SIRIS 3 is the newest data protection platform DATTO has to offer and it is also the data protection ABS chooses to use for our clients.With this newly structured version DATTO has created, we are able to offer protection to any physical, virtual, and cloud infrastructure on Windows, Mac or Linux. Clients and users not…
Email spamming has become increasingly relevant as well as extremely convincing. Before opening those emails that flood your email inbox, consider the source and take an extra minute or two to examine the email closely.
At Advanced Business Solutions we offer many services in which bring years of experience, excellence and comfort to many clients ranging from Project Management to Strategic Planning Services. Below you will see an outline and summary of each item we offer and why we are the best at what we do. If there are any questions regarding any one of these items or if more information is desired, please reach out to us today!
Have you ever wondered who your IT company actually is? There are many organizations that have wondered the same. Here are several relevant questions to ask your company’s decision makers about the company you are trusting with important and sensitive information.
February 7, 2018, Apple fought hard to remove a portion of iOS source code that was released and then posted on GitHub. The iOS source code was for a process called “iBoot,” originally reported by Motherboard.
As technology continues to accelerate, it is easy to get lost and overwhelmed with intimidating information. ABS is making an effort to provide you with the latest IT news that could affect you and your organization. As changes are underway to the Microsoft Software Donation Program, many nonprofits will see the difference in the coming…
Do you remember Meltdown and Spectre, the Intel processor vulnerabilities we mentioned a few weeks ago? Well, Intel has recently rolled out a patch for the bugs – but be careful, it doesn’t come without issues. To recap, the Meltdown and Spectre bugs are design flaws that result in a weakened separation in the secure…
In a stunning turn of events, researchers discovered a significant vulnerability in virtually ALL Intel processors. The vulnerability is similar to the Heartbleed bug of 2012. The bug allows normal programs to access the secured memory in the system’s kernel. A kernel is the core of an operating system—and just so happens to be responsible for handling the MOST sensitive tasks carried out by your operating system. Needless to say, this is bad.
While it’s months since the Netflix phishing scam was first reported, unfortunately, it’s showing no signs of slowing down anytime soon. For those unaware, a popular phishing scam targets Netflix users with an urgent email notifying the user that their account has been suspended and requires immediate action.
In what seems to be a never ending cycle of news headlines surrounding data breaches, Accenture, a giant in the tech and cloud industries, appears to be the latest major company to breach client data. Reported as an accident, the company left four of its AWS S3 buckets open to the public, and ultimately, exposed hundreds of gigabytes of sensitive data.