
More Victims of the Equifax Breach Discovered
More Victims of the Equifax Breach Discovered The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were

Take These Steps to Make IT Security Top of Mind
Take These Steps to Make IT Security Top of Mind Here’s the thing about IT security: it requires a little more than a decent firewall

Tip of the Week: Moving Your Apps to Your New Phone
Tip of the Week: Moving Your Apps to Your New Phone While it feels great to power on a new phone and marvel at its

Go Wash Your Hands; Cyber Security
Go Wash Your Hands; Cyber Security Wash your hands!! That is a familiar refrain offered to children from parents for a long time. We have

Why CPA Firms are in Danger of Being Hacked
Why CPA Firms are in Danger of Being Hacked The Internal Revenue Service has declared to tax professionals that they must take extra steps toward

Microsoft Licensing; One License, Five Devices
Microsoft Licensing; One License, Five Devices Much to the dismay of some, one Microsoft license can’t be shared amongst five users. Instead, that one license

Data Loss Can (and Will!) Affect Your Entire Business
Data Loss Can (and Will!) Affect Your Entire Business Data loss, on any scale, is an organizational nightmare. Not only do you have to restore

How Can Office 365 Help a School?
How Can Office 365 Help a School? This week, Ashton Technology Solutions looks at how Microsoft Office 365 helps the teachers at Broadclyst School gain

Tech Term: What is a Dongle?
Tech Term: What is a Dongle? There are countless examples of words that have evolved to meet the needs of their times. Meat once referred