CREATE ACCOUNT

*

*

*

*

*

*

FORGOT YOUR PASSWORD?

*

Are You Having A Technology Emergency?

QuestingHound Technology Partners Blog

QuestingHound Technology Partners has been serving the Deerfield Beach area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

0 Comments
Continue reading

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

0 Comments
Continue reading

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

0 Comments
Continue reading

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

0 Comments
Continue reading

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

0 Comments
Continue reading

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

0 Comments
Continue reading

Why You Should Pay Attention to Data Security Notifications

Why You Should Pay Attention to Data Security Notifications

If you’ve watched the news lately, chances are you’ve seen the Equifax breach and the ridiculous fallout it has caused. Over 133 million personal records have been stolen. While it’s difficult not to feel individually victimized by such a breach, it’s important to remember that it’s often not your specific credentials targeted by hackers. Since businesses often hold onto valuable information, they have big crosshairs painted onto them. It doesn’t even stop there--any vendors or partners you deal with are also in danger of hacking attacks.

0 Comments
Continue reading

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

0 Comments
Continue reading

Your State Dictates Data Security Notifications… Will You Be Notified?

Your State Dictates Data Security Notifications… Will You Be Notified?

In the last few months, there have been several high-profile data security breaches that resulted in the theft of millions upon millions of non-public information records. Though much of the focus in the aftermath of the breaches was on personal identity theft and prevention, it’s important to keep in mind that not all the stolen data records target individuals. Business entities are also at risk. Vendors and partners that you do business with regularly will probably have record of your company’s non-public information, payment information, or tax ID number.

0 Comments
Continue reading

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Businesses can benefit from the use of personal mobile devices in the workplace, yet there are also potential dangers in allowing mobile and Internet of Things devices to access your network. In order to reduce these dangers, you need to put some limits and guidelines on the use of such devices in the workplace.

0 Comments
Continue reading

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

0 Comments
Continue reading

If Your Business Could Talk, It’d Complain About Spam

If Your Business Could Talk, It’d Complain About Spam

Chances are, you’ve heard of spam, but many don’t know how to identify it in the first place, let alone work around it. Frankly, spam can cause some serious damage to your business if not properly dealt with. In today’s blog, you’ll learn what makes spam, “spam,” and how you can keep it from infecting your inbox.

0 Comments
Continue reading

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

0 Comments
Continue reading

Are Shortcuts Sabotaging Your Progress?

Are Shortcuts Sabotaging Your Progress?

When your organization is implementing a new project, there are a lot of expectations and deadlines that are watched with a close eye. While it might be ideal to get the project finished as quickly as possible, doing so can put a lot of pressure and stress on it that can ultimately be its downfall. For example, if you don’t think out the planning phase carefully, the entire implementation process can suffer--particularly when working on new IT initiatives.

0 Comments
Continue reading

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

0 Comments
Continue reading

The Top 5 Online Threats Facing Every Business

The Top 5 Online Threats Facing Every Business

It doesn’t matter which industry your organization falls into. Your business will always be susceptible to threats in some way, shape, or form. Therefore, it’s your responsibility to ensure that your business understands how to protect itself from these threats, before it’s too late. We’ll help you learn more about the various issues that you need to watch out for, and what you can do to stop them.

0 Comments
Continue reading

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

0 Comments
Continue reading

Is Combining Mobile Apps and ATMs a Good Idea?

Is Combining Mobile Apps and ATMs a Good Idea?

ATMs are, surprisingly enough, not the most secure pieces of technology out there, though there are efforts to improve security by taking advantage of mobile devices. Granted, this won’t be enough to protect against the considerable vulnerabilities in ATMs. In order to maximize security and minimize the amount of damage done by vulnerabilities, the user needs to understand how to protect themselves while using ATMs.

0 Comments
Continue reading

Tip of the Week: 2 Easy Ways You Can Minimize Network Security Issues

Tip of the Week: 2 Easy Ways You Can Minimize Network Security Issues

Security issues can have any number of causes, meaning that every business needs to have a comprehensive security solution. This doesn’t mean, however, that there aren’t additional, small measures to implement that can give your organization’s security an added boost. Here, we’ll talk about two: keeping your software patched, and identifying social engineering attempts.

0 Comments
Continue reading

Did My Samsung Device Just Wink? Is it Spying on Me?

Did My Samsung Device Just Wink? Is it Spying on Me?

Occasionally, some Samsung smartphone users might see something strange appear at the top of their device’s screen--an eyeball. It will show up for a brief second and then disappear. What gives Samsung? Are you spying on me? For this blog, we’ll get to the bottom of this, as well as go over the symptoms of a device that is compromised.

0 Comments
Continue reading
TOP