Are You Having A Technology Emergency?

Tolar Systems Blog

Tolar Systems has been serving the Abilene area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are YOU a HIPAA Business Associate? The Answer Could be YES for Attorneys and Accountants

HIPAA has been a key issue for health care providers and the technology firms that server them for more than 20 years. But recently, more companies are being defined as a HIPAA business associate. This means that even businesses not directly related to healthcare may now be required to comply with HIPAA regulations.

Continue reading

2017 Cybercrime Trends and Security Update

DataSecurity_Dollarphotoclub_64117399-1

As we enter 2017, we at Tolar Systems feel it’s important to inform our readers about some of the latest cybercrime trends, and what you can do about them.

Sometimes, it may seem that cybercrime – whether it’s spoofing, malware, hacking or other types of malicious activity on the web – is a problem for people that live in big cities, or own big businesses.

0 Comments
Continue reading

Three Reasons Your Business Needs a Network Assessment

IT-Systems_Dollarphotoclub_68559507-1

Think a firewall is enough to keep your business safe from hackers? Think again.

We recently wrote about a local Abilene business that fell victim to a spoofing attack. Hackers stole the identity of an IT worker and tricked restaurant workers into downloading a malicious program that resulted in a data breach that affected thousands of credit card customers.

0 Comments
Continue reading

5 Data Security (and Other) Lessons from the 2016 Election Cycle

DataSecurity_Dollarphotoclub_64117399-1

From email leaks to social media etiquette, the 2016 election cycle is highly controversial It's also full of data security and other lessons for every business. Without picking sides, let's review some of the data security and other mistakes we’ve seen political candidates and campaigns make this year.

0 Comments
Continue reading

Refresh or Recycle? 5 Reasons to Ditch Old Technology Equipment

Information-Technology_Dollarphotoclub_95169229-1

Deciding when and how to pull the plug on your old technology equipment is challenging for many business owners. New equipment is costly, but so is replacement. Most businesses need to squeeze as much life out of their technology investments as possible. This focus on "making it last" means that many don’t plan when and how to take old technology equipment out of operation.

0 Comments
Continue reading

Playing Pokemon Go? Know the Risks!

DataSecurity_Dollarphotoclub_64117399-1

Niantic’s Pokemon Go is one of the most popular smartphone games ever released. More than 10% of daily Android users play the game just a few weeks from launch. But with a trail of traffic accidents, falls from cliffs and a denial of service attacks in its wake, many people ask, “What are the risks of associated with Pokemon Go?”

0 Comments
Continue reading

Top 5 Data Security Tips for Attorneys

DataSecurity_Dollarphotoclub_64117399-1

Data security is a hot button issue in the legal profession. A recent data breach at the Panamanian law firm of Mossack Fonseca recently gave rise to the widely publicized “Panama Papers.”  Sensitive client data was divulged in the breach, leading the prime minister of Iceland to step down from his post. The breach also impacted many other high-ranking officials around the world.

0 Comments
Continue reading

The Threat in Your Pocket: Mobile Security and Encryption

nonprofit-support

One of the biggest security threats that people may not be aware of is found right in your pocket. You carry it around with you every day. Wondering what it is?

It’s your cell phone.

Mobile devices are becoming more and more ubiquitous for most people in their business and personal lives. In fact, leaving your cell phone behind can cause many people to feel positively untethered, yet cell phones and mobile devices can also create a big security risk for your business if you’re not aware of how to maintain their security.

0 Comments
Continue reading

Beginner’s Guide to Data Security and Encryption

photodune-7130778-key-and-network-security-on-computer-keyboard-background-xs

Many of our customers in Abilene and beyond are asking us,

"What are data security and encryption, and why are they important to my business?"

After all, much of the business community here in the Texas Big Country and West Texas is comprised of small and medium size businesses. You might assume that because of this, business owners here don’t face many security threats.

0 Comments
Continue reading
TOP