Blog

Advanced Data Blog

Our official blog with news, technology advice, and business culture.

Human Firewall

Strengthen Your Human Firewall

Changing Landscape of Cyber Security Cyber Security has always been a moving target.  In the past, bad actors would hunt and search for their targets.  Due to the time it took to research, plan, and execute attacks, larger businesses were chosen to maximize the reward if they were successful.  It

Read more

How to Secure RMMs

Kaseya VSA Hack On Friday, a popular IT tool called Kaseya VSA was hacked.  The exploit was a “zero day” vulnerability, which means it was previously unknown by anyone in the cyber-security industry.  Kaseya VSA is a Remote Monitoring and Management tool (RMM) that is used by many IT firms,

Read more

PrintNightmare

Yesterday a critical vulnerability with Windows operating systems was revealed. The exploit, called PrintNightmare, takes advantage of a weakness with the Windows Print Spooler service. In order to exploit this vulnerability, hackers would need to have access to a device on the network AND at least one user account.  Every

Read more

How I Study for IT Certification Exams

This post is a follow-up to Why We Love Continuing Education and Certifications and continues on with What Certs Should My IT Team Have? A few weeks ago I was reading to my daughters one of our favorite Shel Silverstein books and came across the following poem: The little blue

Read more
Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We perform a discovery of your current and future needs

3

We prepare a proposal