TopTop

IT Security

All
  • All
  • Burgess Technology Blog
  • IT Consulting
  • IT Security
  • IT Services
  • Latest IT News
  • Office, Email, & Web Hosting
server 2003

Still using Microsoft Server 2003? Read this!

The Problem Microsoft has announced that they are ending support for Server 2003 in July, 2015.  This means that as of this date, Microsoft will stop releasing security updates and non-security hotfixes for any servers running Server 2003, leaving your systems vulnerable to possible security attacks and without support for mission-critical systems. The reason for the Continue Reading

Support Ended for Windows XP

Microsoft ended support for Windows XP on April 8, 2014. If you are still running Windows XP, you will no longer receive any new security updates or non-security hotfixes.  However, it’s not too late to do something about this.  We highly recommend that anyone running Windows XP migrate to a newer version of Windows that Continue Reading

male hands working with laptop computer

Designing, Upgrading or Replacing a Network – What to Consider

In designing, upgrading or replacing a network, there are multiple options and combinations that can be used. The choice can depend on several factors, including an organization’s requirements, budget and other considerations. Below we’ve provided a brief overview of 3 different network options, along with some advantages and disadvantages of each. A. Network is all Continue Reading

internet explorer vulnerability

Microsoft Warning for Internet Explorer Users

Over the weekend, Microsoft issued a security advisory to inform users of a vulnerability found in their popular browser, Internet Explorer.  The vulnerability leaves end users open to being “hacked” when visiting certain websites. (Please note: if you are using Firefox or Google Chrome, you are not affected by this) “The cybercriminals are using a malicious link Continue Reading

Your Business and HeartBleed – What to Know

The recent media coverage of the HeartBleed vulnerability has caused legitimate concerns by our clients. Now that we have clearer information on the HeartBleed vulnerability, we are recommending businesses perform a series of basic steps to identify and correct any potential risks; External Vulnerability – we recommend external vulnerability tests be performed, specifically testing for the Continue Reading

heartbleed

The Heartbleed Bug and How it Affects You

If you’ve spent any time online over the past few days, you’ve undoubtedly heard about the Heartbleed bug, a security vulnerability that was announced in OpenSSL earlier this week.  It has sent many tech companies such as Google, Yahoo & Tumblr scrambling to install patches and ensure that they are doing all they can to Continue Reading

Microsoft Phone Call Scam

We have seen an increase in this scam lately.  Please hang up if anyone claiming to be from Microsoft calls you and wants access to your computer.  Microsoft will NEVER contact you in this manner.  Cyber-criminals are trying to steal personal bank and credit card information from you or install software on your computer that will Continue Reading

208

IT Audits – What and Why

Information technology audits are conducted to review the controls within an IT infrastructure, and determine if there are any weaknesses in technologies, practices, management and other key areas. They include analyzing such areas as: network security how data integrity is maintained software and applications, and efficiency of operations In particular, information security is often the primary purpose Continue Reading

green computing

Duratherm ‘s Green IT Efforts

To improve the energy efficiency of the IT side of their operation, we worked with Duratherm to specify and replace three aging servers with one Energy Star qualified server.