SouthTech Blog

SouthTech Blog

SouthTech is southwest Florida’s leading technology solutions provider. Since 1994, we have combined advanced technology expertise with experienced management consulting to deliver measurable and significant improvements to our clients' business practices.

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comment
Continue reading

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

0 Comment
Continue reading

Technology Has Played a Part in Shaping How We Celebrate the Season

Technology Has Played a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

0 Comment
Continue reading

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

0 Comment
Continue reading

A Trap So Devious that Even Admiral Ackbar Missed It

b2ap3_thumbnail_may_the_4th_death_star_400.jpgWith the long-awaited release of Star Wars: Episode VII The Force Awakens this December, today’s Star Wars Day holiday may be the biggest yet (May the 4th be with you). As a technology-loving IT company, we’re happy to honor our favorite science fiction franchise by taking a fun look at its futuristic space technology.

0 Comment
Continue reading

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

0 Comment
Continue reading

Mark Your Calendars, Folks: World Backup Day March 31st

b2ap3_thumbnail_world_backup_day_400.jpg2015 isn’t the year to go without backups. If there’s anything 2014 showed the world, it’s that businesses can fall victim to data breaches when they least expect it. You want to be prepared in the event of a data breach or data loss, and the easiest way to do that is by taking advantage of an external backup. Unfortunately, even an essential solution like data backup can be forgotten amidst the everyday operations of the average business owner.

0 Comment
Continue reading

IT Techie, Hurry Up My Downloads Tonight

b2ap3_thumbnail_hurry_up_downloads_400.jpgAn IT parody song to the tune of “Santa Baby.”

0 Comment
Continue reading

4 Holiday Tech Gifts for 2014

b2ap3_thumbnail_2014_gifts_400.jpgThe holidays are again upon us and if you are looking for the perfect gift for your favorite business professional, you don’t have to look too far. There are more consumer electronics available today than ever before, and most of them have some sort of novelty attached to them. We have made a list of four gifts that are not only cool, they serve a practical purpose and will probably avoid being re-gifted or recycled.

0 Comment
Continue reading

Are Your Employees as Competitive as Black Friday Sales?

b2ap3_thumbnail_workplace_competition_400.jpgBlack Friday is widely regarded as the most competitive day for American retailers, and for consumers standing in line to take advantage of rock-bottom prices, the general consensus is that all of this competition is great for their wallets. In the same way, your business can benefit from a healthy dose of friendly competition.

0 Comment
Continue reading

Ghost Servers - Who Ya Gonna Call?

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

0 Comment
Continue reading

3 Father’s Day Gifts that A Business Dad Needs!

b2ap3_thumbnail_fathers_day_june_15_400.jpgIf your Dad happens to be a business owner, then you know how hard it can be to give him a nice Father's Day present. Business owners tend to be good at buying themselves whatever they need or want. Every business owner can benefit from IT services. It's the gift that keeps on giving!

0 Comment
Continue reading

The Heartbleed Fallout

b2ap3_thumbnail_heartbleed_fallout_400.jpgLast week, the Heartbleed bug was identified as a weakness in the OpenSSL cryptographic library, potentially leaking two-thirds of the Internet's secure information from any websites utilizing this encryption style. While most major websites such as Google, Yahoo, and Facebook released patches quickly, it does little to actually remediate the problem. Your data could have been leaked over the year-plus that the vulnerability could have been accessed. There is no way to know if it has been compromised.

0 Comment
Continue reading