural to want to eliminate risk entirely. However, this simply is not a realistic viewpoint to take where your security is concerned, and it can even contribute to greater security issues as a company holds out for the best solution.

0 Comments
Continue reading

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

0 Comments
Continue reading

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

0 Comments
Continue reading

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpgWith new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Chicago small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

Tag Cloud

Best Practices Security Technology Tip of the Week Microsoft Privacy Server Hackers Internet Cloud Workplace Tips Small Business Microsoft Office Computer Hardware Software Email IT Support Windows Wearable Technology Passwords Hosted Solutions Google VoIP Wireless Backup Productivity Miscellaneous Innovation Network Network Security communications Saving Money Efficiency Help Desk Business Distributed Denial of Service Chrome IT Infrastructure Mobile Device Windows 7 Data Office Personal Information Remote Monitoring Virtualization Education Telephone System Malware Database Encryption App Windows 10 WiFi Upgrade Office 365 Financial Apple Managed IT Services Mouse Holiday Phishing Remote Computing Cabling Smartphones eWaste Recovery Collaboration Windows Server 2008 R2 SharePoint Gadgets Telephone Systems Productivity Running Cable Cables Environment Business Continuity Staff DDoS Password Network Congestion Business Computing User Error History 5G Printers Assessment Hard Drive Managed IT Best Practice Law Enforcement Battery Data Protection Virtual Assistant Save Time Netflix Mobile Devices Cryptomining HBO Telecommuting NarrowBand Safety Techology Cache Smartphone Physical Security Managed IT Services Content Management Enterprise Content Management Firewall IT Consultant Digital Signage IT Plan Specifications Sports Information Technology Politics Connectivity Unified Threat Management Samsung Quick Tips FENG Marketing Telephony Cortana Data storage Machine Learning Emergency BDR IT solutions Employer-Employee Relationship Security Cameras Procurement Data loss Voice over Internet Protocol Cleaning Money Worker Commute Inventory MSP Rootkit Public Cloud OLED Amazon Web Services Going Green Wireless Internet Warranty Television Software as a Service iPhone Digital Signature Hiring/Firing Outlook Remote Work Wireless Technology Cybercrime HaaS Skype Google Apps Google Drive Search Blockchain Password Management Smart Technology Thank You Leadership User Tips Google Search Unsupported Software Business Intelligence VPN Router Music Devices GDPR Value Windows 10 People Investment Monitor Video Games Business Mangement Company Culture Patch Management Current Events Hacker Screen Mirroring Two-factor Authentication Tech Support End of Support Automobile Access Control File Sharing Training Vulnerability Manufacturing Flash Online Shopping Laptop Wire USB Printer Public Computer Networking Shortcuts Avoiding Downtime Data Management Computers Computing Infrastructure Accountants Compliance Employer Employee Relationship Ransomware Business Technology Frequently Asked Questions Identity Theft Chromecast Black Market IT Support Start Menu Workers Notifications Relocation How to HIPAA NIST Two Factor Authentication Congratulations Proactive IT Software Tips Data recovery Alert Thought Leadership E-Commerce Loyalty Shortcut OneNote Mobile Office Microchip ROI Reputation Scalability Recycling Managing Stress Scam Cybersecurity Managed Service Provider Botnet Cast Multi-Factor Security Shadow IT Advertising Work/Life Balance Authentication Augmented Reality Vendor Management Solid State Drive Facebook Redundancy Evernote Bandwidth Touchpad Smart Office Troubleshooting Administrator Data Breach Social Media Social Virtual Machine Root Cause Analysis Update Health Applications Tech Term Regulation Computer Accessories How To Analytics Excel Credit Cards Bring Your Own Device Internet of Things Flexibility Tools Infrastructure Social Engineering Humor Wi-Fi Human Resources Cryptocurrency webinar Disaster Recovery Net Neutrality BYOD Millennials YouTube Artificial Intelligence Twitter Mobile Computing SaaS CrashOverride Search Engine Automation Customers Instant Messaging Criminal Servers Transportation Knowledge Save Money Smartwatch Data Storage Trending Internet Exlporer Private Cloud Content Nanotechnology Remote Worker Charger Maintenance Audit Gmail Sync Keyboard Operating System Mobility Document Management Big Data IBM Fax Server Vendor Hypervisor Spam Google Docs Files Users Practices Information Bluetooth Spam Blocking Biometric Security Tip of the week Fraud Streaming Media Mobile Device Management Downtime Retail Meetings Bing Processor Word Password Manager Government Apps Safe Mode Electronic Medical Records Conferencing Browser ISP Data Security Workforce The Internet of Things Addiction Camera Cloud Computing Lithium-ion battery Hacking Outsourced IT CES HVAC Benefits Budget Employee IT Management Comparison Android PDF Audiobook Smart Tech Wiring Computer Care IT Services Computer Fan Settings Default App Communication Wireless Charging Robot Legal Paperless Office Books Supercomputer Risk Management Display Saving Time Data Backup Website Uninterrupted Power Supply Virtual Reality Hosted Computing Managed Service Worker Windows 10s Office Tips Windows Server 2008 Amazon Entertainment Business Management

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Super User What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date
16 September 2017
According to my view point for this content has been written very informative plus one more thing wh...

Blog Archive

January
February
April
June
August
September
October
November
December
January
February
March
June
July
September
October
November
December
February
March
April
May
June
August
September
December
January
February
March
April
May
June
July
September