Need some suppport?
close
Spectre and Meltdown

publish date: January 25, 2018

// Spectre and Meltdown

As has been reported extensively in the media, on January 3, 2018, the National Cybersecurity and Communications Integration Center (NCCIC) became aware of a set of security vulnerabilities – known as Meltdown and Spectre – that affect modern computer processors. Exploitation of these vulnerabilities could allow an attacker to obtain access to sensitive information.

read more

Disaster Preparedness

publish date: November 16, 2017

// Disaster Preparedness

I was visiting with an attorney friend the other day and he remarked that he likes to remind his clients to always be asking themselves the “what if” question.  What if something happened to their business?  What if there was natural disaster; or a man-made disaster; or really any drastic change affecting their company’s ability to conduct business as usual?  I thought this was very good advice and worth sharing.  When you are looking to the future of your business, giving thoughtful consideration to various risks and planning in advance how to respond to them could mean the difference between success and failure. 

read more

Information on the KRACK vulnerability

publish date: October 27, 2017

// Information on the KRACK vulnerability

As you may have seen in the news, a widespread vulnerability in Wi-Fi networks was revealed last Monday.  This vulnerability allows hackers to decrypt and potentially see what people are doing online.  The reason this security vulnerability is so worrying, and why it has drawn so much interest, is that most people want to assume that their local Wi-Fi network is a trusted environment.

read more

Encrypted Email: What It Is and Why You Need It

publish date: August 9, 2017

// Encrypted Email: What It Is and Why You Need It

Encrypting email is ensuring that the information you send is only available to you and the person you are sending it to. Unprotected data is particularly vulnerable when it is in transit between email servers. Those with malicious intent often see the time when data is being transferred as a prime opportunity to attempt a hack. When you encrypt your email, you are protecting things like passwords and personal information from third-party access.

read more

A Note on the Recent Cyber-Attack

publish date: June 14, 2017

// A Note on the Recent Cyber-Attack

You’ve probably recently heard about the cyber-attack that was executed on an unprecedented scale. The attack was executed globally with more than 150 countries affected; companies of all sizes and various government agencies were targeted. Known as “WannaCry”, this ransomware gains access into the computer, encrypts data, and locks the user out until a ransom has been paid.

read more

How to Know it's Time for a New Website

publish date: April 19, 2017

// How to Know it's Time for a New Website

There are several signs to indicate that a website needs to be updated. Outdated design and functionality are a classic sign because it’s easy to notice the pain and hassle of trying to navigate a site that wasn’t designed for modern browsing. The thing is, our detection system sometimes turns a blind eye when it comes to our own sites. Apply these three areas of inspection to your own site and see where yours stands.

read more

Office 365: What You Need to Know

publish date: March 13, 2017

// Office 365: What You Need to Know

Office 365 is the latest in the modern push for services that allow businesses and individuals alike to take advantage of having enterprise level software at a fixed monthly fee. If you are new to Office 365 or are thinking about whether it is right for you, there are a few defining aspects of the new software that you should know.

read more

4 Tech Trends that Will Shape Small Business in 2017

publish date: February 10, 2017

// 4 Tech Trends that Will Shape Small Business in 2017

A new year always has the tendency for bringing new changes to businesses large and small. Both internally and externally, companies must evolve to continually compete with the ever growing competitive landscape.  For small businesses, technology is bringing some key trends that could potentially change the way we do business.  These four are key areas you should pay attention to in 2017 as small business is increasingly utilizing them all to become more adept in the modern world.

read more

5 Ways to Increase Your Security This Online Shopping Season

publish date: November 18, 2016

// 5 Ways to Increase Your Security This Online Shopping Season

The holiday season marks a time of the year known for joyous times with friends and family. Unfortunately, with the ever increasing shift towards online shopping, the holidays also represent a time of great risk; especially when buying gifts for loved ones. These tips offer a great start to decreasing your chance to falling victim.

read more

3 Reasons Your Next Budget Should Include Updating Tech

publish date: October 19, 2016

// 3 Reasons Your Next Budget Should Include Updating Tech

The time of the year has come again for many businesses. The time for budgeting. Budgets can often create headaches for those who decide where the dollars go. With all the different matters pressing, many times there are opportunities missed. One such instance is an aspect of a business that’s often overlooked, but no less important; your hardware and software technology.

read more

RSS
1234

// Recent Posts

Need technical help now?

If you need technical help immediately, call us at 308.237.0684 or 877.501.DESK, option 1.

Contact Us

Intellicom
1700 2nd Avenue
Kearney, NE 68847

308.237.0684
inquiry@intellicominc.com
support@intellicominc.com