TECH TO CATCH AND FLAG PHISHING LINKS IN EMAILS

Posted by Ashley Victoria Cannon on November 15, 2018
Read More

Tags: IT, tech, tehcnology, Phishing, Emails, Tech News, News, iPhone Update, Security Patches, security, cyber criminals, smartphone, launch, new, anti-virus, Security & Virus Protection, MetaCert, Beta, Link, Paul Walsh, iphone, Software

NYC & ARLINGTON TO BE THE NEW AMAZON HQ'S

Posted by Ashley Victoria Cannon on November 14, 2018
Read More

Tags: IT, tech, tehcnology, technology, News, Tech News, retail, Office Router, amazon, nyc, arlington, virginia, hq, duel hq, headquarters

IBM BUYING RED HAT FOR $34 BILLION

Posted by Ashley Victoria Cannon on November 1, 2018

 

Read More

Tags: IT, tech, tehcnology, technology, News, Tech News, Acquisition, Red Hat, IBM, Cloud Functions, Cloud, Cloud Computing, server

YAHOO'S $50 MILLION SETTLEMENT FOR PAST SECURITY BREACH

Posted by Ashley Victoria Cannon on October 24, 2018

 

Read More

Tags: IT, tech, Internet, Digital, tehcnology, data, technology, security, News, GDPR, Tech News, Updates, databreach, breach, Verizon, Verizon Oath, Oath, hack, attackers, data loss, hackers, Security & Virus Protection, Yahoo, Settlement

GOOGLE+ TO SHUT DOWN IN THE WAKE OF A SECURITY BREACH

Posted by Ashley Victoria Cannon on October 11, 2018

 

Read More

Tags: IT, tech, Internet, Digital, tehcnology, data, technology, Privacy Laws, security, Notifications, News, facebook, Security Patches, Data Regulation, GDPR, Tech News, Google Search, Gmail, Google Cloud, Google Launch, Google Duplex, Updates, databreach, breach, data loss, social media, Security & Virus Protection, Software, Social Platforms, Google Plus, Cambridge Analytica

GOOGLE TO ACCEPT CRYPTOCURRENCY ADVERTISING

Posted by Ashley Victoria Cannon on October 10, 2018

 

Read More

Tags: IT, tech, Digital, tehcnology, technology, News, Phone Number, ad, Advertising, cryptocurrency, Crypto, google, Digital Advertising, Tech News, ICO, CNBC, Hype

FACEBOOK USES YOUR 2FA PHONE NUMBER FOR AD TARGETING

Posted by Ashley Victoria Cannon on September 28, 2018

 

Read More

Tags: IT, tech, Internet, Digital, tehcnology, data, technology, Privacy Laws, security, Notifications, News, facebook, WhatsApp, Phone Number, Security Patches, Data Regulation, GDPR, ad

UBER AGREED TO PAY $148 MILLION IN DATA BREACH SETTLEMENT

Posted by Ashley Victoria Cannon on September 27, 2018

 

Read More

Tags: IT, tech, Internet, Digital, tehcnology, data, technology, Password, Privacy Laws, security, Notifications, News, Taxi, Ride Sharing, Uber, databreach, breach, FBI

CHROME 69'S FORCED LOGIN BREACHES USER PRIVACY

Posted by Ashley Victoria Cannon on September 25, 2018

 

Read More

Tags: IT, tech, Internet, Software, Digital, tehcnology, data, technology, Password, Google Launch, Updates, Privacy Laws, security, Chrome, google, new, launch, Chrome 69, Google Search, Gmail, Notifications, youtube

MICROSOFT VIRTUAL DESKTOP RUNS WINDOWS TEN IN THE CLOUD

Posted by Ashley Victoria Cannon on September 24, 2018
Read More

Tags: IT, tech, Internet, Software, Digital, tehcnology, data, technology, breach, databreach, Microsoft, free, new, launch, Windows 10, Windows 7, Virtual Desktop, Azure

USER PASSWORDS ARE RESET AFTER ADGUARD EXPERIENCES ACCOUNT BREACHES

Posted by Ashley Victoria Cannon on September 21, 2018
Read More

Tags: IT, tech, Internet, Software, Digital, tehcnology, data, technology, AdGuard, breach, databreach, Password, Username

GMAIL 'UNDO SEND' FEATURE FOR ANDROID

Posted by Ashley Victoria Cannon on August 21, 2018
Read More

Tags: IT, tech, Internet, Software, transform, Digital, device, computer, tehcnology, data, Updates, new, technology, update, launch, google, Google Cloud, Deploy, Android, Gmail

IOT MAKING HACKERS ATTACK SURFACE GREATER

Posted by Ashley Victoria Cannon on August 1, 2018
Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, new, AI, Bitcoins, IT Support, technology, update, launch, IoT, CPU, google, Google Cloud, Test, Deploy, App Engine, Cloud Functions, Continuous Integration, Continuous Delivery, Source Code, Siri, Security Patches, Internet of Things, router, Home Router, Data Regulation, Routers, alert, hack, security, databreach, two-factor authentication, cryptocurrencies, bitcoin, crime, breach, creditcard, data loss, blockchain, server, smartphone, notebook, cyber crime, hackers, ransomware, Security & Virus Protection, Fixes, Insider, PC, PC Issues, FBI, malware, anti-spam, anti-virus, passwords, firewall

TWO FACTOR AUTHENTICATION ISN'T ENOUGH ANYMORE

Posted by Ashley Victoria Cannon on July 27, 2018
Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, new, Bitcoins, IT Support, technology, google, iOS 12, Security Patches, hack, security, databreach, two-factor authentication, cyber criminals, cyber crime, data loss, iphone, facebook, social media, instagram

GOOGLE LAUNCHES CLOUD BUILD

Posted by Ashley Victoria Cannon on July 24, 2018
Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, new, AI, Bitcoins, IT Support, technology, update, launch, IoT, CPU, free, google, Google Cloud, Cloud Build, Vms, Serverless, Kubernetes, Firebase, Build, Test, Deploy, Workflow, App Engine, Kubernetes Engine, Cloud Functions, Spinnaker, Maven, Gradle, webpack, Go, Bazel, Managed, Continuous Integration, Continuous Delivery, Source Code

BLOCKCHAIN BANGING ON THE ENTERPRISE DOOR

Posted by Ashley Victoria Cannon on July 24, 2018
Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, new, AI, Bitcoins, IT Support, technology, update, launch, amazon, blockchain, security, Microsoft, IoT, Internet of Things, Oracle, IBM, SAP

TEASERS AND TESTING ON GOOGLE DUPLEX

Posted by Ashley Victoria Cannon on July 2, 2018

 

Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, google, Google Duplex, new, Google Launch, AI, Artificial Intelligence, Recurrent Neural Network, TensorFlow Extended, Booking, Sceduling

iOS 12 MEANS SMOOTH SAILING FOR YOUR CELL

Posted by Ashley Victoria Cannon on June 27, 2018

 

Read More

Tags: IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, Apple News, Apple Launch, iOS 12, iPhone Update, FaceTime, Group FaceTime, Animoji, Memoji, Bitmoji, Camera Effects, AR, ARKit 2, Augmented Reality, ScreenTime, Notifications, Do Not Disturb, Photo Sharing, Photo Search, Siri, Siri Shortcuts

BUSINESS EXPENSES SIMPLIFIED VIA LYFT

Posted by Ashley Victoria Cannon on June 22, 2018

 

Read More

Tags: IT Support, IT, tech, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, data, Updates, Lyft, Ride Share, Taxi, Business Expenses, Receipts, Uber

MICROSOFT ANNOUNCES NEW USER INTERFACE

Posted by Ashley Victoria Cannon on June 21, 2018

 

Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, bitcoin, Routers, Security Patches, Updates, IoT, Internet of Things

SECURITY PATCHES - THE TOP SECURITY THREAT THAT'S BEING IGNORED

Posted by Ashley Victoria Cannon on June 12, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, bitcoin, Routers, Security Patches, Updates, IoT, Internet of Things

US-CERT ALERT TA18-145A - CYBER ACTORS ARE ATTACKING HOME AND OFFICE ROUTERS WORLDWIDE

Posted by Ashley Victoria Cannon on May 29, 2018

 

Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, bitcoin, Routers, European Union, Home Router, Office Router, Small Business Router

FACEBOOK AND GOOGLE RECEIVE COMPLAINTS OVER GDPR

Posted by Ashley Victoria Cannon on May 25, 2018

 

Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, bitcoin, Routers, GDPR, General Data Protection Regulation, EU, European Union, Data Regulation, Privacy Laws

THEMOON BOTNET IS ATTACKING A ZERO-DAY VULNERABILITY IN GPON WIFI ROUTERS

Posted by Ashley Victoria Cannon on May 24, 2018

 

Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, GPU, CPU, TPT, TDT, APT, AMS, bitcoin, cryptocurrencies, blockchain, TheMoon, Mettle, Muhstik, Mirai, Hajime, Satori, Botnet, GPON, Routers

MICROSOFT'S SURFACE HUB 2 IS SERIOUSLY FUTURISTIC

Posted by Ashley Victoria Cannon on May 18, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, GPU, CPU, TPT, TDT, APT, AMS, bitcoin, cryptocurrencies, blockchain, Surface Hub, Surface Hub 2

COVEE IS CREATING COVETED COLLABORATION

Posted by Ashley Victoria Cannon on May 1, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, GPU, CPU, TPT, TDT, APT, AMS, bitcoin, cryptocurrencies, blockchain

UNITED STATES COMPUTER EMERGENCY READINESS TEAM LAUNCHES ALERT (TA18-106A)

Posted by Ashley Victoria Cannon on April 20, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, GPU, CPU, TPT, TDT, APT, AMS, alert

INTEL TO USE VIRUS SCANNING FOR BETTER FUNCTIONALITY AND BATTERY USAGE

Posted by Ashley Victoria Cannon on April 18, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack, Intel, Microsoft, GPU, CPU, TPT, TDT, APT, AMS

A FIREWALL IS CRUCIAL IN PROTECTING PRICELESS DATA

Posted by Ashley Victoria Cannon on April 12, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, Security & Virus Protection, security, hack

JOKERSTASH STRIKES AGAIN

Posted by Ashley Victoria Cannon on April 2, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, transform, Digital, infrastructure, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data, breach, creditcard, crime, databreach, debitcard, hudsonbaycompany, SaksFifthAvenue, Security & Virus Protection, security, hack, JokerStash, Fin7, LordAndTaylor

ZENIS RANSOMWARE TO LEAVE DATA BACKUPS ENCRYPTED

Posted by Ashley Victoria Cannon on March 26, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Internet, Software, typing, dna, plugin, free, transform, two-factor authentication, Digital, infrastructure, blockchain, WiFi, device, computer, tehcnology, code, anti-virus, FBI, Computer Fixes, PC Issues, Fixes, Insider, hackers, Bitcoins, cryptocurrency, attackers, cyber criminals, cyber crime, server, data loss, data

TYPINGDNA WILL REVOLUTIONIZE HOW TO SPOT A HACKER

Posted by Ashley Victoria Cannon on March 20, 2018
Read More

Tags: technology, malware, habits, IT Support, IT, tech, ransomware, Infographic, Internet, Software, typing, dna, plugin, free, transform, two-factor authentication

APPLE ACQUIRES MAGAZINE HUB, TEXTURE

Posted by Ashley Victoria Cannon on March 13, 2018
Read More

Tags: tehcnology, apple, meredith, time inc, conde nast, KKR, Hearst, Publishing, Media, Magazines, Newspapers, Digital, Newsstand, Hub, Apple News

RANSOMWARE: THE ACTUAL COST OF AN OUTAGE

Posted by Ashley Victoria Cannon on March 2, 2018
Read More

Tags: tehcnology, blockchain, Bitcoins, data, data loss, IT, ransomware, Internet, Security & Virus Protection, Hardware, Software, Fixes, Computer Fixes, PC Issues, Advice, malware, firewall, anti-virus, anti-spam, hackers, passwords, IT Support, FBI, msp, server, infrastructure, cyber crime, cyber criminals, attackers, cryptocurrency

QUALCOMM LAUNCHES WIFI CHIP SUITABLE FOR NEXT-GEN WIFI

Posted by Ashley Victoria Cannon on February 23, 2018
Read More

Tags: tehcnology, update, launch, new, IT, qualcomm, chip, device, WiFi, Internet, Ethernet, Bluetooth, tablet, laptop, notebook, smartphone, cellphone

GOOGLE CHROME'S AD BLOCKER GOES LIVE...TOMORROW

Posted by Ashley Victoria Cannon on February 14, 2018
Read More

Tags: tehcnology, update, launch, new, tech, IT, ipad, google, ads, ad, ublock, AdBlock, Chrome

HOW DOES APPLE'S HOMEPOD STACK UP TO THE COMPETITION

Posted by Ashley Victoria Cannon on February 8, 2018
Read More

Tags: tehcnology, update, launch, new, tech, IT, apple, iphone, ipad, homepod, smartspeaker, base, treble, tweeters, echo, amazon, googlehome, google

INTELS FORMER PRESIDENT RENEE JAMES FOUNDS AMPERE WITH THE HELP OF CARLYLE GROUP

Posted by Ashley Victoria Cannon on February 6, 2018

Read More

Tags: tehcnology, update, launch, new, tech, celeron, processor, IT, Hardware, Software, arm, Intel, Renee James, chip, CarlyleGroup

DELL'S NEW BABY - CHROMEBOOK 5190

Posted by Ashley Victoria Cannon on January 25, 2018

After a short reprieve, Technology Today is back and ready to roll! In our latest issue, we flush out the perks and pits of DELL's NEW Chromebook 5190

Read More

Tags: tehcnology, dell, update, tablet, laptop, launch, new, computer, chromebook, tech, celeron, processor, charging, IT, Hardware, Software

IS iPHONE X REALLY WORTH THE PRICE?

Posted by Ashley Victoria Cannon on January 16, 2018

Is Apple's NEWEST creation really worth the deep dive into your pocket? In Circulent's latest issue of Technology Today, we sift through the good, the bad and the techy tidbits. 

Read More

Tags: iphone, apple, cellphone, technology, update

WHAT YOU SHOULDN'T DO ON SOCIAL MEDIA

Posted by Ashley Victoria Cannon on January 10, 2018

 

Read More

Tags: facebook, instagram, youtube, social media, technology, twitter, passwords, hackers, tech

BLOCKCHAIN, BITCOIN, BIG DATA, IoT... OH MY!!

Posted by Ashley Victoria Cannon on January 4, 2018

 

Read More

NET NEUTRALITY NIXED

Posted by Ashley Victoria Cannon on December 15, 2017

In our LATEST issue of Technology Today, we sift through the good, the bad and the techy tidbits of the removal of Net Neutrality and what this really means for the American people.*

Read More

Tags: netneutrality, isp, fcc, congress, house, senate, republican, democrat, broadband, federal

LAYER® TECHNOLOGY IS GOING TO CHANGE THE WAY WE CHARGE OUR DEVICES

Posted by Ashley Victoria Cannon on December 15, 2017

In our LATEST issue of Technology Today, we sift through the good, the bad and the techy tidbits of the future's industry, tech! 

Read More

Tags: layer, solar, solarpanel, tech, future, custom, charging

TOP 5 TECH HABITS COMPANIES SHOULD ADOPT

Posted by Ashley Victoria Cannon on December 13, 2017

Are you trying to dodge shady tech thieves but falling short? In our latest roll out of Technology Today, we sift through the good, the bad and the techy tidbits! 

Read More

Tags: malware, tech, habits, technology, hackers, passwords, anti-virus, anti-spam, firewall, msp, Advice

HOW TO PROTECT YOURSELF FROM RANSOMWARE

Posted by Ashley Victoria Cannon on December 6, 2017
Read More

Tags: ransomware, tech, IT, FBI, IT Support, Bitcoins

THERE ARE FIXES TO THE ATTACK AGAINST WI-FI ENCRYPTION

Posted by Ashley Victoria Cannon on November 29, 2017

 

Read More

Boost Your Staff's Productivity with These 5 Tips

Posted by Ashley Victoria Cannon on August 24, 2017

Increasing employee productivity is a positive approach for companies, regardless of the industry; however, the concept can be rather vague. Productivity means more than just working to meet a given quality standard, therefore, it isn’t always immediately clear how to achieve optimum outcomes while maintaining standards and keeping your employees happy. Here are a few concrete methods that can help your staff be more productive:

Read More

Tags: Advice

Mobile Phone Security Tips

Posted by Ashley Victoria Cannon on August 23, 2017

We’ve all seen the stories about celebrities getting their mobile phones hacked and having their private photos splattered all over the web. 

Although you may think there is nothing of real interest on your phone, you are still at risk of security invasion. Any number of people could have motives to harm you, from ex-es to a colleague who perceives you as a threat. Even innocuous content on your phone can be taken out of context to reflect negatively on you in general or be manipulated.  

Use some of these simple tips to protect your mobile phone and reputation:

Passwords - Your passwords are your primary defense against would-be hackers – from your lock code to email account password. Don't share your passwords with others.

Also, make sure your passwords aren’t easily guessed, such as your pet’s name or child’s birthday.  A secure password may not be as easily remembered, but it is far harder to hack. Finally, shield your phone’s screen with your hand or body when entering passwords in public lest onlookers take note of which buttons you push.

Clear Out the Cobwebs – In addition to creating more storage space on your mobile phone, it is just wise to remove old text conversations, photos, and other data periodically. Back up the things you want to keep onto other devices, so you can access them later. With all of the excess stuff you don’t use on a regular basis gone, you leave less for hackers to work with if the security of your mobile phone is breached. In the event of being hacked, you would also likely lose all of those things, so backing such info up protects you twofold.

Beef Up Security – Take advantage of the lesser-known security features of your mobile phone. For example, turn off the Discoverable mode on your Bluetooth. Look on your phone under Security to see if there are free, included options, such as an automatic lock screen that activates after a certain period of inactivity.

There are also applications you can download to increase the level of security on your phone, including apps that allow you to access and control your phone remotely in the case of loss or theft. Our company provides an option for businesses that not only allows mobile lock and/or wipe of a lost phone, but restrictions on what apps can be installed. For more advice on ways to boost your staff's productivity, check out our blog post.

 

Read More

Tags: Advice, Security & Virus Protection

Infographic - 10 Reasons to Outsource Your IT

Posted by Ashley Victoria Cannon on August 21, 2017

 

Read More

Tags: Advice, Insider, Infographic

TECHNOLOGY TODAY 

Technology Today is Circulent's weekly tech blog 

We sift through the good, the bad and the techy tid-bits of all things tech! 

Be sure to tune-in weekly for 

  • The latest trends 
  • Product launches
  • Acquisitions 
  • How-to's/To-do's 
  • And much, much more...

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all