IT News

Does Your ISP Provided Firewall Contain a Hidden Backdoor?

One thing we always advise our clients to do is to procure their own firewall.  In fact, we’ve written an entire blog post about different types of firewalls.  Our reasoning for suggesting having your own firewall is that your internet provider doesn’t always take the security precautions they should on their devices, such as changing default passwords.  Also, if you use the ISP supplied device, they have been known to change settings, without telling you, which can mess up your network. Arris, a popular manufacturer of modems for ISPs, was in the news in 2015 for some significant security issues.  Back then they were hammered for backdoors in their line of cable modems.  These backdoors would allow people into the modem to do things like … change your DNS settings.  This may not sound like a big deal, but by changing your DNS settings, they can control where you actually go when you type in a website such as google.com.   So instead of going to google.com you actually end up going to some really bad site they control that downloads malware to your computer.  This flaw dated back to 2009, Arris just never fixed it. So last month, researchers found three different hard-coded backdoors in two of their modem/wireless devices that service DSL customers.  Models NVG589 and NVG599 are the ones affected.  If you have internet service from AT&T, or another phone company, it is quite possible you have one of these models.  The issues they have would allow a remote user to access the device and do what they want.  Since these are wireless models, and not just... read more

Software Licensing – If You Can’t Prove It, You Don’t Own It – Part 1 – The Basics

Do you ever have lingering suspicions that your software may not be licensed correctly? Do you know what CALs are and do you have the right ones to go with your server? Have you licensed all the processors in your server? Did you know that you can be audited to verify the software you have is authorized appropriately, and fined if it isn’t? In this multi-part post we’ll tackle all of this. Read on for more.

read more

Virtual What?

You might have heard about something in IT called virtualization. You might have even been told about how it is the greatest thing since sliced bread and it will change the way EVERYTHING is done on computers. We’re going to take some time here to talk about virtualization, where it came from, where it is going, and how it is likely to impact you as a consumer or business owner.

read more

Back It Up!  Back It Up!

In this post we examine backing up your data, the whys and wherefores. This is the fifth of a five part series examining simple ways to protect your data from data breach and data loss, all without costing an arm and a leg. These posts come from material that we present in our “Protecting Your Data” seminar for businesses. The presentation also has 1 hour of CLE credit from the Alabama Bar Association. Contact us to schedule a presentation or to find out when one is being offered.

read more

Encryption – Not Just For Big Business

This is the fourth in a five part series examining simple ways to protect your data from data breach and data loss, all without costing an arm and a leg. These posts come from material that we present in our “Protecting Your Data” seminar for businesses. The presentation also has 1 hour of CLE credit from the Alabama Bar Association. Contact us to schedule a presentation or to find out when one is being offered.

read more
Get our updates by email!

Get our updates by email!

Sign up for monthly updates and maybe even a special treat from time to time. We are IT guys who hate spam so we promise it won't be often.