Are You Having A Technology Emergency?

Tolar Systems Blog

Tolar Systems has been serving the Abilene area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Network Security: Three Steps to Secure Your Systems

DataSecurity_Dollarphotoclub_64117399

Whether the network you use is for personal or business needs, network security is something that should always be taken seriously. In 2016 alone, more than 2 billion records were stolen or breached due to problems with network security. The cost to recover from a network security breach can be astronomical for a small business – a recent survey indicates that it costs SMBs more than $50,000 to recover from a breach in their security.

0 Comments
Continue reading

Three Reasons Your Business Needs a Network Assessment

IT-Systems_Dollarphotoclub_68559507-1

Think a firewall is enough to keep your business safe from hackers? Think again.

We recently wrote about a local Abilene business that fell victim to a spoofing attack. Hackers stole the identity of an IT worker and tricked restaurant workers into downloading a malicious program that resulted in a data breach that affected thousands of credit card customers.

0 Comments
Continue reading

Abilene Tech News: Disaster Recovery and Spoofing Attack

DataSecurity_Dollarphotoclub_64117399-1

We recently saw some news items here in Abilene that reminded us that no matter where you live and how great your community is, as a business owner you simply can’t afford to neglect your technology.

Disaster Recovery News

The first item has to do with disaster planning. Abilene TV station KTXS recently reported that state and local first responders are preparing for possible weather-related and other disasters by attending a four day training coordinated by the West Central Texas Council of Governments.

0 Comments
Continue reading

Playing Pokemon Go? Know the Risks!

DataSecurity_Dollarphotoclub_64117399-1

Niantic’s Pokemon Go is one of the most popular smartphone games ever released. More than 10% of daily Android users play the game just a few weeks from launch. But with a trail of traffic accidents, falls from cliffs and a denial of service attacks in its wake, many people ask, “What are the risks of associated with Pokemon Go?”

0 Comments
Continue reading

The Threat in Your Pocket: Mobile Security and Encryption

nonprofit-support

One of the biggest security threats that people may not be aware of is found right in your pocket. You carry it around with you every day. Wondering what it is?

It’s your cell phone.

Mobile devices are becoming more and more ubiquitous for most people in their business and personal lives. In fact, leaving your cell phone behind can cause many people to feel positively untethered, yet cell phones and mobile devices can also create a big security risk for your business if you’re not aware of how to maintain their security.

0 Comments
Continue reading

Beginner’s Guide to Data Security and Encryption

photodune-7130778-key-and-network-security-on-computer-keyboard-background-xs

Many of our customers in Abilene and beyond are asking us,

"What are data security and encryption, and why are they important to my business?"

After all, much of the business community here in the Texas Big Country and West Texas is comprised of small and medium size businesses. You might assume that because of this, business owners here don’t face many security threats.

0 Comments
Continue reading
TOP