Blog - Hungerford Technologies

Blog

What Happens after a Hacker Steals Your Password

You are probably familiar with how cybercriminals use phishing and other types of attacks to obtain employees’ passwords, as this is often discussed in the media. But do you know what happens after a hacker steals an employee’s password? To answer this question, researchers at the security firm Bitglass conducted an eye-opening experiment. The Experiment […]

Hungerford Technologies Business VoIP Solution allows you to make and receive calls during an outage

Your organization depends on being able to communicate. If you do not have the ability to make and receive calls, many times that means you are not able to do business. What did the recent outages cost your business? With Hungerford Technologies, you can be up and running 24/7 despite an outage.   What if […]

The Pros and Cons of Moving Your Email Services to the Cloud

Email is an essential communication tool for most businesses. While email services have traditionally been provided on-premises, an increasing number of companies are moving their email services to the cloud. Almost 60 percent of businesses worldwide now use either Microsoft Office 365 or Google G Suite, according to the Bitglass 2016 Cloud Adoption Report. Office […]

How to Protect Your IoT Devices from Malware Designed to Destroy Them

Hackers have unleashed a new kind of malware that damages the systems of Internet of Things (IoT) devices so extensively the devices become useless. The malware has been dubbed BrickerBot because it turns these devices into little more than expensive bricks. Security researchers are unsure why hackers are destroying IoT devices. What’s not in question, […]

How to Make Apps More Accessible in Windows 10

Windows 10 lists the six apps you use most often at the top of Start menu. To open a program that you use less often, you have to scroll down the Start menu’s long list of apps or start typing the program’s name in the search box. To save time and effort, you can create […]

Don’t Let Your Business Become the Next Spear Phishing Victim

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) from more than 22,000 companies worldwide using a type of spear phishing attack known as a Business Email Compromise (BEC) scam, according to the U.S. Federal Bureau of Investigation […]

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ login information. If the password for your Google account is stolen, you could lose personal information, send unauthorized emails, and risk having other account passwords reset. For these reasons, […]

4 Reasons Why Your Wired High-Speed Internet Connection Might Be Slow

Many people use a high-speed Internet service through a wired connection to browse and work online. Even with this setup, though, the connection can be unexpectedly slow, leading to consistent delays in loading web pages and downloading files. Occasionally, slow connections occur because many different technologies need to communicate with each other to get data […]

7 Ways to Secure Your Smartphone

Smartphones are so small and portable that it is easy to forget that you have a powerful computer in your pocket or purse. However, they are increasingly becoming the target of theft, ransomware, viruses, and other types of malware. As a result, you need to take steps to protect your device as well as the […]

6 Ways to Make Your IT Security Training More Effective

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be that way. Your employees can provide an important line of defense against cybercrime if you educate them about IT security. For this training to be effective, though, it needs […]