Business
Focused
Technology

360Advisor - Page 7 of 7 - IT360

Windows 10 – When to upgrade?

Last month, Microsoft started allowing users of Windows 7 and Windows 8.1 to upgrade to Windows 10 free of charge. The question we have been getting a lot lately is “should I upgrade to Windows 10?” Our answer to that is (and always will be) “does it make sense for your business?” Microsoft’s free upgrade […]

Posted: December 14, 2015 | View More »

Ransomware

Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to access their systems or get their data back. Fees range from $20 to more than $1000 to recover access to your data. […]

Posted: November 16, 2015 | View More »

IT360 Announces Promotions

IT360 is pleased to announce that twolong-standing employees, Tim Gazza and Todd Thousand, have been promoted to executive roles. Tim Gazza is promoted to Vice President of Operations Tim, who joined the IT360 team in November of 2007 as a Systems Engineer, quickly proved himself as a key member of the technical team, becoming the […]

Posted: October 8, 2015 | View More »

Preparing Your Business for Any Disaster – Large or Small

Imagine your business devastated by a natural disaster like a tornado or flood. All of your hard work, time and energy gone in the blink of an eye. With the second anniversary of the destructive Washington tornado approaching, that scenario, unfortunately, proved all too real in November 2013, when five lives were lost, more than […]

Posted: October 7, 2015 | View More »

Raspberry Pi: AirPlay and Digital Display

When we started this project, the goal was to be able to play music in multiple zones at our office independently or simultaneously while using various sources (Pandora, TuneIn, iTunes, etc.).  We also wanted to setup TV’s around the office and display information with an easy to use management system. The design is able to […]

Posted: August 19, 2013 | View More »

Business Plans Help Local Tech Companies Manage Growth

Many small businesses have a love-hate relationship with business plans. Most agree they need one, but the process of creating it can seem overwhelming. Small business owners quickly learn that if they are seeking outside financing, whether through a bank or an angel investor, a written business plan, including financial forms, will be required. But […]

Posted: August 1, 2011 | View More »

Technology can do a lot, but…

With the latest firewalls and security products, keeping companies systems secure continues to advance.  With the right network equipment, it’s much easier to block “questionable” web content or to keep the “bad guys” out.  However, a trend that I have noticed most recently is that some clients are looking to these technology tools to keep […]

Posted: May 20, 2011 | View More »

Secure your online information

As of the time of this writing, Sony has announced that 10 million of its subscribers may have had their account information and credit card numbers stolen. The total impact of the breach effects 77 million. If you have an account on the PlayStation network, we at IT360 recommend you take the following steps: First, […]

Posted: May 3, 2011 | View More »

Attack of the third party programs

There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java.  As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them. The best way to protect yourself is to make sure these programs are updated to […]

Posted: April 25, 2011 | View More »

Technology Company Outwits Thief, Locates Laptop

When Ron Schroeder’s laptop was stolen in early 2010 he reported it to the Peoria police department. Peoria Police Detective Craig Willis was assigned to the case. Schroeder also informed IT360 that his computer was lost. Because they provided technology services to Schroeder’s business, IT360 had also installed a monitoring agent in his personal computer, […]

Posted: April 18, 2011 | View More »

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT360 News
‘New VPN Configuration’ Email Tricks Microsoft 365 Users Out of Credentials

Scammers are taking advantage of the prominent use of VPNs by remote workforces to send out this very topically relevant phishing email that just wants to steal your credentials. Nearly one-third of users utilize a VPN to access work-related sites and services. From a cybercriminal’s perspective, that’s a significant chunk of people they can target. The shift to remote […]

Read more
IT360 News
BEC Isn’t Back; It Never Left

Business email compromise (BEC) attacks aren’t new, but they’re growing increasingly effective, according to Zeljka Zorz at Help Net Security. Zorz cites an article from BakerHostetler, in which two attorneys describe how BEC attacks work and why they’re so effective. The lawyers explain that BEC attacks involve targeted phishing attempts coming from spoofed or compromised email […]

Read more