Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comment
Continue reading

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.

0 Comment
Continue reading

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Network Security Hosted Solutions IT Services Data Backup Email Internet Malware Hackers Software Efficiency IT Support Business Outsourced IT Innovation Microsoft Mobile Devices Productivity Computer Hardware Data Recovery Managed IT Services Google Upgrade Business Continuity IT Support Small Business Cloud Computing Backup Cybersecurity Ransomware Collaboration User Tips Communication Tech Term Phishing Managed Service Provider Disaster Recovery Managed IT Services Smartphone Business Management Windows 10 Workplace Tips Internet of Things Mobile Device VoIP Smartphones Android Data Management Remote Monitoring Social Media Paperless Office Quick Tips Managed IT communications Facebook Browser Encryption Managed Service Network Save Money Saving Money Server Windows 10 Artificial Intelligence Windows Office 365 Virtualization Business Technology Miscellaneous BDR Holiday Help Desk Wi-Fi Compliance Risk Management Passwords BYOD Government Document Management Remote Work Users Vendor Management Healthcare Password Training Health Apps Mobile Device Management Windows 7 Microsoft Office Automation App Employer-Employee Relationship Big Data Unified Threat Management Bring Your Own Device Avoiding Downtime Going Green Chrome Data Security Bandwidth Robot Analytics Office Firewall Gmail Laptops Applications Recovery Money Infrastructure Data storage Two-factor Authentication Computing Data loss Vulnerability Information Technology Wireless Hosted Solution Covid-19 Blockchain Website SaaS Telephone Systems Regulations Mobility Processor IT Management File Sharing Content Filtering Redundancy Information Apple Computers Tip of the week Storage Scam Antivirus Project Management VPN Gadgets Company Culture Software as a Service Router Customer Relationship Management RMM Flexibility Politics Unified Communications Virtual Private Network Maintenance Budget Customer Service Work/Life Balance Proactive Operating System Virtual Reality Downtime Printing Employee-Employer Relationship Access Control Remote Computing OneDrive Settings Machine Learning IT Service Hard Drive IoT Tablet Social Meetings Files Monitoring Wireless Technology Legal Employees Remote Worker Current Events How To Samsung Data Storage Patch Management The Internet of Things Private Cloud Time Management Networking Tech Support Recycling Chromebook Utility Computing Consulting Data Breach Smart Technology Social Network Spam Net Neutrality Digital Payment Network Management WiFi Websites Identity Theft Bitcoin YouTube Assessment Managed Services Provider How To Licensing File Management Upgrades Server Management Mouse Internet Exlporer Outlook Twitter Payment Cards Administration Uninterrupted Power Supply Management Consultation HIPAA Remote Monitoring and Management Google Drive Display LiFi Cooperation Education Remote Workers End of Support Co-Managed IT Mobile Security Business Growth IT solutions Word Search Mobile Office Monitors Professional Services Managed Services Electronic Medical Records Mobile Computing Alert Hacker Sports Dark Web Electronic Health Records Solid State Drive Augmented Reality Taxes Star Wars Hard Disk Drives Virtual Machines Buisness User Error Language Google Maps High-Speed Internet Batteries Heating/Cooling IT Consulting Cyber Monday technology services provider Alt Codes Dark Data Cyber security Personal Information WannaCry Smart Tech IT Budget Conferencing Projects Safety Gamification Migration Asset Tracking Laptop Hacking Data Warehousing Cyberattacks Cryptocurrency Proactive Maintenance Digitize Operations Cabling MSP Wasting Time Smart Devices Technology Assurance Group ’s 18 Solid State Drives Credit Cards Computing Infrastructure Development Zero-Day Threat ROI Notifications Servers OneNote Typing Teamwork Managing Stress Instant Messaging Hacks Return on Investment Black Market Technology Tips Chatbots Point of Sale Disaster Remote Working Trending Microsoft Excel Modem eWaste Read Only Database Management Writing Shadow IT Emoji Multi-Factor Security Wearable Technology Cybercrime Tech Terms Best Practice Database Sensors Technology Laws Distributed Denial of Service Annual Convention Telephony Options Network Congestion Holidays Mail Merge Printer Alerts Sync Cables Backup and Disaster Recovery Notes Shared resources Windows Server 2008 Computer Repair VoIP Sponsor Public Cloud Enterprise Content Management Finance Active Directory Touchscreen Techology Comparison Identity Law Enforcement Voice over Internet Protocol Physical Security Cookies Botnet Windows 8 GDPR Save Time Retail Outsourcing Cortana Lenovo Google Calendar Travel Theft Statistics Managed IT Service San Diego Cost Management E-Commerce Identities 5G IT Address Mobile Device Managment Software Tips Wires Human Error PowerPoint Value of Managed Services 3D Printing Connectivity Digital Obstacle Automobile Computer Care Vulnerabilities Authentication Windows Server Processors Virtual Desktop Disaster Resistance Specifications Gadget Google Wallet Office Tips Telephone Peripheral Permissions Nanotechnology Enterprise Resource Planning Bookmarks Video Conferencing Superfish Legislation IT Technicians WPA3 Financial Bluetooth Break Fix Social Networking GPS Features Hard Drives Wireless Internet Google Docs Business Telephone Update SharePoint Staff Permission Unsupported Software Virus Manufacturing Optimization Spyware Course Unified Threat Management Hotspot Geography Authorization Security Cameras User Management Humor Proactive IT Black Friday Roanoke — Central Technology Solutions Transportation Drones Mobile VoIP PCI DSS Shortcut Fraud Screen Reader Supercomputer Mobile Favorites Backups Social Engineering Biometric USB Mirgation Crowdsourcing Fleet Tracking Procurement Outsource IT Motherboard Tracking Cache Employer/Employee Relationships IT Assessment Firefox Downloads G Suite History Test Deep Learning Virtual Assistant Vendor Mobile Data Marketing Students Webcam Emergency IT Consultant CrashOverride CRM Error Web Server Printers Cameras Motion Sickness Administrator CCTV Hard Disk Drive Relocation Regulation