Blog

Blog

New 10TB Desktop Hard Drive Can Store All Of Your Data And Then Some

Do you consider yourself to be a power user, where computers are concerned? Do you have one or more members of your staff you’d put in that category? If the answer to either of those questions was yes, then Seagate’s new Barracuda Pro desktop drive is almost certain to make you smile. This is hands […]

Fines For HIPAA On The Rise For Even Minor Data Breaches

If your company deals with protected health information, then you know what a maze of regulation HIPAA rules can be. The Federal government has recently signaled just how seriously they take data breaches, by fining Oregon Health & Science University $2.7 million for two breaches that impacted a total of 7,066 individuals. Compared to other […]

Microsoft Reducing OneDrive Cloud Storage Space For Many Users

If you use Microsoft OneDrive, it’s time to review your usage rate, and perhaps start thinking of switching to a different cloud-based storage solution. When the service was first rolled out, users with a free OneDrive account got fifteen gigabytes of storage space. That’s generous, but unfortunately, it also ended. The company announced in April, […]

Be Careful: Fake Apps Are Stealing Information

Security researchers at the firm ESET have recently warned of a total of 8 apps found on the Google Play store. These apps, at first glance, appear to be designed to help users increase their number of followers on various social media platforms, and as such, may have found their way on a variety of […]

New iPhone Attack Seems Very Familiar: Watch Out For MMS

Last July, Android users got a nasty surprise. The surprise came in the form of a new type of attack directed against smartphones. Dubbed “Stagefright,” it allowed a hacker to assume total control over the target device, simply by sending a properly encoded multimedia message to it. The bug that allowed this type of attack […]

Would Your Company Fail A Web Security Test?

How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech Bridge, and he and his research team have just finished an extensive review of business internet vulnerabilities. The results aren’t pretty. The two biggest highlights […]

Will Your Next Hard Drive Be MRAM?

There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming technologies that stand to change the storage game forever. The acronym stands for Magnetoresistive Random Access Memory, and there are three key things that make […]

Need More Laptop Drive Space? How About A 4TB SSD?

Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering 4TB SSD with a 2.5 inch form factor, which means it’s small enough to fit into a laptop. The only announcement the company made about […]

Will Printers Serve Up Your Next Computer Infection?

Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of tech, Microsoft introduced a convenient new feature that was widely lauded by network administrators. This service called Microsoft Web Point-and-Print stated its purpose was to […]

Latest Breach Hits Omni Hotels – Has Information Been Stolen?

By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May 30, 2016, began December 23, 2015 and was not completely eradicated from the company’s network until June 14, 2016. Unfortunately, we […]

A Visionary Approach to Your Security

The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.

To top