Category Archive for "Blog"

SAFETY PUP SAYS Update

Apr 09 2019

SAFETY PUP SAYS…. Update One thing smaller firms and individuals are often reluctant to do is download updates to their operating systems and individual apps and programs. Why? Well, because it takes time and you have to reboot the device. Other reasons are a fear that the newest update will…

With Ransomware, The ONLY Cure Is Prevention

Apr 08 2019

With Ransomware, The ONLY Cure Is Prevention It just keeps showing up in the news. Ransomware seems to just not come to an end. If you haven’t heard, ransomware is a particularly nasty virus that freezes access to your data and then demands a ransom, usually in bitcoin. The worst…

Meet Chris Zymaris, Apex’s Newest Engineer!

Mar 21 2019

  Apex welcomes our newest engineer, Chris Zymaris! Chris lives in Braintree, Massachusetts and is based out of our Waltham office. He holds a B.S. in IT Management from Northeastern University and is certified in A+. Chris considers himself a foodie and has a great love for cooking. Another fun fact:…

Congratulations to Ryan O’Connor, Apex’s next ARUBAOS 8 certified engineer

Jan 15 2019

They’ve done it again – congratulations to senior engineer Ryan O’Connor, who crushed the difficult Aruba Certified Mobility Professional 8 Exam!   For Apex engineers, it’s not enough to just be good at their jobs. Each one works diligently to keep up with rapidly changing technology so they can provide…

How to Develop a Strategy for Network Optimization

May 23 2017

If we set out to watch a sunset, we know we have to wait for sundown. We certainly know we cannot rush it, so we relax and wait. We know patience is in the game plan. However, when it comes to WiFi, or more specifically, WLAN (Wireless Local Area Networks),…

What is Advanced Threat Detection?

May 16 2017

If You Are Not Using Advanced Persistent Threat Detection, You’re Playing Malware Checkers While They’re Playing Malware Chess.   Today’s attacks are persistent and sophisticated. The typical threat detection, identification, and containment strategy is a five step process.     This traditional 5-step strategy is effective against known malware, recognizable…

Facebook users beware!

Feb 22 2017

If you use Facebook, you may have already seen this scam in your Messenger inbox recently: a friend sends you a message with your first name and a link to a YouTube video that appears to be a video all about… you. It even has your first and last name…

1 Billion Yahoo Accounts Hacked

Dec 20 2016

Change your Yahoo password NOW.   While investigating the August 2014 security breach that affected 500 million users, Yahoo discovered a far bigger breach that compromised more than 1 billion user accounts, all the way back in 2013.   User outrage is not unfounded. According to former members of Yahoo’s…

Free isn’t always free – especially when the price is your privacy

Aug 16 2016

Sometimes, free Wi-Fi seems like a no-brainer. But how careful are you when connecting to an unfamiliar Wi-Fi network? “Free” Wi-Fi isn’t always without a price – all too often, you’re leaving your mobile device vulnerable to hacking. Recently at the Republican National Convention, network security company Avast set up…

123
Contact Us!
close slider

You can reach us by calling 401-277-3000 or use the form below and we will get back to you shortly.

Your Name (required)

Your Email (required)

Subject

Your Message