• Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Cybersecurity threats are on the rise. Your business is at risk. | Download the Network Security Checklist

Midnight Blue logo
  • Home
  • Solutions
    • Managed IT Services
    • Cybersecurity Solutions
    • Data Backup & Recovery
    • Cloud IT Services
    • Support & Maintenance
    • Infrastructure Management
    • VoIP Phone Services
    • Custom Solutions
  • Resources
    • Tech Guides
    • Blog & News
  • Careers
  • Support
  • Get in Touch

Blog & News

All Categories

All Categories Best Practices Blog Posts Business Case Study Cloud Events MBTS Team Network Security News Security Tech Tips Technology Telephony Uncategorized

Tip of the Week: 5 Useful Browser Tips

09/19/2018

The best way to access the Internet is to use a web browser. Today, we’ll discuss five basic tricks to help you make the most of your web browser. Close a Tab Again, keep in mind that when we say “basic,” we mean it. You can close a tab by clicking on the little “x” […]

Read More...

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

09/17/2018

Printers, along with every other piece of equipment that is on your network, require careful configuration and regular upkeep to ensure that they aren’t putting your data and users at risk. Security researchers recently discovered two massive vulnerabilities in HP Officejet All-in-One printers that make it incredibly easy for hackers to spread malware and gain […]

Read More...

A Look at this Year’s Worst Cybercrimes… So Far

It’s fair to say that today’s organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, organizations need to ensure that they are doing what’s necessary to mitigate problems stemming from the continuous flow of threats. To give our […]

Read More...

Hackers Continuously Target Major Sporting Events

09/14/2018

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events. The World Cup The […]

Read More...

Technology Basics: Read-Only

09/12/2018

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below. Reading into Read-Only Read-only is an attribute that can be assigned to a stored […]

Read More...

1 … 37 38 39 … 97
Midnight Blue logo

Sign Up For Newsletter

Navigate

  • Solutions
  • Company
  • Blog
  • Pittsburgh

Interact

  • Support
  • Pay My Bill
  • Contact

Get Social

  • Facebook
  • Twitter
  • Linkedin

1195 Washington Pike, Suite 340, Bridgeville, PA 15017
Midnight Blue Technology Services, LP
412.342.3800

  • Privacy Policy
  • Sitemap