What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a form of hijacking that is indirect but can have huge direct consequences. DNS stands for Domain Name System. The DNS is your known name, this is something that would show

Read More »

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are so many forms of cyber attacks and multiple ways you can try to anticipate them. However, network segmentation is effective for anyone and everyone in helping to slow down the

Read More »

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, and some that have very bad intent for your security! Phishing attacks are becoming some of the most prominent forms of security breaches. Phishing attacks: Phishing is the attempt to

Read More »

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even need a telephone to use its services! An internet connection and computer is all you’ll need! VoIP is generally used for businesses as a convenient alternative to help enhance functionality

Read More »

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on a daily basis that may affect you and your business. Recently we had a ping that was unexpected. August 8th was the release of a bunk over-the-air firmware update for

Read More »

Malicious Google Apps Phishing Scheme

If someone invites you to edit a document in Google doc’s today, don’t open it — it can be spam from a phishing scheme that’s been spreading quick this afternoon. As precise on Reddit, the attack sends targets an emailed invitation from someone they’ll realize, takes them to a actual Google sign-in display screen, then

Read More »