Advantage Technology's blog

Bowling Night 2017

Friday night was bowling night for Advantage Technology! The Advantage Technology crew met up at Venture Lanes in St. Albans  and bowled until they kicked us out.

One thing we’re constantly grateful for is the fact we all get along so well and enjoy each other’s company. When we say that Our Advantage Is Our People, we're talking about more than just our expertise. We’re talking about the fact that we all get along great and really enjoy working together.

Ignorance of cybersecurity is no excuse
Law

Target. Yahoo. eBay. Netflix. JP Morgan Chase. The U.S. Office of Personnel Management. Sony. Ashley Madison. The Democratic National Committee. LinkedIn. Home Depot.

What do all of those companies have in common? They all have been the victim of cybersecurity breaches.

Imagine how attractive a law firm that specializes in medical malpractice or personal injury is to a hacker. Or what about a defense firm with terabytes of business emails, trade secrets and financial information?

Learning more about the government's rigorous cyber security standards

Two Advantage Technology professionals recently returned from the preeminent event for training, education and workforce development for protecting the country’s infrastructure from cyber threats.

The National Cyber Summit took place in early June in Huntsville, Ala. The annual event attracts commercial and defense companies as well as healthcare, automotive and energy industries and academia. It was sponsored by Information Systems Security Association.

Randy Ross and Rob Dixon from Advantage Technology were on hand to learn and to network with other providers.

An Introduction to 360 Photos and Video
360 Footage

With the rise of virtual reality, in particular mobile VR, 360 degree, immersive photography has really taken off. It’s not a new technology – realtors have been using it for years to create virtual tours, and Google Street View has been giving us a ground-level view for over 10 years – the combination of new viewing methods and action camera style 360 cameras has pushed 360 photography into the mainstream.

Download this Sample Risk Report

The cornerstone of our Advantage IT Discovery is the Risk Report that is generated during the process. The report presents you with a summary of your overall risk score based on a scan of your network, along with simple charts to show the problem areas. It identifies things such as…

Accurate Systems is now Advantage Technology
Accurate Systems

For over 16 years, the team at Accurate Systems in Shepherdstown, WV, has prided themselves on having a consultative partnership with all their clients. They see themselves as a member of their client’s organization, working to find the right solutions to their specific needs and delivering the highest quality technical resources. It is with that in mind that they have made the biggest change yet to their business. In order to provide the kind of resources they feel their growing community needs, they have become part of the Advantage Technology team.

Don’t Fall Victim to an IRS Phishing Scam
IRS Phishing

With tax season upon us, we’re starting to get reports of people receiving phishing emails purportedly from the IRS. It’s important to keep an eye out for these, know how to identify them, learn to avoid them and, if possible, filter them out entirely.

Recently Discovered Vulnerability in NEC Phone Systems Leaves Thousands Vulnerable to Toll Fraud
NEC SL1100

Our telecommunications engineers have recently discovered a security vulnerability in the popular NEC SL1100 phone systems that can be exploited for toll fraud. Commonly known as “phreaking,” Toll fraud is the practice of exploiting vulnerabilities in phone systems and is quite possibly the oldest form of hacking. To this day, phreaking accounts for more monetary damage than credit card fraud.

How we’ve improved Advantage Backup and Recovery to disaster-proof your data
Backup and Recovery

If you’ve ever had a hardware disaster, you know it comes at the most inconvenient of times. Even the smallest of businesses have huge amounts of data and protecting that data is essential to daily operations and productivity.  There are many actions that a business can take to ensure protection from data threats and disasters. The primary and the most fundamental thing that needs to be in place is a data backup and recovery plan.

How one branch office went from telecommunication turmoil to comprehensive communication in under 3 days

As the senior project manager at PCS Manage, Travis Arey likes to keep things simple. Technology is a tool his business needs to function properly, just like any business. So, when PCS Manage was facing system malfunctions, Mr.Arey handed it over to us at Advantage Technology.

Pages