Blogs

Cody Clay and Hunter Prather teach coding to kids
Cody Clay and Hunter Prather

From June 19th to 23rd, Advantage Technology’s Cody Clay and Hunter Prather taught game design at BridgeValley CTC’s STEAM Academy in South Charleston. STEAM Academy is a week-long day camp for children going into the 5th through 10th grades hosted at the Advanced Technology Center at BridgeValley CTC. STEAM focuses on science and math education with the addition of the arts to help round out the student’s educational palette.

Women and Technology Conference
Women and Technology

Advantage Technology was pleased to have almost all of our incredible women attend the Charleston Area Alliance Elevations Professional Women’s Luncheon on June 26th at Embassy Suites, as part of the greater Women & Technology conference hosted by TechConnectWV. As the room was filling, I reflected upon the solid representation of women at our company and the contrast with industry standards. We all have a unique history and serve vastly different, but crucial roles at Advantage Technology.

Learning more about the government's rigorous cyber security standards

Two Advantage Technology professionals recently returned from the preeminent event for training, education and workforce development for protecting the country’s infrastructure from cyber threats.

The National Cyber Summit took place in early June in Huntsville, Ala. The annual event attracts commercial and defense companies as well as healthcare, automotive and energy industries and academia. It was sponsored by Information Systems Security Association.

Randy Ross and Rob Dixon from Advantage Technology were on hand to learn and to network with other providers.

The Technology Buying Cycle: How Often Should Your Business Update Its Technology?
Technology Buying Cycle

In order for a business to operate at the highest and most effective level, companies must repeatedly reexamine their sense of purpose and make sure the organization serves it well. Possessing such a strong sense of purpose needs constant support from its employees, and those employees need tools to serve that purpose. Providing the right technology tools for employees and management is one of the most important aspects of a successful business.

Use the Snipping Tool to capture screenshots

How often does it happen that you’re working on something and have an error come up or something on the screen just looks? You call tech support and spend 20 minutes trying to describe what the screen looks like and then, after your blood pressure goes back down, the technician still has to come over to take a look or establish a remote session.

What is Phishing?
Phishing

In our last blog, we discussed the broad term hacking, which is using a computer system to gain unauthorized access into another computer or network.

Phishing, on the other hand, has a more specific meaning. The term is a play on the word fishing because cybercriminals are dangling a fake “lure” hoping system users will bite by giving out private information. That information can be anything such as credit card numbers, account numbers, passwords, user names and more. As with most online scams, the goal is to steal money.

Is Big Brother watching (or listening)?
Spy Camera

In the last few years, digital assistants have become all the rage. Amazon has it’s Echo powered by Alexa, Alphabet has Google Home, and even Microsoft has partnered with Samsung to deliver Cortana into everyone’s living room. On top of that, you have your smartphones that records everywhere you've been and more and more people are putting cameras all over their house and office that send video back to Cloud. It’s easy, convenient and ubiquitous. But should you be worried about what data is being sent to mega-corporations or is the convenience worth it?

Eastern Panhandle Introduction
Advantage Lunch

On May 24th, we held our May Advantage Lunch at the Bavarian Inn. (If you haven’t heard about our Advantage Lunch, learn more at advantagelunch.com) In addition to the pictures and video below, be sure to check out our Facebook photo album!

What is Hacking?
Hacking

Hacking, by definition, is using a computer system to gain unauthorized access to a computer system or network. “Hacking is not necessarily bad. Hacking is having that bug in you that says I have got to figure this out”, said Rob Dixon, Director of Information Security at Advantage Technology. And since computers and the internet are now a major part of our society, understanding hacking and protecting your information is more important than ever.

Dangerous new ransomware released Friday
WannaCry

You might have seen that a dangerous new ransomware has been reported on over the weekend and I want to make sure you have all the information you need to make informed decisions about it. It has been reported that hackers are leveraging the recently leaked NSA hacking toolkit to infect and cripple systems all around the world.

Pages