Milwaukee IT Services Blog

where Milwaukee goes for technology information

 

Many of us either use weak passwords or reuse passwords on multiple accounts. Storing your passwords in your browser, a document, or in writing opens you up to a number of threats, and also increases your risk of losing that important data...

A strong password should include a mix of lower-case and upper-case letters, numbers, and special characters. However, the overall password length is even more important than the characters used, as password cracking programs will start wit...

After 10 years, support for Windows 7 is coming to an end on January 14, 2020, with Office 2010 following shortly thereafter.

End of support means that your Windows 7 or Office 2010 software will no longer receive updates, including sec...

To reduce redundancy of features and avoid confusion, Microsoft is planning to decommission Skype for Business within Office 365 with a definite end-date of July 31, 2021. As a result, it’s critical for organizations to plan and impl...

Ransomware has been getting a lot of headlines most recently, but a new version of ransomware has arrived and it is even more dangerous than its predecessors. It’s called Ransom-Cloud and it has the power to encrypt cloud-based emails and f...

By Jake Olcott, VP Government Affairs at BitSight

If you’ve glanced at the opinion columns of security industry publications, you’ve probably seen the term “risk-based” floating around, as in “the time is now for a comprehensive, risk-...