Optistar Technology Consultants, Inc.

Blog

Is Your Home’s New Smart Deadbolt Secure?

Much has been written in previous months about the explosion in growth of the (IOT) Internet of Things, and the security risks posed by that growth. Where PCs, laptops, and smartphones all ...

Internal Breaches On The Rise For Many Companies

In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make the headlines are the external breaches ...

Passwords More Popular Than Fingerprint Scanners in U.S.

Although a number of tech companies have been working hard to create new and ever more robust security and authentication protocols, a recent survey revealed that the American public in general remains ...

USB-C Getting Certification Program To Protect Against Safety Issues

You probably don't know the name Benson Leung. He's one of the internet's unsung heroes, and in recent months, he's been quietly waging a one-man war against manufacturers producing faulty USB-C chargers. ...

Survey Shows Company CIO’s Are Looking At Cloud Services

There has been an explosive growth in companies offering private cloud as part of a broader offering of managed services, and businesses are responding positively to the trend. Interestingly, while companies are ...

Sage Is Latest Company To Report Internal Data Breach

Sage, LLC, a British company providing business software solutions for clients around the world, was the latest victim of a data breach. This one, however, came from inside the company itself. This ...

90 Percent of People Ignore Important PC Security Warnings

What do you do when you get a popup window generated by some piece of software you use, informing you of a critical update? Do you stop what you're doing right then ...

Ransomware Heavily Targeting Health Care Companies

You've probably seen the headlines. This year, hardly a week goes by that there isn't a report of a company in some way connected to the health care industry falling victim to ...

New Tech Can Copy And Mimic Your Handwriting

Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem like a ...

App From Microsoft Creates Better Two-Factor Authentication

Microsoft is a company that definitely understands the need for better and more secure information systems. Like many other tech companies, they’ve been pushing hard for two-factor authentication protocols covering large swaths ...

Contact

Optistar Technology Consultants, Inc.Optistar Technology Consultants, Inc. Logo $$$

Referral Program

By recommending partners, associates, or professional contacts, you can help them enjoy worry-free IT and reap some rewards for yourself.

FIND OUT MORE