Philadelphia Technology Blog
Our Philadelphia technology blog is for busy business and legal executives in small to mid-sized companies. We share insights and information you can digest quickly and act upon.
Browse by Category
The smartphone app WhatsApp has become a major concern for forensic investigations. This app, owned by Facebook, is a cross-platform messaging app providing encrypted communications, Internet voice calls, unlimited texting and multi-media file sharing. Savvy users...read more
Password “security” – what value does it really have for you? That depends on how much you value your identity. In today’s society, the term is overused to the point of us becoming desensitized to the importance of keeping our passwords secure. We tend to ignore the...read more
Successfully integrating systems from two distinct IT environments is one of the biggest challenges during a merger or acquisition. Often, this is too big of a project for IT organizations within the companies to assume with current staff and resources. According to...read more
Meet George Jetson It should be of no surprise that voice, drone, and machine learning technologies are maturing at an expeditious rate. Furthermore, the consumer desire to be further dependent on such devices is driving and fueling this technology growth. All this...read more
Smart Device Hacking and Prevention Today, we'll take a look at our explosive use of these devices and what smart device hacking and prevention means to us in a practical sense. In my past two blogs, we’ve covered the Growth and Challenges of Smartphone...read more
Smartphone Security 101 and the basis for how you, the user, should be taking precautions when using your smart device. I’d like to offer a few tips on smartphone security as a follow up to my last blog on smartphone advances and challenges. Aside from the Android...read more
I recall back in the 80s..... That’s 1980’s mind you, the first “mobile phone” I had for work was the size of a shoe box and weighed almost five pounds. The footprint of the "mobile" phone was similar to that of an old style house phone. Today, the smartphone is...read more
The Cryptolocker Ransomware virus has been around since late 2013 and unlike other viruses, it continues to wreak havoc on Windows PCs and networks and now … Macs. This attack will cause your data to be inaccessible unless you pay a ransom or have a valid and recent...read more
An emerging global threat known as the ‘Business Email Compromise fraud scheme’ is a very sophisticated large-scale computer-enabled crime. This scam targets businesses working with foreign suppliers and/or businesses that routinely perform wire transfers. Scammers...read more
ITAcceleration Can Assist with All of Your IT Support Needs
Contact us to learn more about our help desk, managed IT services, digital forensics, WordPress managed website hosting and cloud hosting services or just to get a quote.