With tax season upon us, we’re starting to get reports of people receiving phishing emails purportedly from the IRS. It’s important to keep an eye out for these, know how to identify them, learn to avoid them and, if possible, filter them out entirely.
Our telecommunications engineers have recently discovered a security vulnerability in the popular NEC SL1100 phone systems that can be exploited for toll fraud. Commonly known as “phreaking,” Toll fraud is the practice of exploiting vulnerabilities in phone systems and is quite possibly the oldest form of hacking. To this day, phreaking accounts for more monetary damage than credit card fraud.
If you’ve ever had a hardware disaster, you know it comes at the most inconvenient of times. Even the smallest of businesses have huge amounts of data and protecting that data is essential to daily operations and productivity. There are many actions that a business can take to ensure protection from data threats and disasters. The primary and the most fundamental thing that needs to be in place is a data backup and recovery plan.
As the senior project manager at PCS Manage, Travis Arey likes to keep things simple. Technology is a tool his business needs to function properly, just like any business. So, when PCS Manage was facing system malfunctions, Mr.Arey handed it over to us at Advantage Technology.