Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

What You Can Learn From Recent Hacking Attacks Against Celebrities

What You Can Learn From Recent Hacking Attacks Against Celebrities

It appears that the Department of Homeland Security is stepping in after one of the Ghostbusters had her personal information leaked online after falling victim to a cyber attack. Leslie Jones, who played Patty Tolan in the recent reboot, had not only photos of her passport and driver’s license but also nude images of herself--allegedly taken from the comedian’s iCloud account--posted on her website by hackers. Less than a day after her website was taken down, Homeland Security began an investigation into the hack.

Continue reading
0 Comment

Delta Air Lines “Grounded” for Not Adhering to Best Practices

Delta Air Lines “Grounded” for Not Adhering to Best Practices

Nobody likes being delayed at the airport, forced to sit in uncomfortable chairs as the minutes slowly pass, each signifying that an important event or deadline is that much closer to being missed. Events that cause such delays cause headaches for passengers and airlines alike, just ask Delta, who recently suffered from such an event when a power outage struck Atlanta, GA, and with it, Delta’s computer system.

Continue reading
0 Comment

Social Engineering: Not All Hackers Target Technology

b2ap3_thumbnail_social_engineering_risky_400.jpgThe nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as “social engineering” to fool users into handing over sensitive information that can be used against them.

Continue reading
0 Comment

Biohacking: Integration of Smart Technology with the Human Body

b2ap3_thumbnail_nfc_payment_400.jpgWearable technology is still emerging, but a much different type of smart tech is coming soon. At the Kaspersky Labs Security Analyst Summit, the question of whether or not embedding technology in the human body is a viable concept was discussed in detail. This is supposedly the future of smart technology.

Continue reading
0 Comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Hackers Malware Microsoft Network Security Efficiency Data User Tips Innovation Software Business Miscellaneous Smartphones Backup Email Productivity Internet Hardware communications Computer Hosted Solutions Mobile Devices Workplace Tips Android Productivity Smartphone Communication Windows 10 Ransomware Cybersecurity Social Media VoIP Business Management Browser Outsourced IT Windows Tech Term Network Upgrade IT Support Mobile Device Managed IT Services Small Business Business Continuity Passwords IT Services Microsoft Office Save Money Employer-Employee Relationship Users Holiday Office Collaboration Apps Facebook Managed IT Services Windows 10 Bandwidth Automation Cloud Computing Chrome Data Backup Internet of Things Gadgets IT Support Marketing Gmail Quick Tips Disaster Recovery Wireless Alert Applications Data Recovery Password Server Wi-Fi Information Business Intelligence Mobility App Computers Office Tips Apple Managed Service Health Router Remote Computing Mobile Device Management Hacking Settings Virtualization Networking Website Operating System Patch Management Blockchain Office 365 Laptop Physical Security Managed Service Provider Excel Cybercrime Government VPN Phishing Analytics Law Enforcement BYOD Application Saving Money Access Control Data Management Retail Biometrics Value Going Green History Mouse Twitter BDR Remote Monitoring Word Mobile Computing Google Drive Workers Safety Recovery VoIP Paperless Office Entertainment Politics Environment WiFi Managed IT Service Maintenance Compliance Big Data iPhone Data Breach Lithium-ion battery Artificial Intelligence Virus Battery Spam Social Engineering Telephone Systems Telephone System Cleaning Bring Your Own Device Hosted Solution DDoS Robot Wireless Charging Dark Web Tech Support IT solutions Hard Drives Printer Payment Cards Tip of the week Printer Server Risk Management Customer Service Humor Virtual Assistant Data Protection Internet Exlporer Managing Stress HIPAA Streaming Media Hybrid Cloud Fax Server How To The Internet of Things Tech Terms Remote Monitoring and Management Two-factor Authentication Sports RAM Cost Management Net Neutrality Information Technology Business Technology Employee-Employer Relationship Vulnerability eWaste Processor Healthcare Company Culture Scam Cortana Telephony Smart Technology User Error Best Practice Data Security G Suite Files Shortcut Tablet Medical IT Data storage PowerPoint Connectivity End of Support Voice over Internet Protocol Current Events Mobile Office Batteries Social Network Human Resources Search Antivirus Techology instant Messaging Tablets Edge Websites Storage Cameras Printers Specifications Paste Meetings Reputation Video Best Available Advertising Bitcoin Wireless Internet Distribution Trends Google Maps Education HaaS Vulnerabilities Amazon Dongle Error Conferencing Spotify Customer OneNote Distributed Denial of Service Private Cloud Customer Relationship Management Help Desk Fleet Management Lead Generation A.I. Personal Information Remote Support Shadow IT Flexibility Hiring/Firing Budget Cryptocurrency WIndows 7 Memory IT budget Plug-In Unified Threat Management Touchscreen Content Filtering Database Cabling Remote Control Windows Server 2008 R2 Public Cloud Threats Certification Movies Windows Media Player Botnet SaaS Legal Staffing Touchpad Windows 7 IT Management Proactive IT Programming Technology Tips Microsoft Office 365 User Tip Tactics Spam Blocking Taskbar Scams Training WannaCry Unified Communications Managed IT File Sharing Time Management Backup and Disaster Recovery Authentication Telecommuting Internet Explorer Windows XP Email Management SharePoint Relocation National Security Encryption PDF Project Management Security Cameras Hard Drive User Security Video Games Chrome OS Phone System Analyitcs Network Attached Storage Analysis SSD Authorization Millennials Threat Updates User Notifications Insurance Wearables Hacker Processors Microsoft Teams Licensing Gadget Black Market Server Management Inventory Troubleshooting Printing Webcam YouTube Science Spyware Travel Worker Alerts Electronic Health Records Machine Learning Display Bluetooth Mobile Security Update File Management Paper NarrowBand Windows 8 HP Live Streaming Reporting Sales Work/Life Balance Downtime Employees Virtual Reality Telecommute Benchmarks USB Social e-waste Outlook Managed Services Provider Voice over IP Ink Avoiding Downtime Multi-Factor Security Wearable Technology Wireless Technology E-Commerce Document Management Cables Automobile WhatsApp Data loss Knowledge People Solid State Drive Bloatware Recycling Profitability Vendor eCommerce Running Cable News Uninterrupted Power Supply Chromecast Payment Digital Staff GDPR Computer Accessories Access Comparison disposal Copy Monitor Hard Disk Drive Consultant Entrepreneur Social Networking Eliminating Downtime Online Shopping Downloads Internet exploMicrosoft