Business
Focused
Technology

csmedia, Author at IT360 - Page 8 of 9

Storm Disaster. Lessons Learned.

Between Christmas and New Year’s, the Central Illinois area experienced freezing rain and strong winds, which brought about area-wide power and internet outages. Some of our clients were without power for at least four days. A few went without internet even longer. Around the same time, IT360 and other RiverFront properties experienced another flood of […]

Posted: January 15, 2016 | View More »

Windows 10 – When to upgrade?

Last month, Microsoft started allowing users of Windows 7 and Windows 8.1 to upgrade to Windows 10 free of charge. The question we have been getting a lot lately is “should I upgrade to Windows 10?” Our answer to that is (and always will be) “does it make sense for your business?” Microsoft’s free upgrade […]

Posted: December 14, 2015 | View More »

Ransomware

Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to access their systems or get their data back. Fees range from $20 to more than $1000 to recover access to your data. […]

Posted: November 16, 2015 | View More »

IT360 Announces Promotions

IT360 is pleased to announce that twolong-standing employees, Tim Gazza and Todd Thousand, have been promoted to executive roles. Tim Gazza is promoted to Vice President of Operations Tim, who joined the IT360 team in November of 2007 as a Systems Engineer, quickly proved himself as a key member of the technical team, becoming the […]

Posted: October 8, 2015 | View More »

Preparing Your Business for Any Disaster – Large or Small

Imagine your business devastated by a natural disaster like a tornado or flood. All of your hard work, time and energy gone in the blink of an eye. With the second anniversary of the destructive Washington tornado approaching, that scenario, unfortunately, proved all too real in November 2013, when five lives were lost, more than […]

Posted: October 7, 2015 | View More »

Raspberry Pi: AirPlay and Digital Display

When we started this project, the goal was to be able to play music in multiple zones at our office independently or simultaneously while using various sources (Pandora, TuneIn, iTunes, etc.).  We also wanted to setup TV’s around the office and display information with an easy to use management system. The design is able to […]

Posted: August 19, 2013 | View More »

Business Plans Help Local Tech Companies Manage Growth

Many small businesses have a love-hate relationship with business plans. Most agree they need one, but the process of creating it can seem overwhelming. Small business owners quickly learn that if they are seeking outside financing, whether through a bank or an angel investor, a written business plan, including financial forms, will be required. But […]

Posted: August 1, 2011 | View More »

Technology can do a lot, but…

With the latest firewalls and security products, keeping companies systems secure continues to advance.  With the right network equipment, it’s much easier to block “questionable” web content or to keep the “bad guys” out.  However, a trend that I have noticed most recently is that some clients are looking to these technology tools to keep […]

Posted: May 20, 2011 | View More »

Secure your online information

As of the time of this writing, Sony has announced that 10 million of its subscribers may have had their account information and credit card numbers stolen. The total impact of the breach effects 77 million. If you have an account on the PlayStation network, we at IT360 recommend you take the following steps: First, […]

Posted: May 3, 2011 | View More »

Attack of the third party programs

There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java.  As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them. The best way to protect yourself is to make sure these programs are updated to […]

Posted: April 25, 2011 | View More »

President, Manufacturing Company

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more