3 Types of hackers and what they do

There are many hackers in the world. Some hackers just want to cause mischief, while others have more malicious intentions. In this blog post, we will explain the three main kinds of hackers and how they differ from one another.
A complicated history
In the 1950s, the term “hacker” was vaguely defined as someone who explored the details and limits of computer technology by testing them for a variety of purposes.

Prevent hackers from exploiting your business printers with these tips

Can business printers get hacked? The short answer is yes. Anything that connects to your business network can be exploited by malicious actors on the internet, even innocuous machines like your printers. These can be exploited to steal data and/or create entry points into your system to launch larger attacks.

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful.

Potential IT security issues in 2016

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in the public eye.

Little Companies…Big Hacks…by dStringer

In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story.  "Well", I told myself.  "I've written about cyber security many times.  Do I write about it again"?

Ahhh.

WHY TECHNOLOGY INTIMIDATES PEOPLE by DStringer

We at "Alcala Consulting" are constantly looking for new, innovative, and "user-friendly" ways to make the "World of Technology" less intimidating for our clients and potential clients.  Ultimately, we pride ourselves in being available to lift the "Technological Burden" off of business owners.