Business Solutions & Software Group Blog

Business Solutions & Software Group Blog

Business Solutions & Software Group has been serving the Coral Springs area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Take Advantage of a Password Manager

b2ap3_thumbnail_password_management_400.jpgHave you ever been prompted to change your password, then forgotten what the new one was twenty seconds later? Changing passwords consistently is a good practice, but let’s face it; unless you have them put away somewhere, you are probably going to forget about them at least once (unless you use a post-it note on your monitor, which is never a good idea). Additionally, if passwords are short and easily guessable, you risk being targeted by a phishing attack or other hacking attack.

0 Comments
Continue reading

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

0 Comments
Continue reading

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

0 Comments
Continue reading

Looking for Virtual Love in All the Wrong Places

b2ap3_thumbnail_i_love_you_400.jpgOnline dating has been around long enough that it no longer carries a negative social stigma. In fact, you may know of some success stories from online dating--or you may have even successfully used online dating yourself. When looking for online love, remember to use protection from scammers.

0 Comments
Continue reading

Tip of the Week: How to Lock Your Android Device

b2ap3_thumbnail_got_that_andoid_on_lock_400.jpgYou’ve got a lot of sensitive information stored on your mobile device. If it were to fall into the wrong hands, you wouldn’t want the new user to have easy access to it. This is why every mobile device should be locked. Here’s how to lock your Android device, as well as how to pick out a lock screen setting that’s right for you.

0 Comments
Continue reading

What Flu Season Can Teach Us about Cyberdefense

b2ap3_thumbnail_protect_yourself_against_viruses_400.jpgIt’s flu season, and just like office workers around the country are taking preventive health measures like stocking up on tissues and vitamin C, so too are IT technicians doing everything they can to stop the spread of computer viruses on their company’s network. Although, unlike the flu, computer viruses are more than a seasonal threat.

0 Comments
Continue reading

In Light of Major Retail Hacks, Protect Your Credit Card Numbers

b2ap3_thumbnail_protect_your_credit_card_400.jpgThe Target data breach seems but a distant memory now, yet the same malware strikes again, this time at Home Depot. The hacking attack targeted the millions of credit and debit cards used at these large retailers, but these attacks could have been mitigated with proper precaution.

0 Comments
Continue reading

4½ Million Medical Records Compromised. Are Your Health Secrets Safe?

b2ap3_thumbnail_healthcare_hacker_400.jpgWe've got yet another major data breach to report that affects millions of users, this one of a very personal nature. This week, it was revealed that Chinese hackers compromised 4.5 million medical records from Community Health Systems, a hospital network with 206 facilities in the United States. Ask your doctor today if identity theft prevention is right for you.

0 Comments
Continue reading

Are You Being Hacked by Your Neighbor’s Cat?

b2ap3_thumbnail_hacked_by_neighbors_cat_400.jpgYes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.

0 Comments
Continue reading

Is Antivirus on Its Last Leg?

b2ap3_thumbnail_does_antivirus_still_protect_you_400.jpgAll of the recent vulnerabilities and bugs over the past few months, such as Heartbleed, GameOver Zeus, and the zero-day Internet Explorer vulnerability have many people thinking - just how strong is antivirus in the face of such threats? Symantec told The Wall Street Journal their opinion on the subject: Antivirus is "dead."

0 Comments
Continue reading

Avast Recovers Hundreds of Naked Pictures from Secondhand Android Smartphones

b2ap3_thumbnail_cell_phone_data_400.jpgSmartphone users routinely cycle out their old device for a new one every two years or so. When it's time to upgrade, many users see an opportunity to sell their old phone for extra cash. However, a device that's improperly wiped of its data could lead to identity theft if the data is recovered by the new owner.

0 Comments
Continue reading

Would Anti-Surveillance Technology Prevent NSA Spying, or Weaken National Security?

b2ap3_thumbnail_you_are_being_watched_400.jpgOn Saturday, July 21st 2014, the Hackers on Planet Earth (HOPE) conference took place in New York City. It's a place where hackers discuss ways to improve the society in which we live. One of the more controversial panelists, Edward Snowden, has suggested hackers pool their efforts into creating anti-surveillance technology to decrease government espionage.

0 Comments
Continue reading

Apple Enthusiasts, Look Out: iOS May Sport Hidden Backdoors for Apple and Law Enforcement

b2ap3_thumbnail_ios_has_vulnerabilities_400.jpgApple's iOS operating system is notorious for being fairly secure from external attacks, but what about internal threats? There have been reports of backdoors being found in the operating system, which allow Apple and subsidiaries of the law (i.e. the NSA) to access devices that run it.

0 Comments
Continue reading

Protect Your Little Bundle of Joy, Before You Get a Bundle of Terror Instead!

b2ap3_thumbnail_protect_your_family_400.jpgToday's home has all sorts of conveniences when it comes to security and wireless devices, such as mobile-controlled security systems, temperature gauges, and light switches. These devices can also be connected to the Internet for ease of access. You think it's safe behind passwords, firewalls, and security applications, but you're wrong. Anything that's connected is at risk - even baby monitors.

0 Comments
Continue reading

4 Tips to Keep the Phish From Biting

b2ap3_thumbnail_phishing_400.jpgJust like the dark waters of the benthic ocean trenches, the Internet is filled with wondrous creatures that have never been seen before. However, there are also rather ugly things lurking in the depths as well. No matter how deep you swim, there are always the deep sea phishermen that will try to rip you away from everything you hold dear – your personal and professional data.

0 Comments
Continue reading

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

0 Comments
Continue reading

Warning: Heartbleed Bug Assails the Web

b2ap3_thumbnail_heart_bleed_two_400.jpgThe same day that Microsoft ceased supporting Windows XP with security patches was also the day a vicious little monster was discovered – the Heartbleed bug, which renders privacy in the OpenSSL cryptographic library completely obsolete. Basically, anything utilizing the OpenSSL open source library is at risk here. Websites utilizing this form of encryption include Yahoo! Google, and Facebook. To put it in perspective, sites that utilize OpenSSL number more than two-thirds of the entire worldwide web. Though this bug only applies to versions 1.0.1 and 1.0.2 beta of OpenSSL, hackers are able to obtain private keys which can be used to obtain sensitive information from countless people all around the world. Nothing says "heartbreak" like having your identity stolen and your sensitive data Shanghaied.

0 Comments
Continue reading

It Doesn’t Make Sense to Be Anti-Antivirus

b2ap3_thumbnail_antivirus_solutions_400.jpgThe Internet has grown to such a vast size that it in itself is like a world within a world. Some people live on it, and share their secrets far too openly. These people think themselves safe in a world that technically doesn't exist, but there is a lot more danger involved with the Internet than some people realize. There are criminals everywhere, and they are just waiting for you to drop your guard long enough to swipe everything you've worked so hard to protect.

0 Comments
Continue reading

200 Million People’s Identities Compromised in One Scam

b2ap3_thumbnail_it_security_400.jpgDetails are still coming in regarding one of the biggest data breaches in history that compromised the personal records of 200 million Americans! The scam was propagated by the online ID theft service Superget.info, and it's currently being investigated by the U.S. Senate Committee on Commerce, Science, and Transportation.

0 Comments
Continue reading

Hackers Go for the Gold at the Sochi Winter Olympics

b2ap3_thumbnail_sochi_winter_olympics_400.jpgIn Sochi, Russia, the world's best athletes aren't the only ones having spent years preparing for the Winter Olympics. Russian hackers have also readied themselves for the world's arrival. Hackers have tapped every public WiFi network in the vicinity of the games. We can learn a thing or two about the WiFi problems in Sochi.

0 Comments
Continue reading

About Business Solutions & Software Group

Business Solutions & Software Group has been serving the South Florida area since 1997, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business Solutions & Software Group is proud to announce the launch of our new website at www.bssgcorp.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

10211 W Sample Road Suite 114
Coral Springs, Florida 33065

Mon to Fri 9:00am to 6:00pm

help@itcloud360.com

(954) 575-3992