There are really attractive benefits to mobile workforce. For the business, there’s an immediate cost savings—if most of the workforce has to have the latest and greatest smart phone—why not take advantage of that?
I recently spent some time with Gary Pahl, Atomic Data’s most seasoned Level II Service Desk Technician. He’s been with Atomic Data for over four years and wears many hats as a Level II.
Researchers have released documentation detailing serious vulnerabilities in nearly all modern central processing units (CPUs).
The FCC would like to return to light-touch regulation of ISPs, what does that mean for businesses?
When e-waste is simply thrown away it will find its way to a local trash facility and then most likely to a dump. At the dump, it will sit in a mountain of garbage, exposed to the elements and exposing the elements to it, as well.
Concerned about the Wi-Fi vulnerabilities? Watch Atomic Data's Andrew von Nagy address the vulnerability in our first video blog.
Researchers have released information on ten vulnerabilities of varying severity in Wi-Fi Protected Access Protocol (WPA & WPA2).
Most data breaches have something in common. A rube. An unwitting accomplice to the malicious actors perpetrating an attack. Humans are the weakest link in the cyber-security chain.
The IRS issued a warning about a recent phishing email that tries to trick users into clicking a link to a phony FBI questionnaire that installs ransomware on the user’s computer.
For the thirty days of September, Atomic Data is helping do the doable for two refugee camps in Africa.