SandStorm IT

Power On

  • Services
    • Managed IT Services
    • Servers & Networks
    • Business Computers & Support
    • Cloud Services & Data Backup
    • Custom Software Development
    • VoIP Telephone Solutions
    • Custom Web Design
    • Disaster Recovery Solutions
    • Security & Compliance
    • IT Consulting
  • Technologies
  • Pricing
  • Work
  • About
    • Our History
    • Our Team
    • Careers
    • Press
  • Blog
  • Contact
    • (901) 475-0275
  • Help Me

What is Hardware/Uptime Monitoring?

April 20, 2021 By Robert Cleveland

Hardware monitoring is a feature of the motherboard, sometimes as a separate chip on the motherboard, that monitors different aspects of the system. for potential issues. It can measure variables such as the output voltage of the power supply, the speed of the fans that are connected directly to the … Read More

Categories: Backups & Business Continuity, Business, Cybersecurity, Managed Services

Why is phishing still the most common cyber-attack?

March 30, 2021 By Josh Yarbrough

What is phishing? Phishing.org defines phishing as "A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and … Read More

Categories: Cybersecurity, Networking, Personal Computing, Social Engineering/Phishing

5 Things You Can Do To Make Your Wi-Fi More Secure

March 23, 2021 By SandStorm IT

2021Why is Wi-Fi security so important? Wi-Fi is a point of entry that attackers can use to gain access to your network without ever being physically inside your building. In this post, we'll be going over a few things you can do to lock down your Wi-Fi for a more secure network. The best part is: … Read More

Categories: 5G & Mobile Networking, Cybersecurity, Internet of Things (IoT), Networking, Wired Networking, Wireless/Wi-Fi

Office 365 Phishing Attacks On the Rise

March 2, 2021 By Justin Oliver

Recently, we have seen a dramatic increase in the amount of phishing cyber-attacks aimed at Office 365 users.  It's so bad that almost three quarters (71.4 percent) of corporate Office 365 users have at least one compromised account each month, according to a report by Skyhigh Networks.  If you are … Read More

Categories: Cybersecurity, Social Engineering/Phishing

Guide to PCI DSS – Part 2: Building and Maintaining a Secure Network

February 23, 2021 By Justin Oliver

Welcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we'll cover what PCI DSS is and the various requirements: Part 1 - What is PCI DSS? Part 2- Building and Maintaining a Secure Network Part 3 - Protecting Data (Coming … Read More

Categories: Business, Cybersecurity

Common Browser-based Network Attacks and How to Avoid Them

February 16, 2021 By Jordan B. Sanders

Day by day, we do more and more through our web browsers.  We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same … Read More

Categories: Cybersecurity, Networking, Personal Computing, Software & Applications

How to Spot Fake Virus Warnings

January 26, 2021 By SandStorm IT

You are browsing the web, minding your own business, when suddenly a screen like the following pops up: You find yourself unable to open anything else or even close the Window. Clicking on “OK” does nothing and, sometimes, you even hear a voice from your speakers telling you that your computer is … Read More

Categories: Cybersecurity, Desktop Software, Email Software and Applications, Networking, Personal Computing, Social Engineering/Phishing, Spyware/Malware/Viruses

What are the security concerns of IoT?

January 12, 2021 By Jacob Ellis

Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More

Categories: Cloud/Serverless Computing, Cybersecurity, Internet of Things (IoT), Networking, Servers, Wireless/Wi-Fi

How to Win The War Against Spam!

January 5, 2021 By Josh Yarbrough

What is SPAM? SPAM is junk mail that you receive that you didn't sign up for. The Merriam-Webster dictionary defines it as "unsolicited usually commercial messages (such as e-mails, text messages, or Internet postings) sent to a large number of recipients or posted in a large number of places". And … Read More

Categories: Cybersecurity, Email Software and Applications, Personal Computing, Tips/Tricks/Shortcuts

How does the latest Windows Update that removes Adobe Flash Player affect me?

November 10, 2020 By John Hammett

Adobe Flash, originally released by Macromedia in 1995, is a once widely used and vastly capable web application platform.  In 2005 Flash player was installed on more devices than any other internet-based media application, including Java, Quicktime, and Windows Media Player.  Flash media player … Read More

Categories: Business, Cybersecurity, Desktop Software, Security Alerts & Vulnerabilities

  • 1
  • 2
  • 3
  • …
  • 7
  • Next Page »

Subscribe to Our Newsletter

Check your inbox or spam folder now to confirm your subscription.

SANDSTORM IT BLOG

Featured
News
Press Releases
SandStorm News
Security Alerts & Vulnerabilities
Managed Services
Managed Anti-Virus/Anti-Malware
Managed Backups & Monitoring
Updates/Patches
Passwords
Cybersecurity
Spyware/Malware/Viruses
Social Engineering/Phishing
Ransomware
Data Breaches/Leaks
Other
Servers
Server & Server Hardware
Cloud/Serverless Computing
Server Operating Systems
Networking
Wired Networking
Wireless/Wi-Fi
Internet of Things (IoT)
5G & Mobile Networking
Business
General Business
Enterprise Resource Planning (ERP)
Voice & Telephony
Backups & Business Continuity
On-Site Backups
Cloud Backups
DR/BCM Planning & Consulting
Personal Computing
Tips/Tricks/Shortcuts
Troubleshooting
Hardware & Peripherals
Desktop Operating Systems
Software & Applications
Office Applications
Desktop Software
Email Software and Applications

Authors

Authors
Doyle Sanders
Jake Sanders
Jordan Sanders
Justin Oliver
Matt Ballard
Robert Cleveland
Cristian Colón
Jacob Ellis
Jeff Fowler
Miker Irick
Curtis Mayo
Josh Restuccio
Lindsey Sanders
Matthew Stafford
Josh Yarbrough

Give Us a Call

(901) 475-0275
61 Atoka-McLaughlin Dr.
Atoka, TN 38004

About SandStorm IT

SandStorm IT is a team of committed professionals who are dedicated and excited to solve your technology needs.  We accomplish this through understanding your business and then applying the appropriate technology solutions to meet the needs.

Our breadth of experience with information technology covers a range of diverse skill sets such as server setup and configuration, network and firewall solutions, VoIP telephone systems, web and database hosting, custom web application programming, mobile development, and IT security practices and policies.

SandStorm IT has the desire, expertise, and commitment to bring your vision to life.

  • Services
  • Technologies
  • Pricing
  • Work
  • About
  • Blog
  • Contact
  • Help Me
Authorized Solution Provider