fbpx

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

SRS Networks Blog

SRS Networks has been serving the California area since 1976, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Your End Users Are Your Last Line of Defense against Cybercriminals

Your End Users Are Your Last Line of Defense against Cybercriminals

Cybercrime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting trickier.

0 Comments
Continue reading

Debit, Credit, or Neither?

Debit, Credit, or Neither?

With most everything having gone digital, most consumers have changed their preferred payment method. Many different factors contribute to credit cards becoming the most used payment. Today, we take a look at why this has become a popular means of payment, as well as weigh the pros and cons of credit cards. 

0 Comments
Continue reading

Working Remotely, You Need a Virtual Private Network

Working Remotely, You Need a Virtual Private Network

To those who weren’t around BEFORE the Internet became an irreplaceable business tool, it’s almost hard to imagine how businesses operated when this tool didn’t exist. Storing sensitive data has never been such an easy thing to do but at what cost? It is undeniable that the Internet has opened doors for not only us, but criminals as well. Today we discuss how these doors can easily be secured with the implementation of a virtual private network, or VPN.

0 Comments
Continue reading

Tip of the Week: How to Make Your Credentials More Memorable

Tip of the Week: How to Make Your Credentials More Memorable

Let’s face facts: as critical to your security as they are, passwords are kind of the worst. Of course, since they are so critical, you need to make sure all of the ones you use are as secure as possible, so we’ve assembled some practices that may help you tip the scales in your favor. Spoiler alert: the conventional password may not be your first choice for much longer.

0 Comments
Continue reading

Tip of the Week: Improve Your Mobile Data Management

Tip of the Week: Improve Your Mobile Data Management

Data accessibility has never been easier for both you and your workforce, but how do you know if this convenience isn’t also benefitting cybercriminals? Your mobile device contains a vast amount of sensitive information and files which need to be kept secure. This presents the need for some sort of secure management system, which in the tech world is referred to as Mobile Information Management, or MIM.

0 Comments
Continue reading

Updating the Latest Major Data Breaches

Updating the Latest Major Data Breaches

A lot has been made recently about cybersecurity, and for many people it has caused them to alter the way they go about doing things. With more people more cognizant of their individual data privacy, and how to combat phishing and other social engineering attempts, you’d think major data breaches would be snuffed out regularly. It only takes one person, however, to fail to be vigilant for it to negatively affect a whole organization.

0 Comments
Continue reading

Tip of the Week: How to Use PowerPoint as a Training Tool

Tip of the Week: How to Use PowerPoint as a Training Tool

Training your employees is important. One tool that you may find useful is Microsoft PowerPoint, as it allows you to create an engaging and informative training program.

0 Comments
Continue reading

The Small Business Cybersecurity Starter Pack

The Small Business Cybersecurity Starter Pack

Running a business is one thing, but it is quite another to protect it from issues and threats. There is a vast assortment of potential obstacles that can pop up during your operations. Likewise, there are many ways that a business needs to be protected, each one as crucial as the last. A few basics include:

0 Comments
Continue reading

Technologies You Need If You’re Going to Use Remote Workers

Technologies You Need If You’re Going to Use Remote Workers

Does your business use remote workers? If you currently don’t, you should know that there are several benefits of allowing your staff to work outside of the confines of your office, but you have to be careful. These days, with the threat landscape as it is, it is important that if you are going to allow remote workers, that you have a strategy in place. Let’s take a look at some of the tools you will need if you want to take advantage of remote workers. 

0 Comments
Continue reading

Phishing is a Major Threat

Phishing is a Major Threat

Fishing - a jerk on one end of a line waiting for a jerk on the other end.
Phishing - very similar to fishing, but much more consequential.

While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far from comical. Today we will discuss just how serious these attacks can be, and the easiest way to prevent them.

0 Comments
Continue reading

Tip of the Week: Methods to Securing Your Smartphone

Tip of the Week: Methods to Securing Your Smartphone

The smartphone has quickly become a staple in modern society, as users rely on them to accomplish more and more. You could probably say the same of your own use of it. This means that there are not only huge amounts of smartphones and smartphone users, there is a huge amount of threats out there to target them.

0 Comments
Continue reading

Watch Out for the One Percent

Watch Out for the One Percent

Do you know the phrase, “Locks only keep out the honest?” The idea is that even though you lock your doors, there is only a thin layer of glass and good intentions stopping a criminal from entering your home through a window.

0 Comments
Continue reading

If You Aren’t Patching Your Systems, Any Breaches are On You

If You Aren’t Patching Your Systems, Any Breaches are On You

Everyone in a business has set responsibilities that they need to fulfill, one major one being proper security maintenance. A failure to uphold this responsibility could have serious consequences, including the very real potential of a security breach. It could be argued, in fact, that if you aren’t patching your systems, you’re inviting cybercriminals in.

0 Comments
Continue reading

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

0 Comments
Continue reading

How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.

0 Comments
Continue reading

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Looking Back at 2019 Data Breaches

Looking Back at 2019 Data Breaches

Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due to data breaches, even though the overall number of breaches dropped by 23 percent to 1,244 total. We’ll discuss some of the most notable breaches that have happened over the first four months of 2019.

0 Comments
Continue reading

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

Latest Blog

Cybercrime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting tric...

Contact Us

Learn more about what SRS Networks
can do for your business.

(831) 758-3636

SRS Networks
845 West Market Street, Bldg P
Salinas, California 93901

Account Login