Why hackers target you through IoT, how to spot a breach and how to protect yourself

IoT

In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More

Leverage and Lindstrom Complete First Full Quarter as Combined Entity

Merger Image

Leverage Technologies has built its services with emphasis on strategic planning, while Lindstrom grew its practice upon a reputation for reliable IT systems and support. The merger has come about based upon a long-standing relationship started in 2010. The new Leverage Technologies will have strengthened capabilities to include on-site IT support, an in-house escalation path for deep technical support, and … Read More

Technology Pain Threshold

I’m always surprised by the difference in pain thresholds between companies.  One company will put up with all sort of terrible atrocities in their infrastructure and never say a word.  Another company will raise hell the moment a printer doesn’t work.  I suppose this is a matter of culture, but what is that actual impact on the business?  The Emerson-Ponemon … Read More