Are You Having A Technology Emergency?

Tolar Systems Blog

Tolar Systems has been serving the Abilene area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are YOU a HIPAA Business Associate? The Answer Could be YES for Attorneys and Accountants

HIPAA has been a key issue for health care providers and the technology firms that server them for more than 20 years. But recently, more companies are being defined as a HIPAA business associate. This means that even businesses not directly related to healthcare may now be required to comply with HIPAA regulations.

Continue reading

Three Reasons Your Business Needs a Network Assessment

IT-Systems_Dollarphotoclub_68559507-1

Think a firewall is enough to keep your business safe from hackers? Think again.

We recently wrote about a local Abilene business that fell victim to a spoofing attack. Hackers stole the identity of an IT worker and tricked restaurant workers into downloading a malicious program that resulted in a data breach that affected thousands of credit card customers.

0 Comments
Continue reading

5 Data Security (and Other) Lessons from the 2016 Election Cycle

DataSecurity_Dollarphotoclub_64117399-1

From email leaks to social media etiquette, the 2016 election cycle is highly controversial It's also full of data security and other lessons for every business. Without picking sides, let's review some of the data security and other mistakes we’ve seen political candidates and campaigns make this year.

0 Comments
Continue reading

Five Signs Your I.T. Equipment is Out of Date

IT-Systems_Dollarphotoclub_68559507-1

Your I.T. equipment is an important asset that requires planning. Asset and life cycle management are “cradle to grave” planning for acquisition, maintenance and eventual decommissioning of the technology your business needs to succeed. And as we discussed in last week's post on "5 Reasons to ditch old equipment", asset and life cycle management are an important part of keeping your important business data more secure.

Here are five signs that you need to take a closer look at managing the lifecycle of your I.T. equipment.

0 Comments
Continue reading

Playing Pokemon Go? Know the Risks!

DataSecurity_Dollarphotoclub_64117399-1

Niantic’s Pokemon Go is one of the most popular smartphone games ever released. More than 10% of daily Android users play the game just a few weeks from launch. But with a trail of traffic accidents, falls from cliffs and a denial of service attacks in its wake, many people ask, “What are the risks of associated with Pokemon Go?”

0 Comments
Continue reading

Top 5 Data Security Tips for Attorneys

DataSecurity_Dollarphotoclub_64117399-1

Data security is a hot button issue in the legal profession. A recent data breach at the Panamanian law firm of Mossack Fonseca recently gave rise to the widely publicized “Panama Papers.”  Sensitive client data was divulged in the breach, leading the prime minister of Iceland to step down from his post. The breach also impacted many other high-ranking officials around the world.

0 Comments
Continue reading

The Threat in Your Pocket: Mobile Security and Encryption

nonprofit-support

One of the biggest security threats that people may not be aware of is found right in your pocket. You carry it around with you every day. Wondering what it is?

It’s your cell phone.

Mobile devices are becoming more and more ubiquitous for most people in their business and personal lives. In fact, leaving your cell phone behind can cause many people to feel positively untethered, yet cell phones and mobile devices can also create a big security risk for your business if you’re not aware of how to maintain their security.

0 Comments
Continue reading

Taking A Closer Look at Encryption

Encryption is one of the most controversial topics in the IT industry, and one we've blogged about in the past. It's also one that more and more of our clients and customers are asking us about. In the wake of costly hacks like the one at Target in recent years, businesses want to understand more about how to keep their critical information safe.

0 Comments
Continue reading

Beginner’s Guide to Data Security and Encryption

photodune-7130778-key-and-network-security-on-computer-keyboard-background-xs

Many of our customers in Abilene and beyond are asking us,

"What are data security and encryption, and why are they important to my business?"

After all, much of the business community here in the Texas Big Country and West Texas is comprised of small and medium size businesses. You might assume that because of this, business owners here don’t face many security threats.

0 Comments
Continue reading
TOP