Hackers-2, Equifax-0

After the recent announcement that Equifax had been the victim of a hacking, there has been scrutiny towards the company. Millions of people had their SSN breached and other personal information stolen. From an on looking perspective it seemed like things couldn’t get worse for Equifax, but it seems that was wrong. Once again Equifax

Read More »

If you use google drive/photos, be ready to switch your files around!

Recently announced by google, their application used by many for businesses and private use, Google Drive and Google Photos, will be shut out. Google Drive/Photos is being replaced with a new application called Google Backup and Sync. This new application is essentially the same as Google Drive/Photos, however it consolidates the applications into one single

Read More »

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport. What is a switchport? A switchport, or network switch, is a networking device that allows the connection of devices to computer networks. This is accomplished through packet switching that grants the ability to receive, process, and

Read More »

What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a form of hijacking that is indirect but can have huge direct consequences. DNS stands for Domain Name System. The DNS is your known name, this is something that would show

Read More »

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are so many forms of cyber attacks and multiple ways you can try to anticipate them. However, network segmentation is effective for anyone and everyone in helping to slow down the

Read More »

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, and some that have very bad intent for your security! Phishing attacks are becoming some of the most prominent forms of security breaches. Phishing attacks: Phishing is the attempt to

Read More »

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even need a telephone to use its services! An internet connection and computer is all you’ll need! VoIP is generally used for businesses as a convenient alternative to help enhance functionality

Read More »

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on a daily basis that may affect you and your business. Recently we had a ping that was unexpected. August 8th was the release of a bunk over-the-air firmware update for

Read More »

Windows Server 2016: Why it could be great for your business!

Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security, efficiency, and innovation, and Windows Server 2016 delivers. Windows Server 2016 is the cloud ready operating system that supports your current workloads while introducing new technologies that make it easy to transition to

Read More »

IoT devices: Be Productive and Innovative!

Internet of things More and more people are using Internet of things devices to help them with their work and every day life. Tablets are becoming more and more popular in the business world. You can access practically any app that you would access on your PC but at your finger tips. With the perfect

Read More »