Business
Focused
Technology

360Advisor - Page 8 of 8 - IT360

Preparing Your Business for Any Disaster – Large or Small

Imagine your business devastated by a natural disaster like a tornado or flood. All of your hard work, time and energy gone in the blink of an eye. With the second anniversary of the destructive Washington tornado approaching, that scenario, unfortunately, proved all too real in November 2013, when five lives were lost, more than […]

Posted: October 7, 2015 | View More »

Raspberry Pi: AirPlay and Digital Display

When we started this project, the goal was to be able to play music in multiple zones at our office independently or simultaneously while using various sources (Pandora, TuneIn, iTunes, etc.).  We also wanted to setup TV’s around the office and display information with an easy to use management system. The design is able to […]

Posted: August 19, 2013 | View More »

Business Plans Help Local Tech Companies Manage Growth

Many small businesses have a love-hate relationship with business plans. Most agree they need one, but the process of creating it can seem overwhelming. Small business owners quickly learn that if they are seeking outside financing, whether through a bank or an angel investor, a written business plan, including financial forms, will be required. But […]

Posted: August 1, 2011 | View More »

Technology can do a lot, but…

With the latest firewalls and security products, keeping companies systems secure continues to advance.  With the right network equipment, it’s much easier to block “questionable” web content or to keep the “bad guys” out.  However, a trend that I have noticed most recently is that some clients are looking to these technology tools to keep […]

Posted: May 20, 2011 | View More »

Secure your online information

As of the time of this writing, Sony has announced that 10 million of its subscribers may have had their account information and credit card numbers stolen. The total impact of the breach effects 77 million. If you have an account on the PlayStation network, we at IT360 recommend you take the following steps: First, […]

Posted: May 3, 2011 | View More »

Attack of the third party programs

There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java.  As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them. The best way to protect yourself is to make sure these programs are updated to […]

Posted: April 25, 2011 | View More »

Technology Company Outwits Thief, Locates Laptop

When Ron Schroeder’s laptop was stolen in early 2010 he reported it to the Peoria police department. Peoria Police Detective Craig Willis was assigned to the case. Schroeder also informed IT360 that his computer was lost. Because they provided technology services to Schroeder’s business, IT360 had also installed a monitoring agent in his personal computer, […]

Posted: April 18, 2011 | View More »

Principal Owner, Marketing Firm

Bringing IT360 on as our technology services “department” was one of the smartest business decisions we’ve made. Over the years, we’ve tried various similar services and have also hired internal IT staff, and we’ve never felt confident that we were adequately supported. IT360 has changed all that. They not only provide proactive, comprehensive technical support and consulting, they engage with us in a way that feels like they are part of our company…a true business partner.

Principal Owner, Marketing Firm

Recent
Technology News

IT 360 News
BEC Incidents Intent on Invoice or Payment Fraud Increase 155% Across All Industries

Business Email Compromise appears to be back in the saddle again, as attackers use simple social engineering and domain impersonation to trick victims into paying up. In the midst of adjusting to working-while-COVID, ransomware seemed to be at the forefront of attacks. But new data from Abnormal Security’s Q3 Quarterly BEC Report shows that business email compromise has recently grown in interest […]

Read more
IT 360 News
Thinking Skeptically About Smishing

Organizations need to train their employees to be on the lookout for SMS phishing (smishing), according to Jennifer Bosavage at Dark Reading. Bosavage explains that attackers exploit normal human behavior to gain access or information from employees. “Cyberattackers leverage the way people typically respond to certain social situations to trick them into disclosing sensitive information about themselves, […]

Read more