As a managed IT Service provider, we understand the importance of technology in helping businesses stay competitive in the digital age. In today’s fast-paced business environment, staying up to date with the latest tools and technologies is essential for success. However, for small and medium-sized businesses, this can be a challenge. It can be difficult […]
A recently discovered exploit in Log4j, an open-source logging library used by multiple services and applications across the internet, allows attackers to execute remote code on any vulnerable servers. If exploited successfully, attackers can upload and import malware onto compromised servers, rendering those servers, and any machines that may connect to them, infected. Nearly every […]
No one ever said that cutting costs would be easy. In fact, it may be one of the most difficult things you will have to do when owning a business. Cutting costs means reduction, and reduction means people are sometimes let go. All of these can lead you to feel regretful, disappointed, and upset at […]
As businesses become more and more connected to the internet, the threat of a data breach only increases. A study conducting by the University of Maryland in 2017 discovered that, on average, computers with internet access are attacked every 39 seconds. While this figure may be worrisome, this should come as no surprise to most. […]
If you are in the health care business, chances are you have heard the phrase “HIPAA Compliance” before. However, what you may not know is how truly important HIPAA Compliance is for your business, or even what HIPAA Compliance is. No need to worry; Hammett Technologies is here to help! What is HIPAA Compliance HIPAA […]
If you are like many users, you visit many different sites and have a plethora of passwords between those sites. The idea of creating a strong password consisting of letters, numbers, special characters, symbols, etc., can be quite daunting. Not to mention it is recommended that you have a different password for each site your […]
Thunderbolt ports are commonplace on many laptops today. They allow for high-speed connections for data transfer, video display, charging phones, and even the computer itself. However, as useful as Thunderbolt ports are, they also leave one’s computer vulnerable to hackers. Theft and laptops go hand in hand. They are expensive, can hold sensitive information, and […]
Earlier this week, a massive Twitter hack occurred, involving famous individuals and high-profile politicians. These hacked accounts asked for bitcoins and offered to “double the amount” to “give back to the community.” Twitter, while conducting its investigation, has commented on the situation, stating that the hackers had specifically targeted employees who had access to internal […]
Security researchers have discovered a security hole in Samsung, LG, Huawei, Sony, and other Android-based phones, leaving multiple users vulnerable to phishing attacks through text messaging. The exploit takes advantage of the over-the-air (OTA) provisioning. Security researchers discovered that the industry standard of OTA provisioning, Open Mobile Alliance Client Provisioning (OMA CP), can be hacked […]
It’s finally time to say goodbye to our old friend. In a few months, January 14, 2020, to be exact, Windows 7 will officially no longer be receiving security patches and updates from Microsoft. Therefore, if you are one of the many still calling Windows 7 your home, it may be time to think about […]