Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

irfanviewAs Windows has grown and its feature set getting bigger, it includes pretty much everything you need to get everything done. However, just because it can do it doesn’t mean it’s the best tool to do it. Every IT guy has a program they install immediately upon getting a new computer. Replacing the built-in Windows graphic viewer with Irfanview is my immediate install.

Tagged in: Software Tips Windows

CCleaner Hacked – What You Need To Know

Posted by on in Security

ccleanerYou may have heard the news that the immensely popular CCleaner disk cleanup tool was hacked. Most IT guys (and many consumers) have used CCleaner to free up disk space (combined with the third-party CCEnhancer, it can clean up a lot of extra files that standard window Disk Cleanup won’t get). That being said, if you’re running CCleaner 5.3.3, you are potentially at risk and it is recommended you upgrade (older versions and newer versions are not affected – the 5.3.3 version was available on their site for a month).

Tagged in: Security Virus Windows

Tech Tip: Microsoft Word Keyboard Shortcuts

Posted by on in How To

Microsoft Word 2013 logoMicrosoft Word is a program we all spend a great deal of time in. And if you think about it, most of your time in that program is spent with your hands on the keyboard. The more you move your hands from your keyboard to your mouse and back, the less productive you are. Keyboard short cuts are the answer to increase your productivity.

Tagged in: Microsoft Office365 Tips

Remember the Basics to Prevent Data Breaches

Posted by on in Security

seccompModern technologies are certainly making it easier for an organization to minimize risk and detect and prevent security breaches when they occur. Between intrusion detection systems, next generation firewall systems, threat management solutions, data encryption solutions, there are a lot of ways to help your organization. However, the basics of security are just as important. If you look at the HIPAA data breach portal, you’ll find a pile of examples of breaches caused by simple errors and security mistakes.

While the FTC doesn’t cover enforcement of HIPAA-covered entities, their latest blog post for business is a must read for your business, no matter if you’re HIPAA-regulated or not. Start with Security: A Guide for Business covers the following aspects of data security in an easy-to-follow format:

  1. Start with security.
  2. Control access to data sensibly.
  3. Require secure passwords and authentication.
  4. Store sensitive personal information securely and protect it during transmission.
  5. Segment your network and monitor who’s trying to get in and out.
  6. Secure remote access to your network.
  7. Apply sound security practices when developing new products.
  8. Make sure your service providers implement reasonable security measures.
  9. Put procedures in place to keep your security current and address vulnerabilities that may arise.
  10. Secure paper, physical media, and devices.

While this is an especially important issue to regulated industries, the advice is good for any business to follow.

Healthcare BackupIn any business, keeping operational when you’re supposed to be is always the goal. But what if something happens to keep you from functioning properly? This is especially important in healthcare where timely access to critical health information can literally mean life or death. Is your IT infrastructure ready for worst-case scenario? Do you have a business continuity plan in-place?