<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tech News Archives</title>
	<atom:link href="https://info.globalit.com/category/tech-news/feed/" rel="self" type="application/rss+xml" />
	<link>https://info.globalit.com/category/tech-news/</link>
	<description>The Global IT blog website</description>
	<lastBuildDate>Mon, 30 Jun 2025 16:49:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://info.globalit.com/wp-content/uploads/2024/02/favico-globalit-60x60.png</url>
	<title>Tech News Archives</title>
	<link>https://info.globalit.com/category/tech-news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Healthcare IT</title>
		<link>https://info.globalit.com/it-in-medical/</link>
					<comments>https://info.globalit.com/it-in-medical/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Mon, 16 Sep 2019 18:10:47 +0000</pubDate>
				<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://info.globalit.com/?p=14393</guid>

					<description><![CDATA[<p>There is no question that technology is causing massive changes in how healthcare is being managed. Healthcare IT solutions have aided the way people are being cared for worldwide from hospitals, clinics and health centers. It has helped provide more accurate diagnosis, reduced medical management expenses, helped cut down on medical errors and has made… <a href="https://info.globalit.com/it-in-medical/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/it-in-medical/">Healthcare IT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is no question that technology is causing massive changes in how healthcare is being managed. <a href="https://globalit.com/industry/tech-and-it-support-for-healthcare/" target="_blank" rel="noopener noreferrer">Healthcare IT solutions</a> have aided the way people are being cared for worldwide from hospitals, clinics and health centers. It has helped provide more accurate diagnosis, reduced medical management expenses, helped cut down on medical errors and has made the industry more efficient on both the administrative and medical side. Ultimately, incorporating cutting edge technologies in any medical practice will help improve the use of time and money.</p>
<p>This influx of new technology does not come without some concerns. New hardware and software can be difficult to understand and may result in a hesitancy to adopt, but the benefits of such technology cannot be overlooked. Healthcare facilities risk being left behind by more technologically advanced health centers that have more efficient workforces and happier patients. The positives and negatives need to be weighed out carefully in order to determine if specific technology is worth adopting. The following are some of the things that should be considered prior to implementing new hardware or software:</p>
<h3>Positives:</h3>
<p><strong>More efficient workforce</strong>. Adopting new technology allows your medical staff to offload many of the day to day administrative tasks including: appointment scheduling, medical billing, management of patient health records and much more. This improvement in workforce efficiency can free up a lot of time so your staff can focus more on patient care and other aspects of customer service.</p>
<p><strong>Digitized Health Records. </strong>Entering data in a centralized, electronic database allows patients to access their health records with the click of a button, providing them with the opportunity to review and submit any corrections instantly. Test results can be accessed as soon as they become available.</p>
<p>Digitized health records provide benefits to healthcare staff as well. Doctors and nurses are able to access real time health records that will make patient care safer and more reliable. Using handheld or portable devices for entering patient data will help ensure that all important information is updated accurately and efficiently. Additionally, staff are able to submit medical claims at a much faster rate.</p>
<p><strong>Improved Patient Communications. </strong>Medical facilities can implement a chat feature that is incorporated to a company website or accessed through client profiles. This emphasizes easier communications between medical staff and patients in regards to questions, concerns and follow ups on appointments. Virtual visits are another form of communication that allow patients attend appointments from the comfort of their home, this can help if a doctor or specialist is a long distance from the patient or if a patient is too sick to leave their home. Virtual appointments also provide scheduling benefits for busy doctors, who can now schedule patients at times that best fit their schedule.</p>
<h3>Negatives:</h3>
<p><strong>Lack of Network Interconnectivity. </strong>Not all technology will work seamlessly together. Having the right technology that works well together is critical to taking advantage of workplace and financial efficiencies. If certain systems don’t work well together, patient care can suffer as some information may be missing or not accurate.</p>
<p><strong>Patient Data that is not so Private. </strong>Many healthcare facilities use large cloud providers for data storage, my first question for these providers would be what they can and can’t do with the data. Many cloud providers have long service agreements that outline what they could possibly do with the data. This legal terminology can be difficult to understand and overwhelming to read through.</p>
<p>An additional privacy issue emerges when you consider how data is transmitted from the cloud to users. The cloud uses hardware and software to transmit data through an internet connection. Different types and quality of devices and internet services can be used by doctors and patients to access this information, leaving open the possibility for different types of vulnerabilities if they are not careful.</p>
<p><strong>Hacked Medical Records. </strong>In 2018, UnityPoint Health had to notify 1.4 million patients that their confidential records may have been compromised through a data breach. This data breach included very sensitive information such as medical data, test results, credit card information, social security numbers, and much more. The financial ramifications are large and the resulting reputation damage can put a medical facility out of business.</p>
<p>These risks can and should be mitigated properly by an experienced and trusted IT solutions provider.</p>
<p>In the end, there is always benefits and risks that need to be weighed before implementing new technology. Minimizing the risks are key, even if the benefits far outweigh any negatives. Taking the proper precautions such as arranging for annual security audits, using industry leading security products, having a dependable and redundant network in operation, consulting IT professionals before adopting new technology and using a cloud provider that keeps your data private are all steps that should be taken prior to any new technology implementation.</p>
<p>Do you have any specific concerns when new technology is implemented at your facility? Please submit any tips or concerns related to technology implementation by submitting a reply, located at the bottom of this blog post, clicking the following <a href="https://globalit.com/industry/tech-and-it-support-for-healthcare/" target="_blank" rel="noopener noreferrer">link</a>, or contacting info@globalit.com</p>
<p>The post <a href="https://info.globalit.com/it-in-medical/">Healthcare IT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/it-in-medical/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Women in IT</title>
		<link>https://info.globalit.com/women-in-it/</link>
					<comments>https://info.globalit.com/women-in-it/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Tue, 16 Jul 2019 22:30:59 +0000</pubDate>
				<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://info.globalit.com/?p=14382</guid>

					<description><![CDATA[<p>It is 2019, women in tech are on the rise and making their presence known in a historically male dominated industry. Early Education for IT based Careers Historically, boys have received more positive reinforcement in their pursuit of IT related educational goals, while girls were often pushed to pursue non-tech related fields, but this is… <a href="https://info.globalit.com/women-in-it/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/women-in-it/">Women in IT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It is 2019, women in tech are on the rise and making their presence known in a historically male dominated industry.</p>
<h3><strong>Early Education for IT based Careers</strong></h3>
<p>Historically, boys have received more positive reinforcement in their pursuit of IT related educational goals, while girls were often pushed to pursue non-tech related fields, but this is changing. According to a Small Business Trends survey, girls have a natural interest in tech related fields that typically peaks at 11 years old. In 2018, more than 38,000 girls took the Computer Science Advanced Placement exam in high school, this is 10 times the number of girls that took it in 2000, so the interest is there and it’s growing. This trend has also expanded to college where there is an upward trend of women graduating with degrees in IT related fields. According to the National Center for Women &amp; Information Technology, more women are obtaining computing degrees, but a large gender gap still exists.</p>
<h3><strong>The Workplace</strong></h3>
<p>According to the U.S. Bureau of Labor Statistics, women make up about 57% of the labor force. However, women make up less than 20 percent of U.S. tech jobs based on data from virtual event solutions company Evia.</p>
<p>Even with the small percentage of women holding onto an IT position in the tech industry, many are discouraged from keeping their position. In fact, women are <a href="https://fairygodboss.com/articles/women-in-tech-facts-figures-and-percentages">twice more likely to quit their IT job</a>. Why you ask? Because of the many different issues revolving around gender inequality, the pay gap and their overall workplace experience with their fellow male coworkers.</p>
<p>Fortunately, this isn’t always the case. Many women in the IT industry find the support they need from fellow female industry peers, focusing on their own skills and abilities and even finding a mentor. In an article written on the website fairygodboss.com, one woman stated:</p>
<blockquote><p><em>“There is strength in numbers and the numbers representing women in tech are not currently in our favor—yet. Every unique challenge brings an opportunity to do something about it. Being a woman in tech is a badge of honor. Wear it proud, loud and continue to do the hard work to help lead the way for others. Even if you&#8217;re uncomfortable inciting change at your own company, there are plenty of ways to make a difference.”</em></p>
<p><em>Michelle Wingard </em></p></blockquote>
<h3><strong>How You Can Help</strong></h3>
<p>Plain and simple – pursuing a career in technology is more difficult for women than it has been for men. A vast number of girls and women do not pursue a career in tech because society tells them that they are neither good or smart enough to take on such a scientific and technological position. The next time a female speaks to you about her passion in tech, shows interest in the field or is currently trying to pursue a career in it, we encourage you to encourage her, support her and remind her that she is capable of taking on such a male dominated field of IT.</p>
<p>Here at Global IT, we believe in providing supportive mentors that encourage young women to continue their pursuit of their tech related goals and we understand the importance of continued support and increasing post-graduation career opportunities in order to do our part in closing this gender gap. That is why we offer mentorship and internship opportunities to young women in high school and college that have an interest in IT. If you or someone you know is interested in learning more about these opportunities, please contact us at <a href="mailto:info@globalit.com">info@globalit.com</a> for more information.</p>
<p><strong> </strong></p>
<p>The post <a href="https://info.globalit.com/women-in-it/">Women in IT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/women-in-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>25 Top Managed IT and Tech Support Companies in Los Angeles</title>
		<link>https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/</link>
					<comments>https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Wed, 09 Jan 2019 21:59:31 +0000</pubDate>
				<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://info.globalit.com/?p=14288</guid>

					<description><![CDATA[<p>There are a lot of tech support companies and managed IT firms in Los Angeles. If you have a business, these companies will procure internet service for you, back up your data in the cloud, protect you from viruses, and provide 24/7 tech support. With so many options available in Los Angeles, it&#8217;s tough to… <a href="https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/">25 Top Managed IT and Tech Support Companies in Los Angeles</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a lot of tech support companies and managed IT firms in Los Angeles. If you have a business, these companies will procure <a href="https://globalit.com/services/internet-services/internet-access/" target="_blank" rel="noopener noreferrer">internet service</a> for you, back up your <a href="https://globalit.com/services/cloud-services/cloud-backup-services-los-angeles/" target="_blank" rel="noopener noreferrer">data in the cloud</a>, <a href="https://globalit.com/services/computer-security/endpoint-security/" target="_blank" rel="noopener noreferrer">protect you from viruses</a>, and <a href="https://globalit.com/services/technical-services/managed-it-msp-los-angeles/" target="_blank" rel="noopener noreferrer">provide 24/7 tech support</a>. With so many options available in Los Angeles, it&#8217;s tough to know where to get started. That&#8217;s why many businesses start with a Google search.</p>
<h2>Why Doing a Google Search for Managed IT Companies in Los Angeles Can Be Misleading</h2>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-14313" src="https://info.globalit.com/wp-content/uploads/2019/01/fishark.png" alt="managed IT, los angeles, tech support, LA, " width="620" height="370" srcset="https://info.globalit.com/wp-content/uploads/2019/01/fishark.png 620w, https://info.globalit.com/wp-content/uploads/2019/01/fishark-300x179.png 300w" sizes="(max-width: 620px) 100vw, 620px" /></p>
<p>Unfortunately, when you do a Google search for &#8220;<a href="https://globalit.com/" target="_blank" rel="noopener noreferrer">Managed Services Provider Los Angeles</a>&#8221; businesses in Riverside County, Orange County, and other non-Los Angeles counties, come up quite often in the organic search results. Also, many managed IT firms from out of state come up in the paid results, which are easy to click on because they show up on top.</p>
<p>A classic maxim in real estate is location, location, location. It applies when picking a managed IT company too. If your business is in Los Angeles County, you want a managed IT company in Los Angeles. Tech support firms that are closer will provide faster and cheaper on-site support.</p>
<h2>25 Managed IT Firms in Los Angeles County With Great Reviews</h2>
<p>As we mentioned before, finding the best managed IT firm in Los Angeles is tough. Where do you start? Here are some simple rules that will narrow down your search.</p>
<ol>
<li>Location- You want a company that&#8217;s actually in Los Angeles County.</li>
<li>Established- You want a company that&#8217;s been in business for a while.</li>
<li>Testimonials- You want a company with glowing reviews.</li>
</ol>
<p>That&#8217;s why we decided to compile a list of 25 popular managed IT firms that are in Los Angeles. We looked for companies in Los Angeles with great reviews. We also made sure they&#8217;ve been in business for a while (the newest company on the list was established in 2010).</p>
<p>This list is in no particular order.</p>
<h2><a href="https://globalit.com/">1)  </a><a href="https://globalit.com/" target="_blank" rel="noopener noreferrer">Global IT</a></h2>
<p>Location: 6720 Bright Ave, Whittier, CA 90601</p>
<p>Established: 2000</p>
<p>Customer Quote: &#8220;They are the best IT service provider I ever came across. Very prompt in resolving problems.&#8221;</p>
<h2>2) Advanced Networks</h2>
<p>Location: 4929 Wilshire Blvd Suite: 941 Los Angeles, CA 90010</p>
<p>Established: 2004</p>
<p>Customer Quote: As good as it gets. Patient, knowledgeable, great attitude, and go beyond the call of duty.</p>
<h2>3) IT Support LA</h2>
<p>Location: 6047 Tampa Ave, Tarzana, CA 91356</p>
<p>Established: 2002</p>
<p>Customer Quote: &#8220;We use IT Support LA and our agency couldn&#8217;t be happier with their services.&#8221;</p>
<h2>4 ) TPX Communications</h2>
<p>Location:  990 W 190th St, Ste 120, Torrance, CA 90502</p>
<p>Established: 1998</p>
<p>Customer Quote: &#8220;These guys look for problems early and actively and I appreciate their availability to respond to me if/when I have a question or concern.&#8221;</p>
<h2>5)  Be Structured</h2>
<p>Location:  500 S Grand Ave Suite 1150 Los Angeles, CA 90071</p>
<p>Established: 2007</p>
<p>Customer Quote: &#8220;Be Structured is always there giving us new ideas and solutions to help our company run more efficiently and cost effectively in today’s competitive market.”</p>
<h2>6) Xperts Unlimited</h2>
<p>Location: 13428 Maxella Ave, Marina del Rey, CA 90292</p>
<p>Established: 2000</p>
<p>Customer Quote: This company is amazing. I&#8217;ve never met a better group of people.</p>
<h2>7) TechMedics</h2>
<p>Location: 527 W Seventh Street, Suite 500, Los Angeles, CA 90014</p>
<p>Established: 1999</p>
<p>Customer Quote: &#8220;I was nobody, nowhere &#8211; until I met Techmedics!&#8221;</p>
<p>Tech Medics is on 7th Street in the heart of Los Angeles. They started in 1999 with two employees. Like all good managed IT companies they tout their proactive approach.</p>
<h2>8 ) Computer Support</h2>
<p>Location: 8605 Santa Monica Blvd, Los Angeles, CA 90069</p>
<p>Established: 2006</p>
<p>Customer Quote: &#8220;The wide variety of expertise they bring to our company not only in running the existing network but in the telecom area, planning for growth and budgeting has been a tremendous asset.&#8221;</p>
<h2>9) DCGLA</h2>
<p>Location:  600 W, 7th St Ste 550, Los Angeles, CA 90017</p>
<p>Established: 1993</p>
<p>Customer Quote: &#8220;If you are in the need to find an IT support provider in Los Angeles, look no further.&#8221;</p>
<h2>10) TVG Consulting</h2>
<p>Location: 217 W. Alameda Ave. #102, Burbank, CA, 91502</p>
<p>Established: 2005</p>
<p>Customer Quote: &#8220;They are very competent and concerned about each customer no matter how large or small.&#8221;</p>
<h2>11) ZZ Computer</h2>
<p>Location: 11968 Wilshire Boulevard, West Los Angeles, California 90025</p>
<p>Established: 1989</p>
<p>Customer Quote: &#8220;ZZ Computer is a great asset to our IT needs!</p>
<h2>12) Front Line</h2>
<p>Location: 6711 Forest Lawn Drive, 2nd Floor, Los Angeles, CA 90068</p>
<p>Established: 2002</p>
<p>Customer Quote: A great team! Very attentive to their clients, always friendly, and I have yet to present an issue they&#8217;ve not been able to solve. Highly recommended.</p>
<h2>13) Net Ready IT</h2>
<p>Location: 5015 Eagle Rock Blvd. , Suite 208, Los Angeles, California 90041</p>
<p>Established: 1995</p>
<p>Customer Quote: &#8220;All of the Netready team members are fantastic, they always find a way to get to the bottom of our issues.&#8221;</p>
<h2>14) Pro-Link Systems</h2>
<p>Location: Woodland Hills, California, United States</p>
<p>Established: 1999</p>
<p>Customer Quote: &#8220;I have loved working with every single person at ProLink without exception. They have all gone personally above and beyond the call of duty to ensure that any of my technical difficulties are resolved in a matter of minutes.&#8221;</p>
<h2>15) LA-Networks</h2>
<p>Location: 5805 Sepulveda Blvd, Suite 710, Sherman Oaks, CA 91411</p>
<p>Established: 1997</p>
<p>Customer Quote: &#8220;LA Networks focuses on helping Southern California businesses with enterprise technology solutions including Cisco and AWS.&#8221;</p>
<h2>16) Info 2 Extreme</h2>
<p>Location: 5777 W. Century Blvd., Suite 1500 Los Angeles, CA 90045</p>
<p>Established: 1995</p>
<p>Customer Quote: &#8220;The perfect blend of technical innovation and business acumen is i2x.&#8221;</p>
<h2>17) Clear Fuze</h2>
<p>Location: 11693 San Vicente Blvd. Suite 395 Los Angeles, CA 90049</p>
<p>Established: 2002</p>
<p>Customer Quote: &#8220;When things go wrong, as they inevitably do when working with computers, it&#8217;s very comforting to know they are there.&#8221;</p>
<h2>18) CPI Solutions</h2>
<p>Location: 2260 E. El Segundo Blvd. El Segundo, CA 90245</p>
<p>Established: 1981</p>
<p>Customer Quote: &#8220;CPI is proactive and we always feel like they are one step ahead of us.&#8221;</p>
<h2>19) GeekTek</h2>
<p>Location: 4419 Van Nuys Blvd, Suite 412, Sherman Oaks, California, 91403</p>
<p>Established: 2010</p>
<p>Customer Quote: &#8220;They&#8217;re not your typical IT crew. They&#8217;re very friendly and approachable.&#8221;</p>
<h2>20) Fantastic IT</h2>
<p>Location: 3720 Skypark Drive, Torrance, California 90505</p>
<p>Established: 1998</p>
<p>Customer Quote: &#8220;When it comes down to proper IT for business, look no further than Fantastic IT.&#8221;</p>
<h2>21) Barebones Networking</h2>
<p>Location: 7083 Hollywood Blvd, 5th Floor, Los Angeles, CA 90028</p>
<p>Established: 2003</p>
<p>Customer Quote: &#8220;great service, friendly and pro, recommended A+++++&#8221;</p>
<p>*Note: Yelp says this location is closed but their website is still up.</p>
<h2>22) Techital</h2>
<p>Location:  144 N Glendale Ave, Ste 301, Glendale, CA 91206</p>
<p>Established: 2001</p>
<p>Customer Quote: &#8220;If I could give more than 5 stars I would.&#8221;</p>
<h2>23) DLL Technologies</h2>
<p>Location: 115 E Foothill Blvd #200, Glendora, CA 91741</p>
<p>Established: 2005</p>
<p>Customer Quote: &#8220;Great IT firm for small business.&#8221;</p>
<h2>24) Generation IX</h2>
<p>Location: 5839 Green Valley Cir Suite 103, Los Angeles, CA 90230</p>
<p>Established: 1984</p>
<p>Customer Quote: Four years later and we still talk about their work in our office.</p>
<h2>25) Secure-Net</h2>
<p>Location: 3250 Wilshire Blvd, Ste 920, Los Angeles, CA 90010</p>
<p>Established: 1991</p>
<p>Customer Quote: &#8220;Thanks to my conversation with Dave a few days ago, I just came up with the best [workflow] for our practice.&#8221;</p>
<h2>Do Businesses in LA County Really Need a Managed IT Company in Los Angeles County?</h2>
<p>Most IT support is provided remotely. So, some businesses think their IT company doesn&#8217;t need to be close. However, that is usually a mistake that results in slower (and sometimes more expensive) on-site calls. That&#8217;s because even small and medium-sized businesses have complex needs that will occasionally require an on-site call.</p>
<h2>Global IT Cares About Your Business</h2>
<p>That&#8217;s why we made this list. Our customers have told us that finding a managed IT company in Los Angeles can be stressful. We wanted to make the process of finding the best managed IT company in LA a little easier for you. Also, this list has more managed IT companies in Los Angeles.</p>
<p>Of course, we think Global IT is the best managed IT company in LA. After all, Silicon Review called us one of the <a href="https://globalit.com/" target="_blank" rel="noopener noreferrer">Best 30 Small Companies to watch in 2018</a> and Enterprise Services Outlook called us the <a href="https://globalit.com/" target="_blank" rel="noopener noreferrer">Most Recommended Compliance Provider</a>.</p>
<p><a href="https://globalit.com/" target="_blank" rel="noopener noreferrer"><img decoding="async" class="alignnone wp-image-14179" src="https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button.jpg" alt="global-it-shop-managed-it-gdpr-compliance" width="600" height="67" srcset="https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button.jpg 843w, https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button-300x33.jpg 300w, https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button-768x86.jpg 768w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p>The post <a href="https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/">25 Top Managed IT and Tech Support Companies in Los Angeles</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/25-top-managed-it-and-tech-support-companies-in-los-angeles/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Essential Guide to Understanding Ransomware</title>
		<link>https://info.globalit.com/the-essential-guide-to-understanding-ransomware/</link>
					<comments>https://info.globalit.com/the-essential-guide-to-understanding-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Wed, 12 Dec 2018 21:59:52 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://info.globalit.com/?p=14264</guid>

					<description><![CDATA[<p>Ransomware is a serious threat for companies of all sizes. The objective of this article is to showcase the dangers of ransomware and (more importantly) to give companies cutting-edge tactics they can use to protect themselves. The False Narrative About Ransomware This article’s readers will fall into two categories: those who have been recently affected… <a href="https://info.globalit.com/the-essential-guide-to-understanding-ransomware/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/the-essential-guide-to-understanding-ransomware/">The Essential Guide to Understanding Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is a serious threat for companies of all sizes. The objective of this article is to showcase the dangers of ransomware and (more importantly) to give companies cutting-edge tactics they can use to protect themselves.</p>
<h2>The False Narrative About Ransomware</h2>
<p>This article’s readers will fall into two categories: those who have been recently affected by a ransomware attack and those who haven’t. The former group will have no illusions about the perniciousness of modern ransomware. However, the latter group may be under the misconception that ransomware is becoming extinct. After all, there are many headlines on the web touting the decline of ransomware.</p>
<p><a href="https://www.theregister.co.uk/2018/07/12/malware_sitrep/">Ransomware Is so 2017</a></p>
<p><a href="https://www.techrepublic.com/article/why-cryptomining-is-the-new-ransomware-and-businesses-must-prepare-for-it/">Why Cryptomining Is the New Ransomware</a></p>
<p><a href="https://healthitsecurity.com/news/cybercriminals-move-from-ransomware-attacks-to-crypto-mining">Cybercriminals Move from Ransomware Attacks to Crypto Mining</a></p>
<p><a href="https://resources.infosecinstitute.com/the-decline-of-ransomware-and-the-rise-of-cryptocurrency-mining-malware/#gref">The Decline of Ransomware and the Rise of Cryptocurrency Mining</a></p>
<p>Nevertheless, the statistics gainsay the decline of ransomware. The headlines don&#8217;t tell the whole story. Ransomware is still alive and thriving. Look at the following statistics.</p>
<ul>
<li>48% of IT consultants noted an increase in ransomware related consolation and inquires. (Intermedia, 2017)</li>
<li>From 2016 to 2017 Ransomware attacks spiked 350%. (Dimension Data, 2018)</li>
<li>In 2017, 25% of cyber insurance claims were because of ransomware. (AIG, 2018)</li>
<li>WannaCry ransomware could cost businesses $4 billion (Cyence, 2017)</li>
</ul>
<p>Organizations of all sizes are impacted by ransomware attacks, even as rumors of ransomware’s decline float around the internet. These attacks are inconvenient and expensive. For instance, the town of Matanuska-Susitna, Alaska had its phones, servers, computers, and email exchange crippled by ransomware, forcing the town’s employees to use <a href="https://mashable.com/2018/08/02/malware-alaska-town/?europe=true#bA_nUjlXmOqU">typewriters</a>. Likewise, the city of Atlanta had to pay <a href="https://www.ajc.com/news/confidential-report-atlanta-cyber-attack-could-hit-million/GAljmndAF3EQdVWlMcXS0K/?icmp=np_inform_variation-control">17 million</a> to clean up the devastating SamSam ransomware attack.</p>
<p>In summary, ransomware is still active and pernicious.</p>
<h2>No Industry Is Safe From Ransomware</h2>
<p>You may have noticed the examples above (Atlanta and Matanuska-Susitna) involve public sector organizations. It’s true that many high-profile ransomware salvos are against municipalities. At the same time, there is a myriad of ransomware attacks against the private sector. Here are some headlines that show the private sector is not immune to ransomware assaults.</p>
<ul>
<li><a href="https://www.wane.com/news/local-news/ransomware-attack-targets-adams-memorial-hospital/1035687429">Ransomware Attack Targets Adams Memorial Hospital</a></li>
<li><a href="https://www.healthcareitnews.com/news/allscripts-sued-over-ransomware-attack-accused-wanton-disregard">Allscripts sued over ransomware attack, accused of ‘wanton’ disregard</a></li>
<li><a href="http://www.greenfieldreporter.com/2018/01/16/01162018dr_hancock_health_pays_ransom/">Hospital pays $55,000 ransom; no patient data stolen, Greenfield, IN</a></li>
<li><a href="https://www.beckershospitalreview.com/cybersecurity/labcorp-90-recovered-from-samsam-ransomware-attack.html">LabCorp 90% recovered from SamSam ransomware attack, Burlington, NC</a></li>
</ul>
<p>You can find a myriad of examples of private sector companies that have fallen victim to ransomware. Here’s another point to consider: some ransomware attacks are never reported. Municipalities and hospitals typically have government regulations that demand disclosure. Conversely, many private sector businesses are bound by no such regulations and wish to stay out of the press. Therefore, the rate of ransomware attacks against private organizations is likely much higher than we know.</p>
<h2>Practical Ways to Protect Your Company From Ransomware</h2>
<p><strong>Inventory Your Internet-Facing Assets-</strong> When your network is connected to the internet, your security is tested. Your internet-facing assets are open to being probed by hackers. The first step to securing these ports is to catalog them. Once they’re totally archived, you can ensure they’re protected by your security measures.</p>
<p><strong>Filter All Email for Spam Messages-</strong> Email attachments with ransomware infect <a href="https://www.dcsny.com/technology-blog/invoice-email-attachment-is-ransomware-locky/">millions of computers</a>. You can protect yourself by not opening up unsolicited attachments in unverified emails.</p>
<p><strong>Macros-</strong> Disallow macros unless they’ve been verified by your IT admin or your managed IT team.</p>
<p><strong>Limit RDP Access-</strong> Require all RDP access to be routed over a VPN secured by 2-factor authentication.</p>
<p><strong>Comprehensive Backup System-</strong> Disaster recovery as a service and a potent cloud backup will help remove the sting of ransomware.</p>
<p><strong>Ransomware Protocol for Employees-</strong> Don’t allow bad company policy to compound the negative effects of ransomware. Employees must know who to alert in case of a ransomware attack. Also, employees often fear retribution when coming forth about a cyber-attack. Time is critical in these instances, so it’s imperative you alleviate these concerns so employees feel comfortable coming forward. Lastly, employees should have a clear directive about what can be discussed with the outside world.</p>
<h2>Should You Pay a Ransom</h2>
<p>IT professionals are of two minds about paying a ransom. First off, you have a couple of alternatives. <a href="https://www.welivesecurity.com/2018/03/07/ransomware-revolution/">David Harley</a>, the Senior Research Fellow at ESET, suggests contacting your security software vendor because recovery may be possible without paying the ransom. Second, Harley opines you may be able to restore your data from backups.</p>
<p>Recovering from backups can be more expensive than paying a ransom. That’s why businesses decide to pay. This is often a bad idea. Even if you pay, there’s no guarantee the hackers will keep their word and decrypt your data. There are many accounts of hackers asking for second payments or never decrypting data. On a macro scale, you’re also validating the business model behind the crime.</p>
<p>If you decide to implement a policy of paying ransoms, then make sure you designate someone in the company to be the negotiator. Having the proper policy and procedure is key.</p>
<h2>Conclusion</h2>
<p>More and more companies are depending on data and technology. As that trend continues, ransomware will likely continue to grow. To deal with the growing ransomware threats it’s critical that your organization addresses risk management tactics. This can be done internally or by consulting endpoint security experts like your managed IT company. Contact us today for more info.</p>
<p><a href="https://globalit.com/shop/"><img decoding="async" class="wp-image-1480 size-full aligncenter" src="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png" alt="" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/managed-it-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p>The post <a href="https://info.globalit.com/the-essential-guide-to-understanding-ransomware/">The Essential Guide to Understanding Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/the-essential-guide-to-understanding-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Facts Businesses in Los Angeles Need to Know About the GDPR</title>
		<link>https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/</link>
					<comments>https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Wed, 01 Aug 2018 18:44:42 +0000</pubDate>
				<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://info.globalit.com/?p=14172</guid>

					<description><![CDATA[<p>“The status quo has been completely redefined.” That’s what the Chief Security Officer of Egnyte, Kris Lahiri, says about the GDPR. Most tech watchers tend to agree with him. Without further ado, here’s a brief summary about the GDPR. What Is the GDPR? The General Data Protection Regulation (GDPR) is a sweeping new European Union… <a href="https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/">8 Facts Businesses in Los Angeles Need to Know About the GDPR</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>“The status quo has been completely redefined.”</p>
<p>That’s what the Chief Security Officer of Egnyte, <a href="https://www.businessinsider.com/what-is-gdpr-regulation-explained-2018-4">Kris Lahiri</a>, says about the GDPR. Most tech watchers tend to agree with him. Without further ado, here’s a brief summary about the GDPR.</p>
<h2>What Is the GDPR?</h2>
<p>The General Data Protection Regulation (GDPR) is a sweeping new European Union privacy law. It doesn’t only affect Europeans. Because of the widespread reach of the EU, sometimes referred to as the <a href="https://en.wikipedia.org/wiki/Brussels_effect">Brussels Effect</a>, the GDPR has major consequences for businesses around the world. This includes many businesses in Los Angeles.</p>
<p>To cut a long story short, the GDPR replaced an outdated 1995 law called the European Data Protection Directive (EDPD). Since the EDPD was created in 1995, it was totally irrelevant for the digital age. Computer usage and data collection have exploded since the 1990’s, so a change was badly needed. In 2012, the European Commission proposed a comprehensive reform of the EDPD. Among other things, this law was meant to protect consumers privacy, curtail email spam, and make data collection more transparent. Notwithstanding, the law took the slow boat to China. It only gained teeth in May of 2018.</p>
<p>The GDPR is strict. And not complying with it is really expensive. Here are 8 facts businesses in Los Angeles need to know about the GDPR so they can protect their pocketbook.</p>
<h3>1)  There Are Heavy Consequences for Noncompliance</h3>
<p>Unless you have money to burn, you don’t want to run afoul of the GDPR. Disobeying the GDPR can cost you 20 million Euros (about 23.3 million Dollars as of August 2018). Technically, the fees don’t stop at 20 million Euros. If your company is rolling in money, you can be fined 4% of global annual turnover.</p>
<h3>2)  It Doesn’t Just Affect Businesses in Europe</h3>
<p>As mentioned earlier, the Brussels Effect is real. The GDPR affects businesses all over the world. If you target a data subject in Europe with marketing efforts, then the GDPR affects you. In particular, U.S. based hospitality businesses, software companies, and e-commerce businesses are especially vulnerable to the GDPR.</p>
<h3>3)   Some Businesses in Los Angeles Aren’t Affected by the GDPR</h3>
<p>However, it&#8217;s only the ones that don’t target European consumers with any marketing efforts. If you don’t sell products to Europeans or collect/buy/use emails from Europe the law doesn&#8217;t conern you.</p>
<h3>4)   Los Angeles Businesses Are Already Changing for the GDPR</h3>
<p>One of the most noteworthy examples is the Los Angeles Times. They’ve shut off access to internet users in the EU. The Chicago Tribune has also closed its doors. Tronc, the company that owns these two outlets (and other papers) won’t risk non-compliance because of the high fees. The GDPR is the real deal.</p>
<h3>5)   The GDPR Gives Individuals Eight Rights</h3>
<p>The GDPR is incredibly consumer-friendly legislation. It gives Europeans consumers a plethora of rights and protects their privacy. In detail, it gives these eight rights.</p>
<ul>
<li>The Right to Access- Consumers can request free access to their personal data anytime. They can also ask how the company is using their data.</li>
<li>The Right to Be Forgotten- Customers have the right to ask for their data to be deleted.</li>
<li>The Right to Data Portability- Consumers can request data is transferred from one service provider to another.</li>
<li>The Right to Be Informed- Individuals must be informed before data (like an email address) is collected.</li>
<li>The Right to Have Data Corrected- Consumers have the right to have their data updated if it’s incorrect (although, a company probably wouldn’t want out-of-date data in the first place).</li>
<li>The Right to Restrict Processing- Individuals can ensure their data isn’t used for processing.</li>
<li>The Right to Object- EU consumers can remove themselves from an email list or a phone list, and direct marketing must stop immediately.</li>
<li>The Right to Be Notified- If data is hacked, the consumer must be informed about it in 72 hours.</li>
</ul>
<h3>6) May 25<sup>th</sup>, 2018 Was the First Day Fines Started</h3>
<p>You may have heard about the GDPR for years. It’s officially been on the books since 2016. Yet, fines only started on May 25<sup>th</sup>, 2018.</p>
<h3>7) Good Faith Attempts to Comply Aren’t Enough</h3>
<p>There are lots of articles floating around talking about the effectiveness of good faith attempts to comply with the GDPR. These do help. Yet, the true course of love never did run smooth. In other words, good faith attempts aren’t enough to guarantee you won’t get a fine. If that was the case, the Los Angeles wouldn’t be blocking its European readership.</p>
<h3>8) You Can&#8217;t Comply With the GDPR in Five Minutes</h3>
<p>Applying with the GDPR is difficult. For one thing, it requires all of your emails to be collected with consent from the user. And the burden of proof is on you. Many legacy tech systems make this proof difficult or unattainable. Also, even one email can be a problem. The CAN-SPAM Act has fines of up to $16,000 for each email address that’s wrongly solicited. The law is complex, and if you do any business in Europe you need to spend time understanding it. Otherwise, it may come back and bite you.</p>
<h2>Where Can I Learn More About the GDPR?</h2>
<p>If you want to learn more about the GDPR, a good place to start is the <a href="https://www.ngdata.com/gdpr-compliance-guide/">GDPR Compliance Guide</a>. You can also contact a GDPR expert at Global IT. We’re a managed IT company in Los Angeles. We work with LA-based businesses that sell products in Europe, and we can make your business 100% GDPR compliant.</p>
<p><a href="https://globalit.com/product-category/managed-it/"><img loading="lazy" decoding="async" class="alignleft wp-image-14179" src="https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button.jpg" alt="global-it-shop-managed-it-gdpr-compliance" width="650" height="72" srcset="https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button.jpg 843w, https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button-300x33.jpg 300w, https://info.globalit.com/wp-content/uploads/2018/08/global-it-shop-now-button-768x86.jpg 768w" sizes="(max-width: 650px) 100vw, 650px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/">8 Facts Businesses in Los Angeles Need to Know About the GDPR</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/8-facts-businesses-in-los-angeles-need-to-know-about-the-gdpr/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Future of IoT</title>
		<link>https://info.globalit.com/the-future-of-iot/</link>
					<comments>https://info.globalit.com/the-future-of-iot/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Thu, 03 Nov 2016 18:16:04 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Dedicated Internet]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=1520</guid>

					<description><![CDATA[<p>Imagine a world where your toaster and coffee maker know what time you wake up in the morning and your toaster starts warming up, while your coffee maker starts brewing your coffee before you come downstairs. As part of your wardrobe, you put on a shirt that sends vital information to your doctor if you… <a href="https://info.globalit.com/the-future-of-iot/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/the-future-of-iot/">The Future of IoT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine a world where your toaster and coffee maker know what time you wake up in the morning and your toaster starts warming up, while your coffee maker starts brewing your coffee before you come downstairs. As part of your wardrobe, you put on a shirt that sends vital information to your doctor if you suddenly become ill. Your car knows exactly what temperature you like the environmental controls set to, and your tablet starts downloading news stories based on what you read the day before.</p>
<p>It sounds like the distant future, but it is all happening right now. It is called the Internet of Things (IoT), and it could change the way you live and work. Smart cities are already in the planning stages that reduce vehicle emissions, are much more energy efficient, and handle traffic in such a way as to reduce traffic jams and pedestrian injuries. It all sounds like a dream, but there are problems to overcome as we head into the future of IoT.</p>
<p><strong>What Is IoT?</strong></p>
<p>In a perfect world, IoT means that every device that runs on some sort of power is connected to the Internet, or connected directly to each other. As you can imagine, there are issues with getting some items connected to the Internet, and there is also problems justifying connecting electric toothbrushes to a central server.</p>
<p>As these devices go through their daily activities, they collect information that can be used in a variety of ways. As our example in the opening paragraph suggested, devices and wearable technology would be able to anticipate a person&#8217;s needs and transmit critical information on its own. The data stored can be used to make a taxi cab fleet more fuel efficient, and it can be used as evidence in a personal injury lawsuit involving a car accident.</p>
<p><strong>Commercial Adaptation Of IoT</strong></p>
<p>Small and large businesses have started to create IoT strategies designed to connect all of their devices to a central storage and analysis point. There are two ways businesses can implement an IoT strategy; either buy all new equipment that is already IoT enabled, or start enabling equipment one piece at a time. Obviously, the more cost effective route is to enable devices one piece at a time, but that does not make it the easiest approach.</p>
<p>One of the most significant problems companies have with an IoT implementation is connecting legacy devices to the Internet. Large mainframes can be connected to the Internet, but what about the company trucks? It takes a significant amount of planning to outfit any size organization with an IoT network.</p>
<p>The payoff for installing an IoT system is significant. Companies can monitor the condition and activities of their vehicles in detail and develop a number of fuel-saving measures. Employee productivity can be easily monitored, and that opens up the door for developing more productive methods. Companies would be able to put worker&#8217;s compensation fraud to an end, and corporate attorneys would have much more information to use in defense of the company in any kind of lawsuit.</p>
<p>Many industries will show a massive growth toward IoT within the next several years.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1526" src="https://info.globalit.com/wp-content/uploads/2016/11/investments-in-iot-by-industry.jpg" alt="which industries will advance in IoT" width="600" height="443" srcset="https://info.globalit.com/wp-content/uploads/2016/11/investments-in-iot-by-industry.jpg 960w, https://info.globalit.com/wp-content/uploads/2016/11/investments-in-iot-by-industry-300x222.jpg 300w, https://info.globalit.com/wp-content/uploads/2016/11/investments-in-iot-by-industry-768x567.jpg 768w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p><strong>Is IoT Vulnerable?</strong></p>
<p>The vulnerabilities in an IoT system come from the significant number of Internet connections they create. When a car sends back information about its fuel usage, it is also opens up a connection on the Internet that hackers can use to access the company network. Even your personal information is not safe when your toaster retrieves your favorite toast settings from a central server and uses that information to make your morning a little better.</p>
<p><strong>Compliance Issues</strong></p>
<p>Implementation of IoT networks has been going on in the corporate world long enough for government agencies to start developing laws and guidelines regarding the creation and maintenance of an IoT system. But with so much information being transmitted from so many devices, there have been plenty of concerns raised about compliance with security standards.</p>
<p>The protection of data has been critical, and standards such as <a href="https://globalit.com/services/computer-security/managed-compliance-services-los-angeles/" target="_blank" rel="noopener noreferrer">HIPAA</a> for storing health care data and PCI for protecting credit card information have been created to make sure that the private data of customers and patients stays safe. But with the IoT, maintaining compliance with these laws is not easy. Most of these government agencies have issued detailed ways to make sure that data is transmitted over an IoT system safely, but the laws keep changing as more and more devices are placed online.</p>
<p><strong>Protecting Your Data</strong></p>
<p>Some of the factors that make the IoT possible is the massive expansion of WiFi service, the dramatic drop in technology costs, and the rapid rate at which technology is being adopted around the world. But at the heart of any IoT system is a reliable and secure cloud storage solution.</p>
<p>Global IT has dedicated servers placed in a secure location that you can use to safely store all of your IoT data. The amount of data you will collect with a IoT system is well beyond what your company is used to handling. Instead of taking chances, it is best to rely on the experts and state-of-the-art equipment used by <a href="https://globalit.com/" target="_blank" rel="noopener noreferrer">Global IT</a> to protect your critical data.</p>
<p>Resources:</p>
<p>http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#5a9a68386828</p>
<p>http://www.forbes.com/sites/janakirammsv/2016/08/22/10-steps-to-implementing-a-successful-enterprise-iot-strategy/2/#7b413f221fcd</p>
<p>https://www.thingworx.com/blog/iot-helps-business-regulatory-compliance/</p>
<p>http://www.business.com/technology/internet-of-things-security-compliance-risks-and-opportunities/</p>
<p>http://www.businessinsider.com/the-enterprise-internet-of-things-market-2015-7</p>
<p>Image Sources: aquaticinformatics.com and businessinsider.com</p>
<p>The post <a href="https://info.globalit.com/the-future-of-iot/">The Future of IoT</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/the-future-of-iot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What You Need to Know About Ransomware</title>
		<link>https://info.globalit.com/what-you-need-to-know-about-ransomware/</link>
					<comments>https://info.globalit.com/what-you-need-to-know-about-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Fri, 21 Oct 2016 21:21:08 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Desktop Tips]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Web Mail]]></category>
		<category><![CDATA[Webmaster]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=1477</guid>

					<description><![CDATA[<p>If you have never heard of or experienced ransomware? If not, you can consider yourself very lucky. In this age of growing cyber crimes and online terrorism are on the rise. It is important that everyone know what ransomware is and how to fight it. Our nation’s critical infrastructure, including both private and public sector… <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/">What You Need to Know About Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have never heard of or experienced ransomware? If not, you can consider yourself very lucky. In this age of growing cyber crimes and online terrorism are on the rise. It is important that everyone know what ransomware is and how to fight it.</p>
<p><span class="pullquote align-right">Our nation’s critical infrastructure, including both private and public sector networks, are targeted by adversaries. American companies are targeted for trade secrets and other sensitive corporate data, and universities for their cutting-edge research and development. Citizens are targeted by fraudsters and identity thieves, and children are targeted by online predators. &#8211;<a href="https://www.fbi.gov/investigate/cyber" target="_blank" rel="noopener noreferrer">FBI</a></span></p>
<p><strong>What Is Ransomware?</strong><br />
The simple answer to defining ransomware is that it is a virus that takes hold of your computer and demands payment to a criminal organization to get the password that will release the virus. This affects personal and corporate computers, and it has become a big business for the criminal world. It is estimated that cyber-ransoms will become a billion dollar industry in 2016, and that only includes the paid ransoms. That figure does not include the costs for repairing the computers or recovering the information.<br />
Once ransomware is downloaded, you will get a message telling you that your computer has been locked and you will be told that you need to take some kind of action to pay the ransom. The consequences of not paying include having all of your data erased, or permanently locking up your computer.<br />
The more complicated description of ransomware is that it preys on your more vulnerable software applications and encrypts your computer. Normally, encryption is used to protect your data. But in this case, it locks you out of your computer and requires a password that only the criminal knows. When you pay the ransom, you hope to get the password that will open up your system. In some cases, the password is not provided after the ransom has been paid.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1501" src="https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware.png" alt="protect-against-ransomware" width="601" height="423" srcset="https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware.png 700w, https://info.globalit.com/wp-content/uploads/2016/10/protect-against-ransomware-300x211.png 300w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p><span class="pullquote align-right">The FBI doesn’t support paying a ransom in response to a ransomware attack. Paying a ransom doesn’t guarantee an organization that it will get its data back—there have been cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.-<a href="https://www.fbi.gov/investigate/cyber" target="_blank" rel="noopener noreferrer">FBI</a></span><strong>How do you get Ransomware?</strong><br />
In corporate settings, ransomware usually arrives in an employee&#8217;s email account as what looks like a safe and secure attachment. But when the attachment is open, the ransomware is loaded and it may start to move its way through the rest of the network.<br />
In any setting, email is the most common way that ransomware gets loaded onto a computer. The second most common way is clicking on an infected website and having it loaded directly onto your computer. As frustrating as these can be, these delivery methods give us clues on how to combat these attacks.</p>
<p><strong>Avoiding Ransomware</strong><br />
Always use a reputable  antivirus software vendor and can scan your received emails and warn you against websites that are infected. Never use a free AV. You should always have good antivirus operating on your computer, and you should keep your antivirus updated constantly. Corporate IT directors should keep their firewall software up to date, and have a policy in place that prohibits employees from opening email attachments.<br />
Never open an email attachment from a sender you do not recognize. Many of these criminals try to disguise their emails as being from legitimate banks or communications providers, but you should never fall for it. One way to tell if an email is from your bank is to hover your mouse pointer over any link in the email and read the associated link at the bottom of the browser. If the link does not come from your bank, then the email is a phishing email that is looking for victims.</p>
<p><a href="https://globalit.com/services/technical-services/it-risk-management/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="wp-image-1479 size-full alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/internet-security.png" alt="internet security" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/internet-security.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/internet-security-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p>Make sure you look over the data in the email carefully. If you are not familiar with the vendor or the prospective client, call the phone number listed in the email. Here is an example of a fraudulent company that looks legitimate. If you look closely, you can see that there are (3) s’ in the email address dave@bluegrassscontracting.com. This is easy to miss.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-1481 alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware.png" alt="ransomware" width="986" height="357" srcset="https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware.png 1165w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-300x109.png 300w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-768x278.png 768w, https://info.globalit.com/wp-content/uploads/2016/10/10-16-ransomware-1024x371.png 1024w" sizes="(max-width: 986px) 100vw, 986px" /></p>
<p>Corporate and personal users should always have their computers backed-up to a resource that is not online. For example, personal users can get a large capacity USB drive and back their computers up to that drive every Friday. Corporate users can utilize offline back-up systems that are constantly updated with any changes to the network in case of an attack.</p>
<p><a href="https://globalit.com/services/cloud-services/cloud-backup-services-los-angeles/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-1478 alignnone" src="https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup.png" alt="cloud backup" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/cloud-backup-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p><strong>What To Do If You Have Been Attacked</strong></p>
<p>If you open an attachment in your corporate email account and you get the ransomware warning page, then contact your manager immediately. If your manager is not available, then contact the IT manager directly and alert the trusted IT group to the problem.<br />
If you get ransomware on your personal computer, then you should call a computer support professional immediately. Do not try to take care of the problem yourself because it could become worse.</p>
<p><a href="https://globalit.com/services/technical-services/managed-it-msp-los-angeles/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-1480 size-full" src="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png" alt="managed it" width="345" height="53" srcset="https://info.globalit.com/wp-content/uploads/2016/10/managed-it.png 345w, https://info.globalit.com/wp-content/uploads/2016/10/managed-it-300x46.png 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></p>
<p>Ransomware is just one of the growing threats that honest Internet users face every day. By practicing safe computer use habits, you can reduce your chances of getting attacked and have yourself covered in case you need to have your hard drive reloaded.</p>
<p>The post <a href="https://info.globalit.com/what-you-need-to-know-about-ransomware/">What You Need to Know About Ransomware</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/what-you-need-to-know-about-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is China Taking Over the Internet?</title>
		<link>https://info.globalit.com/is-china-taking-over-the-internet/</link>
					<comments>https://info.globalit.com/is-china-taking-over-the-internet/#comments</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Thu, 13 Oct 2016 21:09:35 +0000</pubDate>
				<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=1389</guid>

					<description><![CDATA[<p>It appears as though countries such as China and Russia are about to have access to one of the most bureaucratic and government-independent agencies in the world, and there are a lot of people who do not like the idea. But what is really going on and is the situation really as bleak as everyone… <a href="https://info.globalit.com/is-china-taking-over-the-internet/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/is-china-taking-over-the-internet/">Is China Taking Over the Internet?</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It appears as though countries such as China and Russia are about to have access to one of the most bureaucratic and government-independent agencies in the world, and there are a lot of people who do not like the idea. But what is really going on and is the situation really as bleak as everyone is making it out to be?</p>
<p>A close look at the ICANN contract with the U.S. Department of Commerce shows that the contract will lapse if not renewed on October 1, 2016. When President Obama decided not to renew the contract, Senator Ted Cruz (who was a presidential candidate at the time he introduced the bill) introduced the <a href="http://thehill.com/sites/default/files/protecting_internet_freedom_act_backgrounder.pdf">Protecting Internet Freedom Act</a> to prevent the ICANN contract from lapsing. The bill is still being considered, but with the contract being allowed to lapse, a Congressional law may be useless at this point.</p>
<p><strong>What Is Going On?</strong></p>
<p>The Internet Corporation for Assigned Names and Numbers (ICANN) is the centralized body entrusted with regulating domain names and IP numbers throughout the Internet. It is a body made up of engineers and Internet experts from all over the world, and it was funded by the U.S. Department of Commerce until October 1, 2016. When President Obama allowed the contract with ICANN to lapse, he effectively gave up any kind of leverage the United States had with ICANN.</p>
<p>The act of allowing the contract with ICANN to lapse has been compared to <a href="http://yournewswire.com/china-to-control-global-internet-by-october-1-2016/">handing the Internet over to China</a>. But a <a href="https://newrepublic.com/article/117093/us-withdraws-icann-why-its-no-big-deal">closer examination of ICANN</a> shows that it is basically an organization without a country that has a habit of following its own rules and creating a nightmare bureaucracy for governments to try and work with. In other words, ICANN is proud to operate on its own, and this severance from the United States only allows ICANN to work as an even more independent body.</p>
<p>No one country controls ICANN. There is a new committee in ICANN made up of governments from all over the world, but no one government has complete say in what happens. But should people be worried about China and this new open Internet? Recent information would say that China could very well be a threat to the Internet in more ways than one.</p>
<p><strong>China Is Flexing Its Internet Muscles</strong></p>
<p>Within its own borders, China is making changes to its own Internet that should be concerning to anyone outside of China. China is <a href="http://www.wsj.com/articles/china-moves-to-ease-foreign-concerns-on-cybersecurity-controls-1472132575">broadening its Internet resources </a>and making it difficult for Western businesses to make money in China. A document that has many Western businesses very concerned is China&#8217;s newest <a href="http://news.xinhuanet.com/english/2016-06/27/c_135470111.htm">cybersecurity law</a>. This new law forces anyone using China&#8217;s Internet to follow all federal, regional, and local Internet laws. This would make it extremely difficult for outsiders to properly access the Internet in China, especially since many local Internet laws are unknown.</p>
<p>It is China&#8217;s habit of attempting to maintain control over everything that has the rest of the world concerned. <a href="http://money.cnn.com/2016/08/12/technology/china-cybersecurity-rules-foreign-companies/">Chinese Internet laws </a>state that any information gathered on the Chinese public must remain in China. The Chinese government also has comprehensive rules on what kinds of hardware can be used on the Chinese Internet, and anyone using equipment that has not been approved is in line for serious legal repercussions.</p>
<p><strong>Is China A Threat To The Internet?</strong></p>
<p>China is the only oppressive country to have spent a great deal of time and money on developing Internet security and information distribution plans. China&#8217;s latest cybersecurity laws are open for the public to review, and Western business executives fear that these new laws make it increasingly difficult for Western businesses to make money in China.</p>
<p>China understands that money makes the world go round, and money may even be the key to running the Internet. China is already in the process of destabilizing the global economy through its cheap steel, and now China is trying to keep Western companies out of its marketplace by making its Internet increasingly exclusive.</p>
<p>Now that China has an equal say in ICANN thanks to the U.S. bowing out if its contract with the Internet organization, there is a real possibility that China will continue to use its aggressive tactics to have influence on how the Internet works all over the world, including inside the United States itself.</p>
<p>The post <a href="https://info.globalit.com/is-china-taking-over-the-internet/">Is China Taking Over the Internet?</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/is-china-taking-over-the-internet/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Will the Bankruptcy of Oi in Brazil Have an Effect on U.S. Markets?</title>
		<link>https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/</link>
					<comments>https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Tue, 28 Jun 2016 18:22:29 +0000</pubDate>
				<category><![CDATA[IT Services]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=1382</guid>

					<description><![CDATA[<p>On June 10, 2016, former Oi CEO Bayard Gontijo resigned from the company after it was obvious that his attempts to negotiate a new debt settlement with shareholders was about to fall apart. Oi SA is the fourth largest mobile telecom company in Brazil, and it is the only telecom company in the country partially… <a href="https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/" class="read-more-link">read more &#8594;</a></p>
<p>The post <a href="https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/">Will the Bankruptcy of Oi in Brazil Have an Effect on U.S. Markets?</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On June 10, 2016, former Oi CEO Bayard Gontijo resigned from the company after it was obvious that his attempts to negotiate a new debt settlement with shareholders was about to fall apart. Oi SA is the fourth largest mobile telecom company in Brazil, and it is the only telecom company in the country partially funded by the government.</p>
<p>In 2010, Oi signed an agreement with the Brazilian government to expand the country&#8217;s archaic and failing landline system to rural customers. After years of sinking millions of dollars into that expansion and the effect of other economic factors, the company finally had to admit that it was in trouble and filed for bankruptcy in Brazil on June 20, 2016. At $19.3 billion dollars, the Oi bankruptcy is the largest in Brazil&#8217;s history.</p>
<p><strong>What Happened?</strong></p>
<p>Over the past several years, Oi has suffered from poor managerial decisions and money mismanagement. The agreement to maintain and expand the landline system in Brazil instead of working to expand the growing wireless communications systems wound up costing the company millions.</p>
<p>Initially, Gontijo was attempting to negotiate a deal with shareholders that would wind up giving 92 percent of the ownership of the company to a group of bond holders and larger shareholders. The members of the board and other shareholders were not prepared to have their interests in the company diluted in that way, so Gontijo resigned. The financial world was shocked when Oi decided, after Gontijo&#8217;s departure, that filing the largest bankruptcy in Brazilian history was the answer to its problems.</p>
<p><strong>Why Everything Went Wrong</strong></p>
<p>A few years ago, Oi merged with Portugal Telecom to try and expand its market and bring in more revenue to offset the growing financial burden of maintaining and updating Brazil&#8217;s landline system. In the process, Portugal Telecom became one of the largest bond holders for Oi, and a major financial burden.</p>
<p>The $260 million bond payment to Portugal Telecom was set to come due in July 2016. Oi announced that unless some sort of debt reconfiguration plan was agreed to soon, then 92 percent of the company&#8217;s cash would be gone by the end of December 2016. This made Portugal Telecom nervous, and cause Portugal Telecom to put more pressure on Oi to come up with a payment solution.</p>
<p>Aurelius Capital Management is an American-based hedge fund that is heavily invested in Oi, and Aurelius has put together a group of shareholders that are pressuring Oi to create some plan for paying shareholders and bond holders back. The pressure from all of these financial elements caused Oi to decide to seek protection in the bankruptcy courts.</p>
<p>Oi maintains that Aurelius Capital Management is persistently blocking Oi&#8217;s attempts to restructure its debt, and the company needs protection from Aurelius and other American shareholders to complete its restructuring plan.</p>
<p><strong>How Does This Affect the U.S.?</strong></p>
<p>Brazil is the midst of a recession that has gone on for two years, and it’s one of the worst economic recessions that country has seen in the past 80 years. Even companies that are heavily invested in the country&#8217;s profitable oil industry are filing for protection from bankruptcy. The financial ripple effect is even reaching the United States, where Oi has filed for Chapter 15 bankruptcy protection in the New York bankruptcy court, which is the part of the United States bankruptcy laws set aside for foreign companies.</p>
<p>In addition, many U.S. telecom companies have infrastructure resources in Brazil. Depending on the outcome of the bankruptcy, some of the U.S. telecom operators with assets in Brazil may need to seek alternative routing and infrastructure as services may be at risk for disruptions and support may be limited if wide scale layoffs occur.</p>
<p>The situation for Oi is bleak. A weak economy and a set of Brazilian business laws that prevent the company from being able to take the actions it says it needs to take to become solvent could mean even more problems for the troubled carrier. Since the Brazilian government relies so heavily on Oi for the country&#8217;s national landline system, some experts are speculating that the government may bail the company out. But with the financial turmoil going on in Brazil right now, there may not be enough money to help Oi climb out of its financial pit.</p>
<p>The post <a href="https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/">Will the Bankruptcy of Oi in Brazil Have an Effect on U.S. Markets?</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/how-oi-bankruptcy-affects-united-states-telecom-industry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tech Giants &#038; your Private Information</title>
		<link>https://info.globalit.com/tech-giants-your-private-information/</link>
					<comments>https://info.globalit.com/tech-giants-your-private-information/#respond</comments>
		
		<dc:creator><![CDATA[Tony Rare]]></dc:creator>
		<pubDate>Mon, 29 Feb 2016 20:58:33 +0000</pubDate>
				<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">http://info.globalit.com/?p=980</guid>

					<description><![CDATA[<p>Apple has unlocked iPhone's for authorities at least 70 times since 2008. Google celebrated Internet Safer Day earlier this month to raise awareness of ‘how they can help you stay secure online’.<br />
Tech companies have been battling relentlessly with governments over access to people’s electronic information.<br />
Last Tuesday rallies were held across the US to protest the FBI’s demands that Apple unlock the iPhone at the center of the San Bernardino investigation.</p>
<p>The post <a href="https://info.globalit.com/tech-giants-your-private-information/">Tech Giants &#038; your Private Information</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_981" style="width: 310px" class="wp-caption alignleft"><a href="https://info.globalit.com/wp-content/uploads/2016/02/save-our-iphones-800x516.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-981" class="padding-5px-left wp-image-981 size-medium" src="https://info.globalit.com/wp-content/uploads/2016/02/save-our-iphones-800x516-300x194.jpg" alt="Apple San Bernardino tech protest " width="300" height="194" srcset="https://info.globalit.com/wp-content/uploads/2016/02/save-our-iphones-800x516-300x194.jpg 300w, https://info.globalit.com/wp-content/uploads/2016/02/save-our-iphones-800x516.jpg 800w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-981" class="wp-caption-text">Line of protesters demanding Apple to crack open the iPhone at the center of the San Bernardino investigation.</p></div>
<p>Apple has unlocked iPhones for authorities at least 70 times since 2008. Google celebrated Internet Safer Day earlier this month to raise awareness of ‘<em>how they can help you stay secure online’</em>.</p>
<p>Tech companies have been battling relentlessly with governments over access to people’s electronic information.</p>
<p>Last Tuesday rallies were held across the US to protest the FBI’s demands that Apple unlocks the iPhone at the center of the San Bernardino investigation.</p>
<p>A week before protests were held to support Apple, with campaigners gathering in front of Apple stores with branding signs and slogans, “Don’t break our phones”. <a href="https://www.macrumors.com/2016/02/24/apple-supporters-protest-50-us-cities/" target="_blank" rel="noopener noreferrer">Read the full story here.</a></p>
<p>Apple CEO Tim Cook announced that the company wouldn’t comply with a government search warrant to unlock an iPhone used by one of the San Bernardino shooters.</p>
<p>The case has placed technological security in the spotlight, with Apple acknowledging it could extract the information.</p>
<p>Apple defended itself in the San Bernardino case, with Cook stating the action as, “an unprecedented step which threatens the security of our customers.” This contradicts their previous stance, as Apple has unlocked approximately 70 iPhones for authorities in the past.</p>
<p>However, the U.S. government has taken things to the next level, by pushing Apple to create new code which would allow the government to bypass iPhone security protections.</p>
<p>Some argue this is an ethical dilemma when government agents are forcing individuals of a private company to perform a task, where the employee is stuck between keeping their job and abiding by the government.</p>
<div id="attachment_982" style="width: 310px" class="wp-caption alignright"><a href="https://info.globalit.com/wp-content/uploads/2016/02/Cb8mviUUkAAglxW-800x603.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-982" class="padding-5px-right wp-image-982 size-medium" src="https://info.globalit.com/wp-content/uploads/2016/02/Cb8mviUUkAAglxW-800x603-300x226.jpg" alt="Apple San Bernardino tech protest" width="300" height="226" srcset="https://info.globalit.com/wp-content/uploads/2016/02/Cb8mviUUkAAglxW-800x603-300x226.jpg 300w, https://info.globalit.com/wp-content/uploads/2016/02/Cb8mviUUkAAglxW-800x603.jpg 800w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-982" class="wp-caption-text">Protestor standing for privacy protection supporting Apple in the San Bernardino case.</p></div>
<p>It is not all doom and gloom with the tech corps still keeping the public in mind.</p>
<p>Earlier this month Google celebrated Safer Internet Day with the redesign of its ‘Good to know site’, which is all about how to stay safe online.</p>
<p>The website launched late last year and is the search engine&#8217;s biggest consumer education campaign. Focusing on the web safety, dangers of the internet, scams, along with advice on how to keep your devices secure.<a href="https://mashable.com/2013/02/05/google-security-tips-safer-internet-day/#BN1gahNAHSqQ" target="_blank" rel="noopener noreferrer"> Read the full story here.</a></p>
<p>But can we depend on tech giants with our personal data, do they really have our interest at heart, or is it just about public relations?</p>
<p>Apple further argued in the above case that extracting the data could threaten consumer trust and tarnish the brand.</p>
<p>There are blurred lines between private information, public security, and government control. For now, there’s not much we can do other than taking appropriate precautions online and being aware of what’s happening in the tech world, to defend our rights if we need to.</p>
<p>Need advanced computer security protection? Take care of your computer today.<a href="https://globalit.com/services/computer-security/global-eye-computer-security/" target="_blank" rel="noopener noreferrer"> Click here for more information.</a></p>
<p>The post <a href="https://info.globalit.com/tech-giants-your-private-information/">Tech Giants &#038; your Private Information</a> appeared first on <a href="https://info.globalit.com">info.globalit.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://info.globalit.com/tech-giants-your-private-information/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
