Blog

Manufacturers concerned about PC shortage

The world’s largest computer manufacturers are growing concerned about the shortage of computer chips. Even though the issue was reported back in September 2018, Intel is still having trouble meeting the demand. So, what’s the cause of the major PC shortage and what does it mean for businesses? Reasons for the shortage There are many […]

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]

RESULTS Technology partners with Imaging Concepts to expand professional services

LENEXA, KAN., FEBRUARY 8, 2019 – RESULTS Technology, the award-winning technology services firm specializing in the IT compliance industry and headquartered in Kansas City, announced today that they will be partnering with Imaging Concepts, a family owned and operated provider of copiers, scanners and multi-functional printers (MFP) in the Kansas City metro area.

Get rid of Windows 10 bloatware

cyber security

Who doesn’t love getting value-for-money deals? Normally, getting more for less is an amazing deal — unless what you get is “bloatware.” It is software that device manufacturers pre-install in your Windows 10 PC or laptop at the behest of deep-pocketed software companies. Beyond taking up storage space and using up processing power, this type […]

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Quick facts about virtualization and the cloud

Cloud Computing

Virtualization and cloud computing are sometimes mistaken as one and the same, causing much confusion. For the record, virtualization is different from cloud computing, but these two technologies usually overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, […]

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works. What is SSO? Single Sign-On […]

Boost mobile security with virtualization

Mobile device security is paramount in today’s IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from the office, but there is one solution we recommend considering: combining mobile security efforts with virtualization technology. Mobile device management and virtualization Mobile device management (MDM) is about controlling how […]

Benefits of using a VPN

VPN Cyber Security

VPNs are now a vital component of cybersecurity. While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one […]

PHI security best practices

PCI Compliance and Security

Healthcare companies and the vast amount of valuable patient information they hold have become a major target of cyberattacks. Hospitals must combat this with a highly trained team of technicians equipped with the following technologies and security tools. Strict access policies To control access to protected health information (PHI), your IT department must introduce access […]