Corporate Technology Group Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in Business COmputing

b2ap3_thumbnail_twc_data_compromised_400.jpgThe number of high-profile hacks that have occurred over the past several years continues to climb, and it won’t let up anytime soon. Now, another incident involving Time Warner Cable, a large ISP in the United States, shows that even large companies that deal with sensitive information aren’t invincible from data breaches.

0
Continue reading 0 Comments

Public Cloud? Private Cloud? Why Not Both!

Posted by on in Cloud

b2ap3_thumbnail_hybrid_cloud_computing_400.jpgIn a world where technology is continuously being improved upon to suit the needs of the modern business, your organization’s needs can quickly (and drastically) change. The need for cloud services grows more apparent with each passing day, primarily because it has so much to offer for a small business. Granted, talking about the cloud and implementing it are two entirely different things. So, it's important that business owners ask, "What can the cloud do for my organization?"

0
Continue reading 0 Comments

b2ap3_thumbnail_move_to_the_cloud_400.jpgCloud computing has reached a point where the majority of businesses are utilizing the technology to some extent. According to a 2014 survey, about 70 percent of enterprises either have infrastructure or applications in the cloud. As more companies migrate more of their operations to the cloud, we’re getting more questions about what it takes to make such a transition possible.

0
Continue reading 0 Comments

b2ap3_thumbnail_cloud_vs_virtualization_400.jpgMany businesses go about their daily duties without understanding the difference between a cloud computing solution and virtualization services. Contrary to popular belief, they are, in fact, NOT the same thing. Rather, virtualization itself is an important part of integrating a cloud solution.

0
Continue reading 0 Comments

2 Conflicting Views of the Cloud

Posted by on in Cloud

b2ap3_thumbnail_cloud_gears_400.jpgCloud computing is here to stay. Yet, there are still companies hesitant to adopt the cloud. While every business that hesitates migrating to the cloud has its own reasons, one common source of conflict that we’ve seen is the opposing view between the business owner and their IT department.

0
Continue reading 0 Comments

b2ap3_thumbnail_troubleshoot_your_own_pc_issues_400.jpgWhat separates the average PC user from the IT technician who routinely takes care of your technology issues? In essence, the only difference is the amount of technical training. Our years of technical expertise have given us the ability to diagnose and resolve varieties of problems, but we don’t hold our knowledge close to the chest. Rather, we want to share it with you.

0
Continue reading 0 Comments

b2ap3_thumbnail_cloud_computing_objections_400.jpgDespite cloud computing being commonplace, there are still some businesses holding out when it comes to migrating their data to the cloud. In most scenarios like this, a company has objections to the cloud that are preventing them from taking advantage of its many benefits. Are these objections valid? Let’s find out by addressing two of the most common objections to the cloud.

0
Continue reading 0 Comments

Backsourcing Your Outsourced IT

Posted by on in Business

b2ap3_thumbnail_backsourcing_it_400.jpgOutsourcing your company’s IT services is an easy way to cut back on IT costs. For years, outsourced IT has been a growing trend with more companies making the switch, but just because your businesses has outsourced its technology services, doesn’t mean that backsourcing isn’t a valid option.

0
Continue reading 0 Comments

b2ap3_thumbnail_Poodles_400.jpgA while back we discussed the POODLE vulnerability found in SSL 3.0 SSL encryption technology. This vulnerability is found in all operating systems, as it is found within the web browser’s abilities to process SSL encryption. Thankfully, major companies are stepping up to tackle the issue, and Microsoft has released a basic solution to fix the vulnerability in Internet Explorer.

The POODLE vulnerability itself is used to obtain information encrypted with SSL technology by analyzing web traffic. This technique is used to steal information such as credit card numbers, Social Security numbers or other private information. In non-tech speak, SSL (Secure Socket Layers) is an encryption protocol used to keep data safe on the web through security certificates. This method of encryption has long since been replaced by the more secure protocol TLS (Transport Layer Security), but several systems will revert back to their old SSL certificates in the event something has gone wrong with their TLS. TLS isn’t vulnerable to this issue, so in theory, a hacker could force their way into a network, exploiting the traffic coming in and out of the network for any worthwhile information.

According to the Microsoft security advisory, hackers exploit a man-in-the-middle attack to take advantage of this vulnerability:

In a man-in-the-middle (MiTM) attack, an attacker could downgrade an encrypted TLS session forcing clients to use SSL 3.0 and then force the browser to execute malicious code. This code sends several requests to a target HTTPS website, where cookies are sent automatically if a previous authenticated session exists. This is a required condition in order to exploit this vulnerability. The attacker could then intercept this HTTPS traffic, and by exploiting a weakness in the CBC block cipher in SSL 3.0, could decrypt portions of the encrypted traffic (e.g. authentication cookies).

Due to the nature of POODLE as a design flaw, it’s not something that can easily be patched. Therefore, most experts are saying that you’re better off disabling SSL 3.0 for their web browsers. Most servers don’t rely on SSL 3.0 anymore, which makes it obsolete. In fact, most major browsers are looking to disable SSL 3.0 completely within the next few months. Firefox is fixing the issue with the November upgrade, while Google is working to disable SSL 3.0 on all of its products. This makes the vulnerability obsolete for two of the biggest browsers, but what about Internet Explorer?

Turns out Microsoft has a way to fix that one, too. Microsoft has released a Fix It tool, which can help users disable SSL 3.0 without navigating through their Control Panel. Just click here for the tool on their official website. Otherwise, you must disable SSL 3.0 and enable TLS 1.0, 1.1, and 1.2. Follow these steps to do so:

poodle in blog 1

In the Internet Explorer Tools menu (or your PC’s Control Panel), click Internet Options.

poodle in blog 2

In the Internet Options window, click the Advanced tab.

poodle in blog 3

Scroll down to the Security section. Notice there are checkboxes next to the available SSL and TLS options. Uncheck Use SSL 3.0, and check the following: TLS 1.0, TLS 1.1, and TLS 1.2. Be sure to check all of the TLS versions. Failing to do so could result in connection errors.

Finally, click OK, exit, and restart Internet Explorer. This allows Internet Explorer to refuse a connection with any servers which only support SSL, which ensures that the web traffic isn’t vulnerable to the POODLE vulnerability.

Corporate Technology Group believes that quality security is key to a minimal-risk online environment. This fix isn’t a viable replacement for the latest security updates and patches, so you will want to ensure that you are always running the most up-to-date versions of your software, applications, and especially your operating system.

Corporate Technology Group can apply all of these patches for your business’s systems so you don’t have to. Call us today at (817) 557-4091 to learn more.

0
Continue reading 0 Comments

b2ap3_thumbnail_it_strategies_400.jpgWith so many new trends popping up in today's technology industry, it's only natural that a change of pace, or even a change in strategy, be considered by any business hoping to take advantage of what the world has to offer. Your company needs to adapt to change if it hopes to be successful in the future business world.

0
Continue reading 0 Comments

Has Your Business Moved to the Cloud Yet?

Posted by on in Cloud

b2ap3_thumbnail_cloud_computing_questions_400.jpgThe cloud is becoming a very important part of the modern-day business, and for good reason. It frees companies from the restricting physical nature of servers, desktops, and other hardware. In fact, according to Joe McKendrick of Forbes magazine, four-out-of-five small businesses will soon operate on the cloud.

0
Continue reading 0 Comments

b2ap3_thumbnail_virtualized_computing_infrastructure_400.jpgOne of the biggest expenses for any business is owning and maintaining an IT infrastructure. Computer equipment is expensive to purchase and it's costly to upgrade and repair. Fortunately, operating an IT infrastructure doesn't have to be as expensive as the price tag indicates. You can take advantage of desktop virtualization to handle your workload for much less money!

0
Continue reading 0 Comments

Use Technology Like a Real Business

Posted by on in Newsletter

b2ap3_thumbnail_are_you_efficient_400.jpgThere's a reason why business technology is categorized differently than consumer technology. For example, nobody in their right mind has a copy machine the size of a Smart Car sitting in the home office. More is demanded from business technology, which is why you need a professional partner to assist you with your professional technology!

0
Continue reading 0 Comments

The 4 Sides of Risk Management

Posted by on in Newsletter

b2ap3_thumbnail_we_are_soulution_providers_400.jpgYou can't run a business and make money without spending money on risky activities, like advertising campaigns where there's no guaranteed return on investment. Did you know that it's possible to make money by investing in risk management? For all of you Cautious Carls out there, this might be a more preferred way to grow your bottom line.

0
Continue reading 0 Comments

b2ap3_thumbnail_mobile_apps_400.jpgThe world is changing as technology grows ever more mobile. Cell phones have gone from bulky, large pieces of hardware to smaller, more compact specimens. Fifteen years ago, if you were to tell someone that your cell phone could connect to the Internet, you would quickly be dismissed. If you look past the surface laden with Candy Crush Saga and Words with Friends game requests, you can get to the heart of what smartphones have revolutionized – the way we communicate with others.

0
Continue reading 0 Comments

b2ap3_thumbnail_which_server_works_best_400.jpgYour company's most valuable assets are that which are irreplaceable, like your computer data. Data is stored in a server, which makes your server the most important piece of equipment in your office. Given the crucial role your server plays in your business, you will want to make sure to have the perfect server unit for your organization. Here's how to shop for the best server for you!

0
Continue reading 0 Comments

By the Numbers: Is the PC Market Shrinking?

Posted by on in IT Blog

b2ap3_thumbnail_is_the_pc_market_shrinking_400.jpgThose paying attention to technology industry news may have noticed the current trend of declining PC sales. Any way you spin it, the latest statistics dealing with the PC market are not favorable toward the future of widespread desktop and laptop computer purchases. Let's take a look at some of the numbers and their implications for your business.

0
Continue reading 0 Comments

4 Signs that You’ve Received an Email Scam

Posted by on in Newsletter

b2ap3_thumbnail_avoid_phishing_scams400.jpgThe most common way malware spreads is through phishing emails. These messages are essentially traps designed to trick you into downloading a malicious virus. How do you know if you've got a phishing email on hand? The best way to avoid a phishing scam is to know what the bait looks like.

0
Continue reading 0 Comments

50 Years of Working with Technology!

Posted by on in Newsletter

b2ap3_thumbnail_techhist400.jpgAs long as businesses have used computers, there have been IT professionals helping companies use them. Technology has dramatically changed over the past fifty years, and IT service companies have been there to help organizations with each transition. Let's take a look back at the past fifty years of business technology!

0
Continue reading 0 Comments

Find a New Home for Your Old PC

Posted by on in Newsletter

b2ap3_thumbnail_recyclepc400.jpgWe all love getting a new computer that's faster and more powerful than our old one, but just because you have a shiny new toy sitting on your desk, doesn't necessarily mean you have to discard your old machine. If you're old PC is in good working order, then there may be another user out there that will treasure your trash.

0
Continue reading 0 Comments

Latest Blog Entry

Is Society Really Prepared For the Drastic Changes The Internet of Things Will Usher In?
Technology has changed the world. It has changed individual lives, businesses, and the way people communicate with one another. The main reason for this is that technology, and the use of it, happens everywhere. In fact, the world has seen a huge spike in th...
Continue Reading...

Latest News

Our Site Has Launched!

Corporate Technology Group's New IT Support Portal

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Corporate Technology Group!

Read more

Contact Us

Learn more about what Corporate Technology Group can do for your business.

callphone

Call us today   
(817) 557-4091
(806) 355-3316

801 Stadium Dr Suite 112, Arlington, Texas 76011
509 S Arthur Street, Amarillo, Texas 79102

IT Support Dallas Fort Worth Network Support Dallas Fort Worth #