Preparing…
952-223-4422
109 Rice Street South Jordan MN 55352

READY TO ROCK?

Click the button below to start exploring our website and learn more about our awesome company
Enter

Home

DON‘T WAIT….

Until your system is down

Your Computer Systems need constant maintenance. Don’t wait until the system has crashed or you are having major issues. Have one of our consultants come in and do a scheduled maintenance on your system. This will alleviate down time and keep everything working in tip top shape.

Business Support

Consult with us to find the solution for your company’s technology needs.

Networking 

From advanced networking to basic, we can help with what you need.

Security

We can help assess the security needs of your business.

Virtualization

Need more performance but don’t have the space? We can help implement new victual and cloud based systems.

2018 predictions: Healthcare security breach

As we all have become aware, 2017 was a free for all when it comes to security breaches.  There were countless phishing scams, ransomware, state-sponsored […]

2018 security expenses expected to rise in response to 2017

2017 was full of news on companies and corporations that had security breaches, and the effects on the masses that would follow because of them. […]

62 Minnesota Chipotles hit by Malware

A little over a month ago, Chipotle was hit by a malware attack that stretched across all stores in the United States. They have just […]

Adwind – Cross Platform Malware Returns

Hackers and cyber criminals are becoming dramatically more adept, innovative, and stealthy with each passing day. Cybercriminals have shifted from traditional methods to more clandestine […]

Amplifi – WiFi like you’ve never had before

Drastically improve your WiFi network in your home! Amplifi by Ubiquiti Networks is a new product that can help improve your in home WiFi network. Amplifi […]

Android hacked and crypto mined

On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin […]

Android security update! KRACK be gone and band-aid adhesion!

Android deployed its recent patch for their phones. This patch holds significant updates, that involve KRACK (Key Reinstallation Attack) and also some fixes for the […]

API v2 is here! So what is the difference?

API or also known as Application program interface, is a set of routines and protocols as well as tools that allow for the building of […]

Your apps might be tracking you using ultrasonic frequencies

There is a chance your phone has been tossing out ultrasonic tones to be picked up by other devices. Sounds that the human ear cannot […]

Avangrid security breach, 52,000 potentially affected

Hot off the press, information has been gathered and a security breach has occurred. The United Illuminating CO., Connecticut Natural Gas and Southern Connecticut were […]

Big business fights back !

Big Businesses are fighting for your privacy!   Google is currently waging a quiet war against the United States Government. The FBI is tasking out […]

Blockchain and it’s future

Blockchain, as Big as the Internet Our society and its economy is run by many factors, so many it would be near impossible to keep […]

Breaking news! Everything keeps breaking! Here we go again…

Another day another security breach! But where at this time you may ask? A cryptocurrency company known as NiceHash. Early Wednesday, it was discovered that hackers […]

Businesses beware of IOT devices

IOT devices pose a serious security risk! These devices are products, other then computers, that connect to the internet. In this day in age it […]

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even […]

CCleaner software infected by nasty malware!

CCleaner is a free optimization tool for windows PC and Android mobile. This morning Piriform, the company which makes the CCleaner tool, divulged that specific […]

CCleaner update, technology companies watchout!

A follow up to the recent article about the hacking of the popular CCleaner software, it seems there was more damage than initially believed. According […]

Cisco has a severe VPN bug, Patch immediately!

This just in, Cisco, the “worldwide leader in IT and networking”  has a severe but, that has been rated a “10 out of 10” by […]

Cloud security going into 2018

The cloud is becoming more and more preferred as times goes by. Data and applications are streaming to it at a faster rate every hour, […]

Coding and technology: Chance the Rapper showing our young how to get ahead

This past December , Chance the Rapper, the Chicago based Rapper known for his dedication to the younger generations and their success, made a visit […]

Companies who have been breached are still confident in their defenses

There has been alot of articles and news covering companies and businesses who have security breaches and had people’s vulnerable information out in the hands […]

A Company in Oregon could be revolutionizing how we farm

An Oregon startup called DroneSeed is trying to change how we farm. Not only that but could also help with the replanting trees. If the startup […]

Cybersecurity extremely lax at Mar-a-lago

Propublica and Gizmodo reported that based on their most recent investigation the private club President Trump owns has extremely lax cybersecurity. He calls it the […]

Data breach at the Department of Social Services

This just in, the department of Social Services credit card system has been breached, as of yesterday. This isn’t something to be thankful for that’s […]

Disqus breach. Hackers: 10 low security standards: 0

Here we are again folks, another article of a large breach in security, leaving multiple thousands in a state of possible vulnerability. It was discovered […]

Equifax hack leaves 143 million with roaming SSN

Mid May to July of 2017, Equifax had a security breach of their consumers private personal information, including social security numbers, birth dates, addresses and […]

Equifax leads to disaster once again

Equifax, which recently had a security breach now has another. In May, Equifax lost customer’s SSN, names and loads of other personal information to a […]

Equifax update. They knew months ahead that a breach was possible

Unfortunately there are some in this world who choose to close their eyes to the issues. Equifax seems to be the type to commit such […]

FCC is pushing out low-income subscribers, because apparently they’re not good enough

Recently made public, is the news arriving about the FCC and their customer base. The federal Lifeline program that lets low-income people use a 9.25$  […]

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on […]

Follow up information on the Uber data breach

Earlier today, it was made public the specifics that were stolen during the Uber data breach. Uber gives a more in-depth idea of the information […]

Forever 21…for the hackers with new credit card information

Hello all! We hope everyone had a nice relaxing holiday before the year year was rang in! Unfortunately during the holiday rest, someone got a […]

Gas skimmers! Be careful at the pump!

Breaches in security through credit cards are becoming something of a more relevant issue with each passing day. Credit skimmers have been found more and […]

GDPR Inbound

What is the GDPR and who does it affect? As of late there has been quit alot of mention about the “GDPR” across business, technology […]

GDPR Rolls Out

GDPR Is Active The 25th has arrived in the EU and that means that the GDPR is released and active, as well as already drawing […]

Google acquires cloud identity company Bitium

Google cloud has recently acquired the company known as “Bitium”, a company which gives a focus on enterprise grade identity management and access tools. These […]

Googles discovered CPU vulnerabilities, and how it can affect you

Google is a forerunner in the online world for many aspects, but one of the main focuses of Google is security. Google has a “Project […]

Google’s Pixel 2 smartphone!

Recently announced was Google’s Pixel 2 smartphone. Now i know, its just another phone, and this is an I.T. businesses article, so how does this […]

Hacker steals $7 million in Ethereum from CoinDash!

Hacker diverts websites wallet address to his own and racks in over $7 million worth of Ethereum.   CoinDash is a social trading platform for […]

Hackers-2, Equifax-0

After the recent announcement that Equifax had been the victim of a hacking, there has been scrutiny towards the company. Millions of people had their […]

Hackers and Emails

Emails in 2018, still vulnerable Emails have always had a fickle feeling security. Often we see and hear news about peoples emails getting hacked and […]

Hackers backed by Lebanese government affect thousands

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years. […]

Hackers Beware

I know you are all tired of seeing the word “hacker” everywhere. But to be honest, i’m certain it will only become more relevant as […]

Hackers hit Lumen cryptocurrency wallets

January 13th, all was right, until a sneaky little hacker came crawling in the night. To steal and plunder, wallets oh wonder, riches they desire […]

Hackers, and their modern day affect

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments […]

© %author%

Hackers take aim at the Winter Olympics

2017 was a big year for technology and it’s hacking abusers. With the new year already in progress we were all hoping for a nice […]

Have you been pwned?

Following up with our last post on what API V2 is, now we are going to address how API’s can be used against us rather […]

Having a Mac doesn’t necessarily mean your safe from Malware

For some time now, many people have believed that viruses and malware on a Mac was impossible. This is not true. The most recent threat […]

Your Home Router is not Safe!

I have been talking with clients for years on this.  Home routers or even routers you get from your internet providers are not safe.  The […]

Hospital in Greenfield held hostage to hackers

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up […]

HP laptops pre-installed with keyloggers

Recently made public by a security researcher by the name of ZwClose, is the unfortunate mishap affecting some of the HP laptops. Supposedly in the […]

HP’s Bad Driver is Key Logging your data!

An update from a security blogger ModZero has found that a HP Driver for audio has been unintentionally logging all your pressed keys and storing […]

Hyper-V! What is it, and do you need it?

Hyper-V, also known as hypervisor, is a form of virtualization technology. Hyper-V is a computer software, firmware or hardware that creates and runs virtual machines. […]

IBM is diving into quantum computing

Since last year, IBM has been offering quantum computing as a cloud service. The first version released was a 5 qubit version, however today the […]

IBM Unveils New Technology!

IBM unveils new encryption technology to fight back against data breaches. IBM has rolled out its newest mainframe. They call it IBM Z. The new […]

Imgur suffers a data breach, millions of accounts compromised

Recently reported, Imgur,  the image-sharing website has been victim to a data breach. Millions of accounts are suspected to have been compromised. A security researcher […]

Intel patches security flaw that has gone unnoticed for 7 years!

For the last seven years, a large amount of Intel workstation and server chips have contained a security flaw that could be used to remotely […]

Internet crime on the rise

Internet crime continues to be a problem In 2016 the financial loss from cybercrime in the U.S. exceeded the $1.3 billion mark. According to a […]

IoT devices: Be Productive and Innovative!

Internet of things More and more people are using Internet of things devices to help them with their work and every day life. Tablets are […]

July 12th: Internet wide day to save Net-Neutrality

Net Neutrality The FCC wants to destroy net neutrality and give large cable companies control over what we see and do on the internet. If […]

Key logger found attached to WordPress sites

Recently a post has surfaced regarding WordPress, the web-hosting site. Apparently it is being attacked by cryptomining code, stealing the information and resources of computers […]

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, […]

Live feed of Active Wanacry infections.

If you think the Wanacry virus is behind us, guess again.   Just check out this live interactive map showing active infections across the world. […]

Malicious Google Apps Phishing Scheme

If someone invites you to edit a document in Google doc’s today, don’t open it — it can be spam from a phishing scheme that’s […]

Man attempts to sue T-mobile because of cryptocurrency

Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, […]

Man-In-The-Middle-Attacks, dont get caught in the middle!

the Man in the Middle (MitM), is a form of cyber attack that abuses public WiFi access to hack into peoples information that may pertain […]

Massive cyberattack hits Europe with widespread ransom demands

Ransomware strikes again! Another wave of powerful cyberattacks hit Europe and beyond last Tuesday in a possible reprise of the widespread ransom assault in May. […]

Massive malware outbreak on Androids google play store!

Recent security checks have discovered that a nasty malware has found its way to peoples devices via the google play store. Reportedly dozens of malicious […]

McAfee twitter account hacked, cryptocurrencies may be next

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter […]

Microsoft buys Hexadite

Microsoft Buys Hexadite to Toughen Windows Security On Thursday, June 8th, Microsoft said it has agreed to buy Hexadite. Which is a company that incorporates […]

Microsoft warns of devastating cyberattacks

Microsoft prepares for the worst! Last month’s WannaCry ransomeware outbreak seemed to be just a warning shot for what is to come. On June 13th, […]

Microsoft Welcomes Unbuntu To The Microsoft Store

This week Microsoft announced the availability of Ubuntu Linux distro as a free download in the Windows Store. Microsoft Senior Program Manager, Rich Turner, says […]

Morrisons supermarket data breach

Just hours ago, it was made public that Morrisons, a super market, is being held liable for the breach of information involving their workers. Workers […]

Net neutrality and the FCC’s use of deceased people’s name

Lately the internet has been abuzz about net neutrality and preventing it from being stolen from us, lest we want to see a degradation in […]

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are […]

New Bill Would Bar Pentagon From Business With Russian Cyber Firm Kaspersky

A provision in a Senate spending bill that is likely to become a law would stop the Defense Department from doing any business with Kaspersky […]

New Malware Caught Infecting Android Devices!!

A new uncovered malware strain has already infected more than 14 million Android devices around the world. The operators have earned approximately $1.5 million in […]

Banner@re2tech
© %author%

New Signs at our Office! Free Beer -See inside for Details

FREE BEER Just Added some new Signage to our Space in Jordan!  If you are coming down to the Cinco De Mayo Block Party in […]

Not sure if your company has some loopholes in its cyber security? Let us test it for you!

Recently with the more and more hacking news coverage, people are becoming increasingly worries about their cyber security. With reason to be worried, there are […]

One Plus, potential for additional disasters

Recently, OnePlus, the phone brand, has been under scrutiny due to a newly discovered security flaw with one of their apps. Their app, also known […]

OnePlus is getting more than one.

The Chinese smartphone manufacturer OnePlus has been caught sneakily collecting tons and tons amount of data from its smartphones and the users. The data that’s […]

OnePlus Update

OnePlus has been under some heat lately for their non-consensual data snooping through their mobile devices. After a security researcher had exposed OnePlus for their […]

Is your password a complex mess thats hard to remember? Your more susceptible to hacks

Passwords are often seen as something that should be a complex arrangement of letters, numbers and punctuation, and should be reset every 90 days or […]

PayPal acquires TIO networks but with a cost

Just hours ago, it was made public that PayPal has had a security breach due to their newly acquired networks company TIO. Back in February, […]

Phishing or data breaches? Which should you be worried about?

As of late, there has been a lot of talk about data breaches and online security failures. Naturally these instances can be concerning due to […]

The most popular passwords, proven by hacked accounts

So apparently, every year SplashData compiles a list of passwords and rates them according to occurrence. These passwords are from accounts that have been stolen […]

Qualcomm VS Apple

Apple is being sued by Qualcomm for a breach in software license contract. As of yesterday, it was made public that Qualcomm is suing Apple, […]

Ransomeware inbound! Another threat is looming on the web

This year alone, there has already been three large outbreaks involving online security and breaches. Recently a new ransomware campaign has begun, and the targets […]

Ransomware update: Petya

Petya-based ransomware using EternalBlue to infect computers around the world There are more reports of a massive cyber attack hitting a number of companies in […]

Reddit user discloses some major issues with Mac OS root login

Recently, a user on Reddit gave information on a huge Mac OS High Sierra vulnerability. Access to “root” permissions is as easy as an empty […]

Russia has been banned from the 2018 Olympics, possibly connected to Olympic hacking

Recently we had a post involving some hacking attempts against those in cooperation with the 2018 Winter Olympics. The hacking attempts involved sending malware-full emails […]

Russia inbound, hackers take a crack at Senate email

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt […]

Security and how cyber attacks are evolving!

Cyber attacks are a race against time, every nanosecond an attacker is undetected more systems and vital information can be breached. Sensitive data needs to […]

Is your sensitive information available for everyone?

In December of 2013, AT&T announced their “Mobile Identity API”. This API would only be available through an enterprise contract with AT&T. Not long after […]

Smartphones with breach options, new option discovered

Smartphones are the present and the future, there is no doubt about that. They offer an immense control in a life and helps people stay […]

Sprint Merging With T-Mobile

For a while now, many people including myself thought that Sprint and T-Mobile were so similar that they were the same company. Without ever taking […]

Data storage on an atomic scale

Someday we may not need to worry about the amount of data storage we have. Dutch scientists, at the technical university of Delft, have come […]

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport. What is a switchport? A switchport, […]