You are browsing the web, minding your own business, when suddenly a screen like the following pops up: You find yourself unable to open anything else or even close the Window. Clicking on “OK” does nothing and, sometimes, you even hear a voice from your speakers telling you that your computer is … Read More
What are some real-world applications of IoT?
Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? (You are here) Part 4 - What … Read More
Are you still running your business on spreadsheets?
Are you using spreadsheets to run your business? Frequently, we are consulted to improve upon business processes with automation and integration through custom software only to find out they are running everything from accounting, payroll, inventory management, BI reporting, daily diaries, and … Read More
Wireless Access Points versus Wireless Network Repeaters
When building an extended Wi-Fi network, there are two methods to extend coverage to areas with poor signal quality: Wireless Access Points and Wireless Network Repeaters (also called Wireless Network Extenders by some manufacturers). In this post, we'll cover exactly what each device is and how … Read More
Ransomware – What To Do If You Are Infected
Ransomware still remains one of the most notorious forms of malicious attacks out on the internet, and won’t be going away any time soon. It now takes very little effort for someone to make their own Ransomware variant, as evident by all the new strains popping up every day. With so many variations, … Read More
What is HIPAA compliance?
What is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996 that was enacted by Congress and signed into law in 1996. There are many provisions to HIPAA covering many items mostly dealing with health insurance and regulations on what can be offered and how. … Read More
Why is Patch Management Important For Cyber Security?
Before we jump into why patch management is important, we should define what patches are and what patch management is. What are patches? Patches are software code fixes that repair broken functionality, add new functionality, or fixes security holes in software. Patches have been around a long … Read More
Do I still need endpoint Malware protection?
If you've used a computer anytime over the past 20 years, you've probably been infected by a virus, malware, or some other malicious piece of software. You may have been lucky and been able to get it cleaned off without much trouble or maybe you weren't so lucky and lost data. Think about today, … Read More
What you need to know about Data Encryption?
You may have come across the word encryption recently in the news. It’s becoming a bit of a hot topic in the media as more and more eyes shift to covering the ever expanding world of computer crime. Governments are focusing on it to try and gain the ability to decrypt files when necessary, and … Read More
Are you protecting your employees’ information?
This blog post was inspired by some recent news I heard about a company some of my friends work for. They just had an incident where someone spoofed the email address of an executive in the company and all of the employees’ W-2s were emailed to an unknown party. All of the people that work … Read More
- 1
- 2
- 3
- 4
- Next Page »