888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Data Safe

Tip of the Week: 5 Ways to Keep Your Data Safe

The basics are called “the basics” because they are the information you need to know first before you can get a genuine understanding of any concept. In many ways, the basics of network security are extremely important and cannot be ignored. Here are five basic ways you can keep your devices as secure as possible.

0 Comments
Continue reading

Do Browser-Saved Passwords Stay Secure?

Do Browser-Saved Passwords Stay Secure?

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

Intro to Your Tech: Authentication

Intro to Your Tech: Authentication

Authentication is something that even the everyday user of a computer might encounter in different ways. Take, for example, identity authentication. You can use a driver’s license, library card, or even a PIN number. Computers use authentication as a part of their main primary functionality, and it mostly comes in the form of passwords and usernames. We’ll take a closer look into what authentication is and what it does.

0 Comments
Continue reading

DoD Supply Chain – THE DEADLINE DELAY IS OVER FOR CYBERSECURITY PREPAREDNESS

Sharing this great blog article by Brian Berger – Executive Vice President of Cytellix Cybersecurity The deadline for the supply chain to meet compliance with NIST SP 800-171 under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was December 31, 2017. As we are all aware, the enforcement and teeth of this deadline was deferred until NOW. By the end of August 2018, all contractors who have been awarded contracts to provide products or services which requires the use of Controlled Unclassified Information (CUI), will be put on notice that enforcement will begin with the new government fiscal year starting October 1, 2018. The obligation of proof is placed upon the supplier, their suppliers and their suppliers.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Cybersecurity Hackers Communications Internet Network Security Tech Term Ransomware Backup VoIP Passwords Productivity Software Alert Smartphones Outsourced IT IT Support Business Management Social Media Save Money Hosted Solutions Microsoft Data Phishing User Tips Business Google Hardware Email Communication Small Business Data Recovery Cloud Computing Smartphone Microsoft Office Browser Data Breach Vulnerability IT Services Android Network App Data Backup Bandwidth Twitter Windows 10 Efficiency Internet of Things Computer Business Continuity Compliance BDR Apps Law Enforcement Productivity Mobile Device Blockchain Patch Management Workers Innovation Collaboration Office 365 Settings Employer-Employee Relationship Miscellaneous Remote Monitoring Scam Excel Saving Money Company Culture Cybercrime Politics Government Mobile Device Management Access Control Word Wi-Fi Windows Virtual Assistant How To Applications Facebook Entertainment Recovery Antivirus Maintenance Password Retail Holiday Users Office Website Computers Education Personal Information Automation Managed IT Service Vendor Management Spam Dark Web Networking Managing Stress Chrome SaaS Virus IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Mobile Devices Remote Monitoring and Management Two-factor Authentication Authorization Dongle Worker Apple Edge Threat IaaS Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Storage Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone HaaS Data loss Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Error Streaming Media Marketing Travel Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Cleaning Printers Gadgets Budget Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Downloads Live Streaming Reporting Tablet Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics BYOD Artificial Intelligence Trends WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Authentication Wireless Processors Digital Internet Explorer Analytics Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal GDPR Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Quick Tips Remote Computing Samsung Wireless Technology 5G Money Laptop Printing Conferencing Unified Communications IBM Network Attached Storage Managed IT Services Hacker eCommerce Operating System Telecommuting Paper Competition Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Ink Millennials Fun Customer Service Mobile Office Upgrade Google Drive IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning

Newsletter Sign Up