IT and Business Insights for SMB Solution Providers

Blog Entries

September 16th, 2018 | Karl Palachuk | Small Biz Thoughts
Last time (see Part One) I mentioned that you should create job descriptions that encourage the habits that allow people to excel and enjoy their jobs. People seek challenges. And they excel when the challenges have clear goals and good feedback mechanisms.This SOP on employee reviews gives a good - Read More
 
September 16th, 2018 | Karl Palachuk | Small Biz Thoughts
Let me just start by stating that you can't make other people happy. Trust me on this. I've spent far too much of my life learning that lesson.Having said that, there's a lot you can do as an owner or manager to create a workplace that supports your employees and lays the groundwork for what we - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Draft Cybersecurity Practice Guide SP 1800-14, Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation, is Available for Comment It is difficult to overstate the importance of the internet to modern business and society in general. The internet is not a - Read More
 
September 15th, 2018 | Karl Palachuk | Small Biz Thoughts
Just added a totally new SOP-related product to the Small Biz Thoughts Community: The Internet Domain Documentation Kit.One of the most important things you need to track for your clients is the information related to their Inter domain names. This is one of the most neglected - and most important - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Here are a group of articles on Mitigating Ransomware Using the Rapid Cyberattack Assessment Tool, by Microsoft.Every Question Tells a Story – Mitigating Ransomware Using the Rapid Cyberattack Assessment Tool: Part 1 Link is here Every Question Tells a Story – Mitigating Ransomware - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Here is a link to a video on Deep dive on Windows Server 2019 updates..Link is here - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
During the 26th DEFCON conference this past week McAfee researchers showed how they have successfully been able to falsify patient vitals that are reported to the central monitoring stations. Two variations of the attack are possible due to weak communication protocols between client devices and - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Researchers Eyal Itkin and Yaniv Balmas revealed a new type of vulnerability at Defcon 2018 – one which attacks your fax machine. They call this new exploit ‘Faxploit’ and demonstrated how a victim’s network could be infiltrated by sending a malicious fax to a certain model - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
The Apple AppStore is considered and recommended to be the best way to get programs for your Mac. After all, Apple states that“The safest placeto download apps for your Mac is the Mac App Store. Apple reviews each app before it’s accepted by the store...”. But what if one of the - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
In the last few years the price of 3D printers fit for home use has fallen substantially. They have become cheap enough for people without advanced technical skills, especially security skills to venture into this market area. By default, most of the current 3D printers require being tethered to a - Read More
 

Pages