New Edge Technology Solutions Blog

3 Tips on How to Protect Your Computer from Hackers

For many people, theft goes beyond the actual loss of an item. It’s painful because of the loss of privacy and the invasion that it constitutes. But when the stolen item is a laptop or tablet, that invasion of privacy can go much deeper. It’s possible that if your...

Top Concerns for IT Directors in 2018

When you look back at 2017 and see all the Internet nightmares that occurred, it’s easy to see why IT directors have had their blood pressure steadily rise. Last year saw the rise of ransomware, including the WannaCry hack that impacted everything from businesses to...

2017 Saw More Cyber Attacks Than Ever Before

The year 2017 seems to have broken all kinds of records, from movie ticket sales to digital downloads. But one concerning trend was that 2017 saw more cyber attacks than any other year before it. This yearly increase is a trend that has been ongoing for about the last...

Tips on How to Protect Your Identity after the Equifax Hack

All the high-profile hacks in 2017 made it difficult to keep track of how severe and widespread many of the hacks actually were. Certainly one of the most troubling was the Equifax hack – it was one of the largest to date and involved a credit agency that people...

Are All Hackers Monsters? The Answer Will Surprise You

Ask the average person to describe a hacker or “cybercriminal,” and chances are you would probably get a stereotype straight out of Hollywood: a guy with a vaguely Eastern European accent sitting in a cramped, dark room, dressed like the Unabomber or an extra from Mr....

How Will Net Neutrality Affect Me?

As the New Year begins, one of the biggest topics in the tech field is net neutrality. After the FCC voted to end net neutrality in December, the Internet erupted with a variety of theories as to what would happen to Internet access in the coming year. As with most...

3 Easy Steps to Avoid Being Victim of Email Phishing Scams

Fraudulent emails are a reality for each of us. These fake emails are attempts by hackers to gain access to your email and personal information. Stories of stolen identity as well as attempts (sometimes successful) to hack business networks and servers have been...

How Mailsploit Just Made Phishing Easier

Ever since the first email was sent through the Internet, people have been trying to find a way to make the most money off the revolutionary technological advancement. Soon after that, nefarious individuals tried to find a way to take advantage of this through illegal...

Why You Should Document Your Network System

For many of us in the IT world, we enjoy working on computers, building networks, designing programs, and implementing new systems. But when it comes to the “paperwork” side of the business, many of us tend to lag behind and let those tasks fall between the cracks....

Backup Horror Stories

Ask someone to name something scary, and chances are you'll hear about fears of spiders, snakes, or creepy clowns. But in today’s society, with cybercrime on the rise, you’ll probably also find “loss of computer data” on that list of fears. We’ve become so reliant on...

How to Protect Your Data from a Natural Disaster

As 2017 comes to a close, many of us will remember the slate of natural disasters that have hit the country over the last 12 months. From hurricanes in the fall that hit Texas, Louisiana, Florida, and Puerto Rico to wildfires blazing out of control in California,...

4 Ways to Protect Your Company From a Cyber Attack

There is an old saying that a chain is only as strong as its weakest link. That is definitely the way it works for cyber security. Unfortunately, many employees in some companies have proven themselves to be the weak link in their network security chain. Staying one...

‘Grey’s Anatomy’ Covers the Cyber Threats Facing Hospitals

You would think that the last place to learn about the latest cyber threats facing the healthcare industry would be the television show "Grey’s Anatomy."  But a recent episode of the hit show focused on a topic that has become a legitimate issue at hospitals...