SandStorm IT

Latest Posts from Our Blog

Ransomware

Ransomware – What To Do If You Are Infected

By SandStorm IT | October 20, 2020
Categories: , , ,

Ransomware still remains one of the most notorious forms of malicious attacks out on the internet, and won’t be going away any time soon. It now takes very little effort for someone to make their own Ransomware variant, as evident by all the new strains popping up every day. With so many variations, what steps…

Read More
What is the Internet of Things (IoT)

What is the Internet of Things (IoT)?

By SandStorm IT | September 8, 2020
Categories: ,

Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? (You are here) Part 2 – Why do I care about IoT? Part 3 – What are some real-world applications of IoT? Part…

Read More
Denial of Service Attack

What is a Denial of Service Attack?

By SandStorm IT | September 1, 2020
Categories: , ,

A Denial of Service (DoS) attack is an attack on an individual computer or network that aims to consume as many resources as possible. The main goal of this attack is to deny service to the legitimate users of the computer or network. There are a number of ways in which this can be accomplished,…

Read More
Google Search Tricks

5 More Google Search Tricks You May Not Know

By SandStorm IT | August 25, 2020
Categories: , ,

As mentioned in Part 1 of this series, we could provide you with hundreds of Google tips instead of just five, so here are five more to get the most out of Google, the most popular site on the Internet (Source: alexa.com). Get More Relevant Search Results When you search for multiple words, oftentimes Google…

Read More
What is HIPAA compliance?

What is HIPAA compliance?

By SandStorm IT | August 11, 2020
Categories: , ,

What is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996 that was enacted by Congress and signed into law in 1996.  There are many provisions to HIPAA covering many items mostly dealing with health insurance and regulations on what can be offered and how. Additionally, HIPAA also details regulations about a…

Read More
Managed Anti-Virus/Anti-Malware

Why is Patch Management Important For Cyber Security?

By SandStorm IT | July 14, 2020
Categories: , , , ,

Before we jump into why patch management is important, we should define what patches are and what patch management is. What are patches? Patches are software code fixes that repair broken functionality, add new functionality, or fixes security holes in software.  Patches have been around a long time.  You’ve likely been patching Windows workstations going…

Read More
endpoint Malware protection

Do I still need endpoint Malware protection?

By SandStorm IT | June 22, 2020
Categories: , , , , , ,

If you’ve used a computer anytime over the past 20 years, you’ve probably been infected by a virus, malware, or some other malicious piece of software.  You may have been lucky and been able to get it cleaned off without much trouble or maybe you weren’t so lucky and lost data.  Think about today, what…

Read More
Starting Out Programming

5 Things You Should Know If You’re Starting Out Programming

By SandStorm IT | June 8, 2020
Categories: , ,

Programming. To some, it’s an art where, with a few (thousand) keystrokes, magic can happen. To others, it’s a job that can pay lots of money. Many call it the future, with hundreds of programs and gizmos designed to teach programming to children and thousands of people seeking retraining or education to enter the field.…

Read More
Cybersecurity Awareness

What is Cybersecurity Awareness and How does it affect my business?

By SandStorm IT | May 25, 2020
Categories: ,

As a busy parent, professional or retiree, we all take security seriously in some respects. How many of us leave our homes without closing or locking the door? How many of us leave our keys in the car when visiting a restaurant? I suspect the number of people who take such a relaxed approach to…

Read More
Data Hashing and Encryption

Data Hashing and Encryption and How They Enhance Security

By SandStorm IT | May 11, 2020
Categories: , , ,

Data Hashing. Encryption. These are words that one hears all the time about the topic of security. Sometimes, they are used interchangeably when they are different things despite both being critical to security. In this blog post, we will explain both and also explain how they can be used in conjunction to achieve a higher…

Read More

Connect w/ Us:

Subscription