Business
Focused
Technology

360Advisor - Page 8 of 8 - IT360

Preparing Your Business for Any Disaster – Large or Small

Imagine your business devastated by a natural disaster like a tornado or flood. All of your hard work, time and energy gone in the blink of an eye. With the second anniversary of the destructive Washington tornado approaching, that scenario, unfortunately, proved all too real in November 2013, when five lives were lost, more than […]

Posted: October 7, 2015 | View More »

Raspberry Pi: AirPlay and Digital Display

When we started this project, the goal was to be able to play music in multiple zones at our office independently or simultaneously while using various sources (Pandora, TuneIn, iTunes, etc.).  We also wanted to setup TV’s around the office and display information with an easy to use management system. The design is able to […]

Posted: August 19, 2013 | View More »

Business Plans Help Local Tech Companies Manage Growth

Many small businesses have a love-hate relationship with business plans. Most agree they need one, but the process of creating it can seem overwhelming. Small business owners quickly learn that if they are seeking outside financing, whether through a bank or an angel investor, a written business plan, including financial forms, will be required. But […]

Posted: August 1, 2011 | View More »

Technology can do a lot, but…

With the latest firewalls and security products, keeping companies systems secure continues to advance.  With the right network equipment, it’s much easier to block “questionable” web content or to keep the “bad guys” out.  However, a trend that I have noticed most recently is that some clients are looking to these technology tools to keep […]

Posted: May 20, 2011 | View More »

Secure your online information

As of the time of this writing, Sony has announced that 10 million of its subscribers may have had their account information and credit card numbers stolen. The total impact of the breach effects 77 million. If you have an account on the PlayStation network, we at IT360 recommend you take the following steps: First, […]

Posted: May 3, 2011 | View More »

Attack of the third party programs

There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java.  As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them. The best way to protect yourself is to make sure these programs are updated to […]

Posted: April 25, 2011 | View More »

Technology Company Outwits Thief, Locates Laptop

When Ron Schroeder’s laptop was stolen in early 2010 he reported it to the Peoria police department. Peoria Police Detective Craig Willis was assigned to the case. Schroeder also informed IT360 that his computer was lost. Because they provided technology services to Schroeder’s business, IT360 had also installed a monitoring agent in his personal computer, […]

Posted: April 18, 2011 | View More »

Principal Owner, Marketing Firm

Bringing IT360 on as our technology services “department” was one of the smartest business decisions we’ve made. Over the years, we’ve tried various similar services and have also hired internal IT staff, and we’ve never felt confident that we were adequately supported. IT360 has changed all that. They not only provide proactive, comprehensive technical support and consulting, they engage with us in a way that feels like they are part of our company…a true business partner.

Principal Owner, Marketing Firm

Recent
Technology News

IT 360 News
Yahoo Suddenly Rises in Popularity in Q4 to Become the Most Impersonated Brand in Phishing Attacks

Completely absent from the top 10 brands for more than two years, Yahoo’s impersonation may indicate that scammers are looking for new attack angles using lesser-used brands. Yes, of course, Yahoo is anything but insignificant. With revenues topping $8 billion, the search engine giant is still quite relevant today. But in the world of phishing attacks using […]

Read more
IT 360 News
BEC Group Launches Hundreds of Campaigns

A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at Abnormal Security. The threat actor, which Abnormal Security tracks as “Firebrick Ostrich,” conducts open-source reconnaissance on their targets in order to construct their scam. “In contrast to other forms of financial supply chain compromise […]

Read more