Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New ATM Hack Can Steal $50,000 in 15 Minutes!

New ATM Hack Can Steal $50,000 in 15 Minutes!

You might recall getting a notice from your bank that you’ve been issued a new debit and credit card, one with a chip built into it for enhanced security. There are ATMs out there created specifically for use with these chips, but the same technology created to protect user credentials is now being used to steal them for fraudulent withdrawals.

Tip of the Week: Why a Smartphone Might Not Be Such a Smart Idea

Tip of the Week: Why a Smartphone Might Not Be Such a Smart Idea

There’s no questioning that smartphones have done wonders for the world of business. Yet, some workers aren’t willing to adopt smartphones, and prefer their unbreakable nostalgia-filled flip phones.

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Every business has hardware, like workstations, servers, and other devices, that are critical to its operational efficiency. However, managing your hardware can be tricky, especially if you’re a small or medium-sized business that has limited time and resources. If your business doesn’t have a process put in to place to handle hardware inventory and deployment, perhaps it’s time that you consider implementing one.

Microsoft Unveils New Windows as a Service Pricing Model

Microsoft Unveils New Windows as a Service Pricing Model

Is your business accustomed to paying for Windows operating systems up front? Microsoft’s latest “as a service” offering, Windows as a Service, might throw a wrench in your business model, but it could welcome shifts in your IT policy that ultimately allow for more flexibility on your part. Regardless, Windows as a Service provides businesses with the opportunity to reassess their approach to software solutions.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Why Businesses Have to Be More Aggressive When it Comes to Technology

Why Businesses Have to Be More Aggressive When it Comes to Technology

Every business owner is keenly aware of how prominent a role technology has in today’s business environment. Yet, the vast majority of companies aren’t doing enough to keep up with the latest developments, and therefore, risk missing out on serious opportunities for growth, or even going out of business.

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Microsoft’s latest round of security patches includes 27 software vulnerabilities, many of which are critical in nature. Affected are widely-used titles such as Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s important for users to take action and install the Microsoft-provided patches, and soon.

Tip of the Week: How to Find Your Wi-Fi Password

Tip of the Week: How to Find Your Wi-Fi Password

Do you know what your office’s Wi-Fi password is? You’ll need to know, just in case new staff members or clients ask. Thankfully, if you already have a computer that’s connected to your network, you can easily find out what your forgotten Wi-Fi password is.

Can Your Data Backup Solution Stand Up to These 3 Common Threats?

Can Your Data Backup Solution Stand Up to These 3 Common Threats?

These days, businesses practically expect disaster. With so many high-profile hacking attacks in the news, people are paranoid and fear for their data. Yet, even more businesses don’t fear enough, which can lead to unexpected data loss from hackers, natural disasters, and even user error. As a business owner, it’s your responsibility to ensure that your organization is prepared to handle disasters of all kinds.

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Healthcare organizations are a hot topic when it comes to cybersecurity, as even a small data breach could turn into a goldmine for hackers. Recently, IBM’s 2016 Cyber Security Intelligence Index has reported a data breach that exposed more than 10 million medical records, which shows us just how scary a breach of this kind can be. The secret weapon, in many cases, is a threat called ransomware.

Tip of the Week: 4 Ways to Stop Being Such a Workaholic

Tip of the Week: 4 Ways to Stop Being Such a Workaholic

Even though taking a break from work seems like something that everybody would want to do, many cogs in the corporate machine choose to forgo breaks in the name of productivity. Oddly enough, this is a counterproductive move, seeing as taking breaks actually makes you more productive by improving your job performance.

How Virtual Reality is Being Used By Professional Athletes to Avoid Injury

How Virtual Reality is Being Used By Professional Athletes to Avoid Injury

With the National Football League gearing up for its preseason games this August, there are plenty of teams out there looking to get a competitive edge. One way they’re doing so is through virtual reality training, which is a growing platform that may prove useful in preparation for the upcoming season.

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

Tip of the Week: 8 Easy Security Practices to Protect Your Online Browsing

Tip of the Week: 8 Easy Security Practices to Protect Your Online Browsing

The Internet is a great tool to use for business, but it’s also full of threats that could undermine your security if you’re careless. The main issue with cyber security is that it’s extraordinarily difficult to cover all of your bases, especially if you’re not tech-savvy. We’ll go over, in detail, some of the many security best practices that you can implement to keep your sensitive information and account credentials safe from hackers.

Digium Cloud Services (DCS) Maintenance Notification - Saturday, July 30

A message from the Digium Cloud Services Team:

To our valued Digium Cloud Services Partners and Customers,

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

As a side effect of a recent federal ruling, loaning out your Netflix password to your pal so they can catch up on Orange is the New Black is now considered a federal offense.

Windows 10 Free Offer Set to Expire on July 29th

Windows 10 Free Offer Set to Expire on July 29th

It has been quite a year for Microsoft, at least as far as Windows 10 is concerned. Since the release of Windows 10, over 300 million devices worldwide utilize the operating system. If you have considered upgrading, it is strongly recommended you do so as soon as possible.

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

It’s a typical work day. You’re going about your business, when you decide to take a short break and check Facebook. Maybe you see a post that you’d like to share, but you’d rather not have that post on your timeline. While you could just delete it later, there’s a new feature that lets you share a post to your news feed, without posting it on your timeline.

Those Cute Little Emojis May Be Putting Your Data at Risk

Those Cute Little Emojis May Be Putting Your Data at Risk

As the world of technology grows increasingly mobile, emojis are appearing in the most unlikely of places, like business communications. Even though emojis may seem rather cute and innocent, their use by employees may cause more problems than they’re worth. :-O

Blog Archive

2025
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code

Contact us

Learn more about what Ferrum Technology Services can do for your business.