CREATE ACCOUNT

*

*

*

*

*

*

FORGOT YOUR PASSWORD?

*

Are You Having A Technology Emergency?

QuestingHound Technology Partners Blog

QuestingHound Technology Partners has been serving the Deerfield Beach area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why A Network Audit Is A Good Idea

Why A Network Audit Is A Good Idea

Most small businesses don’t have the luxury of an in-house IT department. Even if they do have one, it’s likely a small department run by a handful of folks who have their hands full with either implementation projects or simply staying afloat. With opportunities to invest in the improvement of your infrastructure few and far between, a network audit can help you identify where your network suffers most, and what you can do about it.

Continue reading
0 Comments

Why You Should Pay Attention to Data Security Notifications

Why You Should Pay Attention to Data Security Notifications

If you’ve watched the news lately, chances are you’ve seen the Equifax breach and the ridiculous fallout it has caused. Over 133 million personal records have been stolen. While it’s difficult not to feel individually victimized by such a breach, it’s important to remember that it’s often not your specific credentials targeted by hackers. Since businesses often hold onto valuable information, they have big crosshairs painted onto them. It doesn’t even stop there--any vendors or partners you deal with are also in danger of hacking attacks.

Continue reading
0 Comments

Major Cyber Threats Are Less Of A Worry With An MSP’s Help

Major Cyber Threats Are Less Of A Worry With An MSP’s Help

There are dozens of surveys and reports produced each year that evaluate digital threats and cybercrime. Not every publication applies to every business - but many of them do have some important take aways about the best practices of handling IT. Here’s few highlights from the 2017 Cyberthreat Defense Report that offer important insight for SMBs and their use of technology.

Continue reading
0 Comments

Make Sure Your Business Isn’t in the Headlines for the Next Big Cyber Attack

Make Sure Your Business Isn’t in the Headlines for the Next Big Cyber Attack

Based on the headlines you see today, it’s no question that cybersecurity is something that every business owner should be concerned about. As attacks become bigger and more frequent, all decision makers must ask the question: who needs to step up and ensure my IT resources are secure?

Continue reading
0 Comments

What’s a Rootkit Hack and How Can You Stop It?

What’s a Rootkit Hack and How Can You Stop It?

There are many types of online threats that the average business owner needs to understand and be prepared for. The problem here is that no two threats are alike, and they all perform different functions. One thing that all threats have in common is that they want to disrupt your operations in any way possible. To help you better prepare your organization for these threats, we’ll discuss a particularly dangerous malware: the rootkit hack.

Continue reading
0 Comments

Tip of the Week: How to Know if You’ve Experienced a Data Breach

Tip of the Week: How to Know if You’ve Experienced a Data Breach

Your data needs to be protected--that’s something that we all can agree on. However, even if your data were to be targeted in a data breach, would you be able to see the attack coming? Here are three telltale signs that your data is in imminent danger.

Continue reading
0 Comments

4 Important Lessons Learned From Verizon’s Annual Security Report

4 Important Lessons Learned From Verizon’s Annual Security Report

Verizon has taken to publishing a compilation report analyzing data breach statistics with the help of industry partners, a report that is widely regarded as a must-read for the industry. A brief review of the latest edition’s executive summary revealed where information security vulnerabilities lie in industries worldwide and, even more helpfully, what shape those vulnerabilities took. The Data Breach Investigations Report, or DBIR, pulled no punches in outlining what kind of attacks happened in the past year, and how.

Continue reading
0 Comments

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments
TOP