Not Sure About The Latest Technology?We Can Help!
Ask a member of the NTConnections team any technology question you have
Fill out the form to the right.
Looking for a new computer for your home office? Year-end sales and tax returns often lead to boosted sales in computers. But purchasing a new computer can feel overwhelming. The technology changes quickly and the jargon can be confusing. Here is an explanation of what you want to consider when looking at getting a new home computer. Central Processing Unit: The faster the CPU (central processin...Keep Reading
Take Advantage Of The IRS 179 Deduction Now Before It Expires (Questions/Answers) On January 2, 2018, H.R.1 was signed into law. It revised several previous tax laws going forward. With the passage and signing into H.R.1, the deduction limit for Section 179 increased to $1,000,000 for 2018 and beyond. In addition, the limit on equipment purchases was increased to $2.5 million. What Is Sectio...Keep Reading
The Department of Homeland Security and the Federal Bureau of Investigation issued a critical alert Dec. 3, warning users about SamSam ransomware and providing details on what system vulnerabilities permit the pernicious product to be deployed. According to the alert, which came from the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) along with the FBI, the SamSam a...Keep Reading
SamSam Ransomware is becoming a massive problem for multiple industries across the United States. In fact, the problem is so big that The Department of Homeland Security, (DHS), National Cybersecurity and Communications Integration Center, (NCCIC), and the Federal Bureau of Investigation, (FBI), have all recently issued a US-CERT alert due to the SamSam ransomware. Like other types of ransomware...Keep Reading
In late September, Apple released the latest version of its Macintosh operating system—MacOS 10.14. Known as Mojave, the update includes a variety of useful tools designed to delight casual and fanatic Apple users alike. Here are the top five new features to look for in MacOS Mojave. What Do I Need to Know About Security Changes in Mojave? Apple is primarily known for having robust security f...Keep Reading
Efficiency is one of the most challenging objectives for most companies to achieve. To be efficient, a firm needs to focus on optimizing limited resources to achieve the best results possible at the lowest cost. As you probably know from experience, this is far easier said than done. To boost efficiency, a company needs to craft a strategic plan. In many cases, this strategic plan involves outsou...Keep Reading
Heads up if you’ve stayed or made reservations at a Marriott or Starwood property over the last decade. A major security issue was just announced and the scope of the problem is actually quite astonishing. Here’s what you need to know about the Marriott International data breach. What is the Marriott Data Breach? On November 30th, Marriott International announced that the private information ...Keep Reading
In Part 1 and Part 2 of the 2019 Cyber Security planning series, we looked at the evolution of technology and the future of cybersecurity defense systems. There has been a steady evolution of defense options to curtail the rising efforts to commit cybercrimes. In this segment, we look at emerging and enhanced threats moving forward. Four Primary Cyber Security Risk Areas For 2019 Cybersecurit...Keep Reading
The integration of the Microsoft (MS) digital ink function and digital pen provides companies with a way to improve collaboration, increase out-the-box creativity, and drive innovation. Have you given thought on how your organization can create better cooperation among your different work teams essential for driving new product development, opening up new markets, or managing workflow? If you have...Keep Reading
How Managed IT Services can Improve Cyber Security According to BusinessWire, 4.5 billion records were compromised during the first part of 2018. Every type of organization from healthcare to banking is susceptible to a security breach. Even small businesses are no longer immune from the threat of hackers or malware. Cybersecurity is a priority for nearly every organization and finding ways to re...Keep Reading