Cybrix-BlogWe’re completely obsessed with IT!We love what we do and we strive to stay ahead of new trends and technologies every day. We’re using this blog to share with you our passion and technology adventures that we experience through our work! If you’re as excited about technology as we are, feel free to comment on any of our post. And of course, if you ever have any questions about a topic we write about or your own IT issues reach out to us. We’re always just a few clicks away! This email address is being protected from spambots. You need JavaScript enabled to view it.

This e-mail address is being protected from spambots. You need JavaScript enabled to view it. Let's explore!

Root Cause Versus Symptoms

Written by Tim Jones on Tuesday, 16 August 2011. Posted in Cyber Security

When you start noticing that your server is acting strange, what do you do? Do you immediately call in a technician to investigate the root cause of the issue? Or do you do what most people do – restart the server? Many people are of the mindset that resetting a device automatically fixes the problem.

What is your server’s mean time between failures?

Written by Tim Jones on Friday, 12 August 2011. Posted in Cyber Security

Though we’d all love if all of our equipment worked perfectly all of the time, sadly this is not the case. Sometimes, you’re going to experience issues with your server, and it’s up to you to resolve them. The mean time between failures, known as MTBF, is the average amount of time your organization has between server failures, and having that number is a great way to determine the health of your server. The more time you have between failures, the better shape your server is in. If you find yourself with a very short MTBF, there may be something deeper occurring that needs to be investigated and remedied or it may be time to replace your server.

Prevent USBs From Spreading Viruses

Written by Carson Bomar on Monday, 11 July 2011. Posted in Tech TIp

Did you know USB drives can easily spread viruses without you knowing?

A thumb drive can infect a clean desktop system easily and efficiently with its handy AutoPlay feature. Turn off AutoPlay on all of your computers to keep this from happening. Here's how:

Cybrix Group Is Listed As One of The 50 Fastest Growing Businesses In Tampa Bay!

Written by Tim Jones on Friday, 08 July 2011. Posted in Cyber Security

The Cybrix Group is excited to announce that we have been ranked one of the top 50 fastest growing businesses in the Tampa Bay area! We are extremely honored to be bestowed with this prestigious award. Our organization has been working tirelessly to promote data security, stronger IT infrastructures and engineering and acquisition solutions for our customers since our incorporation in 2002, and we are thrilled to see that our hard work has paid off.

PC Maintenance

Written by Carson Bomar on Tuesday, 05 July 2011. Posted in Tech TIp

A little preventative maintenance for your business desktop

At least once a year, you should open up your desktop pc and blow it with a can of compressed air. Be careful not to turn the compressed air upside down, and you may want to take the computer outside before you blow the dust out of it.

Top 5 Internal Security Threats

Written by Carson Bomar on Tuesday, 28 June 2011. Posted in Cyber Security

What Are The Top 5 Internal Security Threats?

Sony Play Station breach – When they’re after you, you better be prepared

Written by Phil DuMas on Friday, 24 June 2011. Posted in Cyber Security

Despite what media reports have been saying about Sony being drastically unprepared to block a security breach and negligent in protecting its users, I don’t believe it was necessarily all their fault. Virtually any database in the world, secure or not, can be hacked as long as the hackers have 1 or more of the following three items:

  1. Time
  2. Motivation
  3. Money

Technology invading our privacy – Intrusive or beneficial?

Written by Phil DuMas on Tuesday, 21 June 2011. Posted in Cyber Security

As technology continues to advance, the myriad of ways in which the government can invade our privacy (such as using GPS and satellites to track our location, tapping into our phones to listen to our conversations, downloading our data, conducting facial recognition scans at borders, positioning cameras on the streets, and forcing airplane passengers to conduct full-body scans at security checkpoints) has grown exponentially. Is this invasion of our privacy intrusive or beneficial?

Hackers love to infiltrate your devices while you fly

Written by Phil DuMas on Wednesday, 15 June 2011. Posted in Tech TIp

You might know that it’s important to have data security, protection and encryption in the office, sure, but what about when you’re on the go at the airport or on a flight? Did you know that someone can hack into your laptop or your phone (when you’re not even using them!) and steal your data, install software and apps and crack your usernames and passwords?

Buying A Business Desktop PC

Written by Carson Bomar on Monday, 13 June 2011. Posted in Tech TIp

How to Buy a Business Desktop PC

It may be tempting to purchase a consumer desktop PC from Best Buy or Wal-Mart, but you will be doing yourself a disservice if you do. Business Desktop PC's have extra features that make them better suited for the office than the $350 on sale special you will find at big box retailers. Business desktops are built to last longer, and they are easier to service than consumer desktops.

Do you know what the value of your data is?

Written by Keith Vassalotti on Friday, 10 June 2011. Posted in Cyber Security

When deciding whether or not to undertake a cyber security project, you will want to consider how important your data is to your organization. To get an idea of the value of your data, ask yourself the following questions: What would be the operational impact if my data were stolen? How much cash flow is generated by my data? How drastically will my company and its financials be affected if my data is stolen?

Financial Impact of In-House IT vs. as-a-Service delivery

Written by Keith Vassalotti on Tuesday, 31 May 2011. Posted in Cyber Security

When it comes to deploying IT infrastructure – hardware or software – there are essentially three models. First, you could own and manage your own hardware in your own facility with your own resources. Second, you could own your hardware and hire a third party to manage it for you in your facility. Third, you hire a third party who will own and manage the infrastructure in their facility. The third option can referred to as “IT as a Service” or, in the case of a software application, “Software as a Service”.

Keeping the lights on isn’t the only thing to consider when budgeting for IT

Written by Keith Vassalotti on Monday, 16 May 2011. Posted in Cyber Security

When planning an IT budget there is usually no shortage of opportunities to spend money. Of course, how much your company budgets for IT will depend on many factors such as the industry you compete in, your current level of technology and your available resources. Depending on your circumstances, you might need to spend more on IT.

Don’t be tricked by the social factor

Written by Phil DuMas on Wednesday, 11 May 2011. Posted in Cyber Security

When we think of data security, we usually think of hackers sitting in dark rooms typing feverously on their computers trying, attempt after attempt, to crack our passwords. What if it wasn’t that hard? We’ve seen hackers trick people into opening their front doors and welcoming them in with open arms. (Not literally, but you get the point).

Moving Forward Vigilance is Key

Written by Tim Jones on Monday, 02 May 2011. Posted in Cyber Security

Usama bin Laden, al-Qaeda leader, openly declared war on the United States in 1998 and has since coordinated countless terrorist attacks that were responsible for the deaths of thousands of innocent people, including the 9/11 attacks that brought millions of Americans angst and heartache. Finally, on Sunday evening, May 1st, the American people received a measure of justice. President Obama announced that Navy Seal Team 6 had stormed a Pakistani compound and successfully killed Usama bin Laden.