Blog

Idaho State University fined $400,000 for skipping HIPAA Security Risk Analysis

Skipped HIPAA Security Risk Analysis costs ISU $400,000 IT consultants and Managed IT service providers have been warning their clients that the HIPAA Security Risk Analysis is a very necessary component in their efforts to comply with the HIPAA rule. Some of our medical clients and prospects […]

Read more

Goodbye Windows XP

It’s nearly time to say goodbye Windows XP. This past April marked the one year count-down to the eventual discontinuation of support for the venerable operating system (technically on April 8, 2014). What does this mean to you? In short, it’s high time you moved on and […]

Read more

RescueSMB Backup and Disaster Recovery

Thom Infotech is pleased to announce our new RescueSMB Backup and Disaster Recovery program. This solution brings enterprise-class business continuity capabilities to the Small to Medium Business (SMB) community in an affordable and convenient package. RescueSMB boasts the following features: Frequent Backups –  As often as every […]

Read more

Business Continuity Planning

Keeping your business afloat after a disaster As the owner of a technology consulting firm, I’m occasionally asked to assist with Business Continuity Planning (BCP). As the name implies, BCP is a discipline that attempts to answer the “what if” questions that surround the viability of a […]

Read more

Oracle closes critical Java vulnerability

Oracle announced today the release of updates for Java versions 5, 6, and 7 to patch a critical java vulnerability actively being exploiting in the wild. The patches were reportedly slated for release in April but the timetable was pushed up in response to a recent report […]

Read more

Anti-virus software alone is not enough

“Anti-virus software alone is not enough”… so says the number one antivirus provider Symantec in this post. A rather stunning admission I would say, and something many in the security industry have known for quite some time. The admission comes on the heels of the successful infiltration […]

Read more

Apple blocks vulnerable Flash plugins

Kudos to Apple. Last week they decided to start blocking vulnerable versions of Adobe Flash plugins from running in the built-in Safari web browser. This is in direct response to the active exploits in the wild affecting Macs as well as PCs. Users who fail to update […]

Read more

Yet Another Java Zero-Day

Researchers at the respected security firm FireEye have discovered yet another Java zero-day attack that leverages previously unknown vulnerabilities with the latest versions of Java (as of this writing Java v1.6 Update 41 and Java v1.7 Update 15) to install malware. This comes on the heels of […]

Read more

Evernote hack results in forced password change

Evernote is a really cool app. I use it heavily in conjunction with David Allen’s “Getting Things Done” system to organize my day and achieve my goals. I also use it for more mundane tasks such as grocery lists. I use it on my PC, my iPad, […]

Read more

Apple also a victim of targeted malware attack

Apple revealed today that they were targeted by the same malware attack leveled against Facebook on February 1st. The earlier comments by Facebook hinted at a working group of high-value targets and Apple now appears to be among them. The attack took advantage of a previously unknown […]

Read more

Contact

Thom Infotech
480 E. Roosevelt Rd. Suite 202
West Chicago, IL 60185
Phone: 630 937-1500
Fax: 630 937-1515

Open a Ticket


Need Help? The most efficient way to get the assistance you need is to submit a ticket so that we can route your request to the people who have the answers you are looking for.
Open a Ticket