(319) 688-9319 contact@keystoneit.com

Using Password Protected Networks

Keystone It frequently assists businesses that have multiple computer users, but each has a stand-alone computer – computers are not networked or linked to other computers in the office. The consequence is workers lack a simple way to share documents. As you...

Threats to Computers and Networks

Magnitude: More than 317 Million New Malware Pieces of Software Were Created in 2015 Malware is the umbrella description for software designed to penetrate someone’s computer or computer system to do something unintended: destruction, theft, monitoring, create a...

Hacking Small Businesses

The National Small Business Association recently released its 2013 Small Business Technology Survey, a study of small-business owners selected by the association. Among the findings were that 94 percent of small-business owners were worried about cybersecurity and...

Data Protection

Have you thought about what data files are important for sustaining your business? I would bet that they would include: accounting files; personnel records; inventory records; Customer Relationship Management (CRM) files and customer records; corporate records;...

Hostage-taking on the Internet

BUSINESS 380 TECH CONNECT | MIKE MCKAY In the good old days(a few years ago), we users of the Internet had to deal with pranksters, vandals and thieves. Software designed to break into other people’s computers was called “malware,” short for “malicious software.”...