Preparing…
952-223-4422
234 Broadway Street South Jordan, MN 55352

READY TO ROCK?

Click the button below to start exploring our website and learn more about our awesome company
Enter

Home

DON‘T WAIT….

Until your system is down

Your Computer Systems need constant maintenance. Don’t wait until the system has crashed or you are having major issues. Have one of our consultants come in and do a scheduled maintenance on your system. This will alleviate down time and keep everything working in tip top shape.

Business Support

Consult with us to find the solution for your company’s technology needs.

Networking 

From advanced networking to basic, we can help with what you need.

Security

We can help assess the security needs of your business.

Virtualization

Need more performance but don’t have the space? We can help implement new victual and cloud based systems.

62 Minnesota Chipotles hit by Malware

A little over a month ago, Chipotle was hit by a malware attack that stretched across all stores in the United States. They have just […]

Adwind malware

Adwind – Cross Platform Malware Returns

Hackers and cyber criminals are becoming dramatically more adept, innovative, and stealthy with each passing day. Cybercriminals have shifted from traditional methods to more clandestine […]

Amplifi router

Amplifi – WiFi like you’ve never had before

Drastically improve your WiFi network in your home! Amplifi by Ubiquiti Networks is a new product that can help improve your in home WiFi network. Amplifi […]

Android security update! KRACK be gone and band-aid adhesion!

Android deployed its recent patch for their phones. This patch holds significant updates, that involve KRACK (Key Reinstallation Attack) and also some fixes for the […]

API v2 is here! So what is the difference?

API or also known as Application program interface, is a set of routines and protocols as well as tools that allow for the building of […]

google phone

Your apps might be tracking you using ultrasonic frequencies

There is a chance your phone has been tossing out ultrasonic tones to be picked up by other devices. Sounds that the human ear cannot […]

google

Big business fights back !

Big Businesses are fighting for your privacy!   Google is currently waging a quiet war against the United States Government. The FBI is tasking out […]

iot devices

Businesses beware of IOT devices

IOT devices pose a serious security risk! These devices are products, other then computers, that connect to the internet. In this day in age it […]

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even […]

CCleaner software infected by nasty malware!

CCleaner is a free optimization tool for windows PC and Android mobile. This morning Piriform, the company which makes the CCleaner tool, divulged that specific […]

CCleaner update, technology companies watchout!

A follow up to the recent article about the hacking of the popular CCleaner software, it seems there was more damage than initially believed. According […]

droneseed

A Company in Oregon could be revolutionizing how we farm

An Oregon startup called DroneSeed is trying to change how we farm. Not only that but could also help with the replanting trees. If the startup […]

mar a lago

Cybersecurity extremely lax at Mar-a-lago

Propublica and Gizmodo reported that based on their most recent investigation the private club President Trump owns has extremely lax cybersecurity. He calls it the […]

Disqus breach. Hackers: 10 low security standards: 0

Here we are again folks, another article of a large breach in security, leaving multiple thousands in a state of possible vulnerability. It was discovered […]

Equifax hack leaves 143 million with roaming SSN

Mid May to July of 2017, Equifax had a security breach of their consumers private personal information, including social security numbers, birth dates, addresses and […]

Equifax leads to disaster once again

Equifax, which recently had a security breach now has another. In May, Equifax lost customer’s SSN, names and loads of other personal information to a […]

Equifax update. They knew months ahead that a breach was possible

Unfortunately there are some in this world who choose to close their eyes to the issues. Equifax seems to be the type to commit such […]

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on […]

Gas skimmers! Be careful at the pump!

Breaches in security through credit cards are becoming something of a more relevant issue with each passing day. Credit skimmers have been found more and […]

Google acquires cloud identity company Bitium

Google cloud has recently acquired the company known as “Bitium”, a company which gives a focus on enterprise grade identity management and access tools. These […]

Google’s Pixel 2 smartphone!

Recently announced was Google’s Pixel 2 smartphone. Now i know, its just another phone, and this is an I.T. businesses article, so how does this […]

CoinDash

Hacker steals $7 million in Ethereum from CoinDash!

Hacker diverts websites wallet address to his own and racks in over $7 million worth of Ethereum.   CoinDash is a social trading platform for […]

Hackers-2, Equifax-0

After the recent announcement that Equifax had been the victim of a hacking, there has been scrutiny towards the company. Millions of people had their […]

Have you been pwned?

Following up with our last post on what API V2 is, now we are going to address how API’s can be used against us rather […]

macbook on table

Having a Mac doesn’t necessarily mean your safe from Malware

For some time now, many people have believed that viruses and malware on a Mac was impossible. This is not true. The most recent threat […]

HACKER CIA ACCESS

Your Home Router is not Safe!

I have been talking with clients for years on this.  Home routers or even routers you get from your internet providers are not safe.  The […]

HP’s Bad Driver is Key Logging your data!

An update from a security blogger ModZero has found that a HP Driver for audio has been unintentionally logging all your pressed keys and storing […]

Hyper-V! What is it, and do you need it?

Hyper-V, also known as hypervisor, is a form of virtualization technology. Hyper-V is a computer software, firmware or hardware that creates and runs virtual machines. […]

IBM is diving into quantum computing

Since last year, IBM has been offering quantum computing as a cloud service. The first version released was a 5 qubit version, however today the […]

IBM

IBM Unveils New Technology!

IBM unveils new encryption technology to fight back against data breaches. IBM has rolled out its newest mainframe. They call it IBM Z. The new […]

intel logo

Intel patches security flaw that has gone unnoticed for 7 years!

For the last seven years, a large amount of Intel workstation and server chips have contained a security flaw that could be used to remotely […]

cyber crime

Internet crime on the rise

Internet crime continues to be a problem In 2016 the financial loss from cybercrime in the U.S. exceeded the $1.3 billion mark. According to a […]

Iot Devices

IoT devices: Be Productive and Innovative!

Internet of things More and more people are using Internet of things devices to help them with their work and every day life. Tablets are […]

FCC

July 12th: Internet wide day to save Net-Neutrality

Net Neutrality The FCC wants to destroy net neutrality and give large cable companies control over what we see and do on the internet. If […]

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, […]

Wanacry hackers screen shot

Live feed of Active Wanacry infections.

If you think the Wanacry virus is behind us, guess again.   Just check out this live interactive map showing active infections across the world. […]

Malicious Google Apps Phishing Scheme

If someone invites you to edit a document in Google doc’s today, don’t open it — it can be spam from a phishing scheme that’s […]

Man-In-The-Middle-Attacks, dont get caught in the middle!

the Man in the Middle (MitM), is a form of cyber attack that abuses public WiFi access to hack into peoples information that may pertain […]

hacker

Massive cyberattack hits Europe with widespread ransom demands

Ransomware strikes again! Another wave of powerful cyberattacks hit Europe and beyond last Tuesday in a possible reprise of the widespread ransom assault in May. […]

Massive malware outbreak on Androids google play store!

Recent security checks have discovered that a nasty malware has found its way to peoples devices via the google play store. Reportedly dozens of malicious […]

Microsoft-Hexadite

Microsoft buys Hexadite

Microsoft Buys Hexadite to Toughen Windows Security On Thursday, June 8th, Microsoft said it has agreed to buy Hexadite. Which is a company that incorporates […]

microsoft

Microsoft warns of devastating cyberattacks

Microsoft prepares for the worst! Last month’s WannaCry ransomeware outbreak seemed to be just a warning shot for what is to come. On June 13th, […]

Ubuntu

Microsoft Welcomes Unbuntu To The Microsoft Store

This week Microsoft announced the availability of Ubuntu Linux distro as a free download in the Windows Store. Microsoft Senior Program Manager, Rich Turner, says […]

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are […]

Kaspersky_Lab, cyber security

New Bill Would Bar Pentagon From Business With Russian Cyber Firm Kaspersky

A provision in a Senate spending bill that is likely to become a law would stop the Defense Department from doing any business with Kaspersky […]

android malware copycat

New Malware Caught Infecting Android Devices!!

A new uncovered malware strain has already infected more than 14 million Android devices around the world. The operators have earned approximately $1.5 million in […]

Banner@re2tech

New Signs at our Office! Free Beer -See inside for Details

FREE BEER Just Added some new Signage to our Space in Jordan!  If you are coming down to the Cinco De Mayo Block Party in […]

Not sure if your company has some loopholes in its cyber security? Let us test it for you!

Recently with the more and more hacking news coverage, people are becoming increasingly worries about their cyber security. With reason to be worried, there are […]

One Plus, potential for additional disasters

Recently, OnePlus, the phone brand, has been under scrutiny due to a newly discovered security flaw with one of their apps. Their app, also known […]

OnePlus is getting more than one.

The Chinese smartphone manufacturer OnePlus has been caught sneakily collecting tons and tons amount of data from its smartphones and the users. The data that’s […]

OnePlus Update

OnePlus has been under some heat lately for their non-consensual data snooping through their mobile devices. After a security researcher had exposed OnePlus for their […]

Is your password a complex mess thats hard to remember? Your more susceptible to hacks

Passwords are often seen as something that should be a complex arrangement of letters, numbers and punctuation, and should be reset every 90 days or […]

Phishing or data breaches? Which should you be worried about?

As of late, there has been a lot of talk about data breaches and online security failures. Naturally these instances can be concerning due to […]

Qualcomm VS Apple

Apple is being sued by Qualcomm for a breach in software license contract. As of yesterday, it was made public that Qualcomm is suing Apple, […]

Ransomeware inbound! Another threat is looming on the web

This year alone, there has already been three large outbreaks involving online security and breaches. Recently a new ransomware campaign has begun, and the targets […]

petya

Ransomware update: Petya

Petya-based ransomware using EternalBlue to infect computers around the world There are more reports of a massive cyber attack hitting a number of companies in […]

Security and how cyber attacks are evolving!

Cyber attacks are a race against time, every nanosecond an attacker is undetected more systems and vital information can be breached. Sensitive data needs to […]

Is your sensitive information available for everyone?

In December of 2013, AT&T announced their “Mobile Identity API”. This API would only be available through an enterprise contract with AT&T. Not long after […]

Data storage on an atomic scale

Someday we may not need to worry about the amount of data storage we have. Dutch scientists, at the technical university of Delft, have come […]

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport. What is a switchport? A switchport, […]

T-mobile the next big company to have leaked customer information!

Recently reported by a security researcher, a T-mobile bug on their website exposed its customers personal information. Due to a major flaw on T-mobiles website, […]

TransUnion, rival of Equifax having the same breach issues!

Apparently Equifax isn’t the only one having issues with the security of their website.  TransUnion’s website has been leading unsuspecting costumers to a false Flash […]

Ultrafast 5G broadband on the horizon!

Just recently, researchers at IMDEA Networks in collaboration with 18 partner organizations, have developed a new technology for mobile radio access that goes with mm-wave […]

Update on the wild Bad Rabbit

Ukraine speaks out on the Bad Rabbit running rampant in Russia, stating that the hackers behind the NotPetya virus were the probable group responsible for […]

nsa

The US is close to separating military-focused Cyber Command from the NSA

The United States after long debate is reportedly moving forward with plants to separate its military focused Cyber Command branch from the National Security Agency. […]

US says North Korea is behind cyberattacks dating back to 2009

The FBI and DHS are pinning several high-profile hacks on a group called Hidden Cobra, formally known as the Lazarus Group. On Tuesday, the US […]

USB with breach measurements found in Heathrow

Recently, a USB was found discarded on the streets of London. Well that’s fine right? Nothing is abnormal about some misplaced USB’s…until this one. The […]

If you use google drive/photos, be ready to switch your files around!

Recently announced by google, their application used by many for businesses and private use, Google Drive and Google Photos, will be shut out. Google Drive/Photos […]

Through the veil of technology, Amazon wants to deliver into your home

Recently made public, Amazon, the online consumer shopping cart giant, wants to enhance their delivery functionality by allowing the delivery driver to enter your home […]

vine

Vine users’ email and phone numbers were exposed for a day, but weren’t misused according to Twitter

Twitter is alerting vine users that their email addresses and in some cases phone numbers were exposed due to a bug. Because of this they […]

ransomware

Watch out for Ransomware!

WannaCry 2.0 is a new form of ransomware that is affecting Windows computers around the world. Ransomware is a type of malware that encrypts all […]

What is Cloud technololgy?

Most often, when someone mentions the ‘cloud’, there is often someone who is too embarrassed to ask ‘what’ the cloud is. Cloud technology has taken […]

What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a […]

Whole Foods credit card breach

Recently discovered by the Whole Foods company was the possibility that nine of its Bay Area locations had their credit card information exposed to hackers. […]

IT SUPPORT

Why do companies need us!

IT Support   Why do you buy insurance?   The reason is risk management! Risk management and thought process is a core function at RE2TECH.  We […]

Travel ban

A wider laptop ban could threaten your safety and data

For the past few days, frequent travelers have been dreading some bad news other then just being stuck in the middle seat: having to check […]

Windows Server 2016: Why it could be great for your business!

Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security, efficiency, and innovation, […]

windows_server

Windows Server – The right solution to help power your business

Here at Re2Tech, we pride ourselves on our great customer service and knowledge in the technology world. If you have a business, we think windows […]

WPA2 protocol leaves all access points vulnerable! Including yours!

Recently, some online researchers have discovered a fatal flaw in the WPA2 protocol. This flaw can affect anyone and everyone that is involved with Wi-Fi […]

Yahoos 2013 hack affected everyone!

Yahoo’s most known and infamous hack in history, is worse than initially thought. According to Verizon, who acquired yahoo in June, its now known that […]

You may not be as secure online as you think you are

Today, you might think you’re secure online, but the chances of that being true are very slim. The problem with what we know about cyber-security […]