SandStorm IT

Power On

  • Services
    • Managed IT Services
    • Servers & Networks
    • Business Computers & Support
    • Cloud Services & Data Backup
    • Custom Software Development
    • VoIP Telephone Solutions
    • Custom Web Design
    • Disaster Recovery Solutions
    • Security & Compliance
    • IT Consulting
  • Technologies
  • Pricing
  • Work
  • About
    • Our History
    • Our Team
    • Careers
    • Press
  • Blog
  • Contact
    • (901) 475-0275
  • Help Me

What are the security concerns of IoT?

January 12, 2021 By Jacob Ellis

Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More

Categories: Cloud/Serverless Computing, Cybersecurity, Internet of Things (IoT), Networking, Servers, Wireless/Wi-Fi

What is the Internet of Things (IoT)?

September 8, 2020 By Jacob Ellis

Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? (You are here) Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What … Read More

Categories: Internet of Things (IoT), Networking

What is a Denial of Service Attack?

September 1, 2020 By Jacob Ellis

A Denial of Service (DoS) attack is an attack on an individual computer or network that aims to consume as many resources as possible. The main goal of this attack is to deny service to the legitimate users of the computer or network. There are a number of ways in which this can be accomplished, as … Read More

Categories: Cybersecurity, Networking, Other

What is a VPN?

March 23, 2020 By Jacob Ellis

A virtual private network (VPN) allows a private network of devices to be securely extended over a public network such as the Internet. This gives the  functionality of a typical private network but with the convenience of a public network. VPNs are commonly seen in the corporate world, where having … Read More

Categories: Business, Cybersecurity, Networking

What are social media bots and how can I protect myself?

February 3, 2020 By Jacob Ellis

Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots.  By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human.  … Read More

Categories: Cybersecurity, Personal Computing, Social Engineering/Phishing, Tips/Tricks/Shortcuts

What is a Firewall and Why do I need one?

January 13, 2020 By Jacob Ellis

What is a Firewall? Firewalls are hardware and/or software systems which protect end users from malicious traffic on the Internet. When data is sent over the Internet, it comes packaged with information about where it is coming from and where it is supposed to go, as well as an indication as to … Read More

Categories: Networking, Wired Networking

What makes a strong password?

October 14, 2019 By Jacob Ellis

With all the data breaches we see on the news these days, it can sometimes be scary to trust companies with your sensitive information. However, in many cases, sensitive data is gained by an attacker taking advantage of users implementing weak passwords. Today, we will look at some examples of … Read More

Categories: Cybersecurity, Passwords, Personal Computing, Tips/Tricks/Shortcuts

What is cryptojacking and how does it affect me?

June 10, 2019 By Jacob Ellis

Cryptojacking is a term that has been making its rounds in the news lately. Rightfully so, many users are worried about being caught up in these attacks. So what is cryptojacking exactly? Basically, cryptojacking is an attack which secretly harnesses the power of your computer to "mine" for … Read More

Categories: Business, Cybersecurity, Networking, Personal Computing, Spyware/Malware/Viruses

What is “Incognito mode” in Google Chrome and Why would you use it?

December 10, 2018 By Jacob Ellis

What is Incognito Mode? Incognito mode is essentially a setting on your web browser to disallow the storing of local data relating to the websites you surf. When surfing the web in this mode, your browsing history will not be recorded. Also, any additional cookies sent to your browser during this … Read More

Categories: Cybersecurity, Networking, Personal Computing, Tips/Tricks/Shortcuts

What is the future of IoT?

November 19, 2018 By Jacob Ellis

Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More

Categories: 5G & Mobile Networking, Internet of Things (IoT), Networking

  • 1
  • 2
  • Next Page »

Subscribe to Our Newsletter

Check your inbox or spam folder now to confirm your subscription.

SANDSTORM IT BLOG

Featured
News
Press Releases
SandStorm News
Security Alerts & Vulnerabilities
Managed Services
Managed Anti-Virus/Anti-Malware
Managed Backups & Monitoring
Updates/Patches
Passwords
Cybersecurity
Spyware/Malware/Viruses
Social Engineering/Phishing
Ransomware
Data Breaches/Leaks
Other
Servers
Server & Server Hardware
Cloud/Serverless Computing
Server Operating Systems
Networking
Wired Networking
Wireless/Wi-Fi
Internet of Things (IoT)
5G & Mobile Networking
Business
General Business
Enterprise Resource Planning (ERP)
Voice & Telephony
Backups & Business Continuity
On-Site Backups
Cloud Backups
DR/BCM Planning & Consulting
Personal Computing
Tips/Tricks/Shortcuts
Troubleshooting
Hardware & Peripherals
Desktop Operating Systems
Software & Applications
Office Applications
Desktop Software
Email Software and Applications

Authors

Authors
Doyle Sanders
Jake Sanders
Jordan Sanders
Justin Oliver
Matt Ballard
Robert Cleveland
Cristian Colón
Jacob Ellis
Jeff Fowler
Miker Irick
Curtis Mayo
Josh Restuccio
Lindsey Sanders
Matthew Stafford
Josh Yarbrough

Give Us a Call

(901) 475-0275
61 Atoka-McLaughlin Dr.
Atoka, TN 38004

About SandStorm IT

SandStorm IT is a team of committed professionals who are dedicated and excited to solve your technology needs.  We accomplish this through understanding your business and then applying the appropriate technology solutions to meet the needs.

Our breadth of experience with information technology covers a range of diverse skill sets such as server setup and configuration, network and firewall solutions, VoIP telephone systems, web and database hosting, custom web application programming, mobile development, and IT security practices and policies.

SandStorm IT has the desire, expertise, and commitment to bring your vision to life.

  • Services
  • Technologies
  • Pricing
  • Work
  • About
  • Blog
  • Contact
  • Help Me
Authorized Solution Provider