What is Cloud technololgy?

Most often, when someone mentions the ‘cloud’, there is often someone who is too embarrassed to ask ‘what’ the cloud is. Cloud technology has taken the world by storm (no pun intended) in most all areas these days, the cloud is involved in the information storage/management. Businesses to college campus’ to home networks. So what

Read More »

Hackers-2, Equifax-0

After the recent announcement that Equifax had been the victim of a hacking, there has been scrutiny towards the company. Millions of people had their SSN breached and other personal information stolen. From an on looking perspective it seemed like things couldn’t get worse for Equifax, but it seems that was wrong. Once again Equifax

Read More »

If you use google drive/photos, be ready to switch your files around!

Recently announced by google, their application used by many for businesses and private use, Google Drive and Google Photos, will be shut out. Google Drive/Photos is being replaced with a new application called Google Backup and Sync. This new application is essentially the same as Google Drive/Photos, however it consolidates the applications into one single

Read More »

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport. What is a switchport? A switchport, or network switch, is a networking device that allows the connection of devices to computer networks. This is accomplished through packet switching that grants the ability to receive, process, and

Read More »

What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a form of hijacking that is indirect but can have huge direct consequences. DNS stands for Domain Name System. The DNS is your known name, this is something that would show

Read More »

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are so many forms of cyber attacks and multiple ways you can try to anticipate them. However, network segmentation is effective for anyone and everyone in helping to slow down the

Read More »

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, and some that have very bad intent for your security! Phishing attacks are becoming some of the most prominent forms of security breaches. Phishing attacks: Phishing is the attempt to

Read More »

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even need a telephone to use its services! An internet connection and computer is all you’ll need! VoIP is generally used for businesses as a convenient alternative to help enhance functionality

Read More »

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on a daily basis that may affect you and your business. Recently we had a ping that was unexpected. August 8th was the release of a bunk over-the-air firmware update for

Read More »