Blogs

Advantage Technology achieves Gold status with Dell EMC
Dell EMC Gold

We are proud to announce the that Advantage Technology has achieved Gold status with Dell EMC in Networking, Server, and Storage. That means we have met revenue and competency requirements set out by Dell EMC. Reaching this tier means we have the full support of Dell EMC and have been qualified by their rigorous standards to be a representative of their global brand.

Advantage Technology is now the only company in West Virginia with Gold status in Networking, Servers, and Storage.

Understanding and Qualifying for Cyber Insurance

On March 21st, we held out March Advantage Lunch live from Edgewood Country Club where it was simulcast on Facebook Live. In addition to the pictures and video below, be sure to check out our Facebook photo album!

Advantage Spotlight: Jonathan Knight

Jonathan Knight always has loved to fix things. Growing up on a farm in Elkview, he always had something that needed to be repaired. So, he learned a lot of electrical and mechanical skills out of necessity. And, he learned as he went. He didn’t have the internet, so most of his beginning knowledge came from the encyclopedia. He says he “would’ve been dangerous” if he had the internet available as a kid.

Charleston Area Alliance Cybersecurity Lunch & Learn
Chris May

Chris May will be presenting on cyber security topics that can help keep you and your business safe. Click the link below to join the Charleston Area Alliance for a great lunch and important topic.

Charleston Area Alliance Lunch & Learn - Cyber Security

Does your network have KRACKs?

On October 16, 2017, Belgian security researchers made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to man-in-the-middle (MITM) attacks on wireless networks.

Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these flaws in the WiFi standard. Based on their research, CERT issued a series of CVEs to address this flaw, and most vendors affected have issued patches as of this writing.

Why you need to renew your SonicWall License

Depending on the terms of your purchase, every year you’ll need to pay a maintenance fee to renew the license on your SonicWall. When that time comes around, we often see confusion from customers on why they need to pay to continue using an appliance they already own. After all, you don’t have to pay a license for a refrigerator, stove or toaster, right?

Well, the simple fact of the matter is a SonicWall isn’t a static appliance like a refrigerator or stove, and that’s a very good thing; threats are constantly evolving.

Cybersecurity with Rob Dixon

On Tuesday, October 17th, I was invited to appear on 580 WCHS’s Ask the Expert show to talk to their audience about cybersecurity. I took the opportunity to bring along our Director of Information Security Services, Rob Dixon.

Bowling Night 2017

Friday night was bowling night for Advantage Technology! The Advantage Technology crew met up at Venture Lanes in St. Albans  and bowled until they kicked us out.

One thing we’re constantly grateful for is the fact we all get along so well and enjoy each other’s company. When we say that Our Advantage Is Our People, we're talking about more than just our expertise. We’re talking about the fact that we all get along great and really enjoy working together.

To stay out of the headlines, take cybersecurity seriously

You’ve probably heard about the Equifax data breach. And you’ve probably noticed an uptick in the conversation about cybersecurity. There’s a really simple reason why stories like this are happening more and more frequently; we simply aren’t taking cybersecurity seriously.

Ignorance of cybersecurity is no excuse
Law

Target. Yahoo. eBay. Netflix. JP Morgan Chase. The U.S. Office of Personnel Management. Sony. Ashley Madison. The Democratic National Committee. LinkedIn. Home Depot.

What do all of those companies have in common? They all have been the victim of cybersecurity breaches.

Imagine how attractive a law firm that specializes in medical malpractice or personal injury is to a hacker. Or what about a defense firm with terabytes of business emails, trade secrets and financial information?

Pages