Tahoe Tech Group Blog

Tahoe Tech Group has been serving the Tahoe Vista area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Massive Healthcare Provider Anthem Hacked: How to Protect Yourself

b2ap3_thumbnail_it_health_security_400.jpgProbably one of the more dangerous hacks so far in 2015, healthcare-provider Anthem has been breached by hackers and its data accessed. The breach may have provided the hackers with up to 80 million sensitive customer records, including Social Security numbers, dates of birth, and much, much more.

Continue reading
0 Comments

All You Need is Love... and a Network Security Solution

b2ap3_thumbnail_all_you_need_is_love_400.jpgHave you tried online dating? There are many happy couples who attribute their love to the matchmaking algorithm of an online website. Internet dating is a legitimate option for modern singles, but like most good things on the web, naive users run a risk of getting scammed.

Continue reading
0 Comments

Tip of the Week: 4 Android Device Lock Settings

b2ap3_thumbnail_android_security_400.jpgThe busy business owner keeps sensitive work-related information stored on their mobile device. If he lost the device, it could have disastrous results, especially if the device were to fall into the hands of an experienced hacker or competitor. Just in case, it’s a best practice to always lock your mobile devices. How do you choose the Android lock feature which is right for your unique needs?

Continue reading
0 Comments

Even the 911 Address Database Can Get Hacked

b2ap3_thumbnail_911_gets_hacked_400.jpgPeople dial 911 when they’re in some sort of trouble or in the event of an emergency. If not for the hotline, who knows how many lives could be lost daily. Sometimes, however, help doesn’t come, even when dispatchers have received the call and responded. This generally isn’t the fault of the dispatchers, but rather the criminals who have undermined the rescue efforts thanks to some unorthodox hacking.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even North Lake Tahoe and Truckee small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Recent Comments

Microsoft PowerPoint is Useful, but Not In the Courtroom
23 December 2016
People make slides in the Microsoft Powerpoint and i am very much inspired by this feature of MS Pow...
Deflating Misconceptions Businesses Have for Cloud Computing
08 December 2016
When a person see the sign of cloud it feel that the data and the backup is secure or much better th...
Ghost Servers - Who Ya Gonna Call?
08 December 2016
Oh my god! It is such a hilarious thing that people are now installing ghost server to hack the PC’s...
5 Tips for Saving Money on your IT
25 October 2016
Wonderful post and you share excellent content in this post i am happy to comment on this Online Fa...