croom new

Amaxx Blog

Amaxx has been serving the Dublin area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know Who Handles Regulatory Compliance for Your Business? You Should

Do You Know Who Handles Regulatory Compliance for Your Business? You Should

There will always be standards that must be upheld in regard to compliance and regulations, regardless of which industry your organization falls into. Still, considering the results of the 2016 State of Compliance survey, you’ll be shocked to hear that there are countless businesses out there that don’t understand what’s required of them.

Continue reading
0 Comments

2 Problems that Come From Having Too Much New Technology

2 Problems that Come From Having Too Much New Technology

If your business is using the latest technology solutions, then you know how advantageous they are. Yet, a step in the right direction can often feel like two steps backward. This sometimes happens when businesses implement new technology solutions without considering the ramifications that they may cause for their other technology. Here are two ways that your new technology might be holding your organization back, or even putting your network at risk.

Continue reading
0 Comments

How to Make Sure That Your Business is HIPAA Compliant

How to Make Sure That Your Business is HIPAA Compliant

While the explosion of technological advancement has been great for business, it’s become more challenging than ever before to keep sensitive information safe--even if all you use is an Internet connection. Even small healthcare offices are feeling the effects of this proliferation of threats and malware as they struggle to keep their organizations secure and compliant with government agencies.

Continue reading
0 Comments

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

Continue reading
0 Comments

Shock: One-Third of Businesses Ignore Insider Threats

Shock: One-Third of Businesses Ignore Insider Threats

Regardless of your security protocol, there will always be threats. One of the most often forgotten outlets for attacks comes from insider threats. Sometimes these threats may be from angry employees wanting to sink your business, but more often than not, those behind insider threats don’t have malicious intentions. Still, it’s best to cover your bases and ensure that your organization isn’t at risk from careless or negligent employees.

Continue reading
0 Comments

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Continue reading
0 Comments

According to Hackers, Windows 10 Security Passes the Test

According to Hackers, Windows 10 Security Passes the Test

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the hackers at the Black Hat conference scratching their heads and scrambling to find threats to talk about.

Continue reading
0 Comments

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

Continue reading
0 Comments

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

Recent comment in this post
Bella Robb
I have read the computer networks subject in my degree program. And this blog has such great information which is identical to my ... Read More
Friday, 25 November 2016 09:57
Continue reading
1 Comment

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

Continue reading
0 Comments

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

Continue reading
0 Comments

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

Continue reading
0 Comments

The Super-Creepy Reason Why You’ll Want to Secure Your Surveillance Camera

b2ap3_thumbnail_dvr_iot_issues_400.jpgWith approximately 5.5 million new devices being connected to the Internet everyday, the Internet of Things presents the biggest security challenge to date for IT professionals. Essentially, an IoT device that’s not secured can easily fall prey to hackers, and with so many different devices being connected, it’s easy to overlook a device or two, like your security cameras.

Continue reading
0 Comments

Tip of the Week: How to Add a PIN to Your Windows 10 Login

b2ap3_thumbnail_windows_10_pin_400.jpgThe fact that so many businesses are rushing to take advantage of two-factor authentication displays how the password has lost its edge as a security credential. Passwords simply aren’t good enough anymore, and hackers are always finding ways to crack even the most complex passwords. This is why many businesses are looking to improve security through alternative means.

Continue reading
0 Comments

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpgWe’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to this issue is to create a guest account.

Continue reading
0 Comments

Why it’s Beneficial to Know What Your Network’s Firewall Does

b2ap3_thumbnail_firewall_security_400.jpgYour network’s firewall plays a vital role in protecting your business’s mission-critical assets from external threats. As one of the most basic PC security layers, it would be silly to function without one. Granted, having a firewall and knowing what it protects you from are two different things entirely. To maximize your business’s data security infrastructure, you should pay close attention to how each individual part of your security solution works, including your firewall.

Continue reading

Tip of the Week: How to Protect Yourself, Your Staff, and Your Kids From Sharing Too Much Online

b2ap3_thumbnail_do_you_share_too_much_400.jpgAttention people of the Internet, October is Cyber Security Month! Make sure that you share this information with everyone on the Internet that you know. In a situation like this, sharing content with everyone to raise awareness of a worthy cause is perfectly fine. Although, what’s not alright is the sharing of your personal information online.

Continue reading
0 Comments

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpgWith social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

Continue reading
0 Comments

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpgMobile devices are one of the hottest items for thieves to target. According to reports from Consumer Reports and LoJack, 2013 saw the theft of two million laptops and three million handsets. What this means for you is that having your mobile device stolen is probably a lot more likely than you would think.

Continue reading
0 Comments

3 Easy Ways to Go Incognito In Google Chrome

b2ap3_thumbnail_incognito_mode_400.jpgThe Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage of Google Chrome's Incognito mode to browse the web in an anonymous fashion.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Latest Blog Entry

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer. ...

Latest News

Amaxx launches new website!

Amaxx is proud to announce the launch of our new website at www.amaxx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account login