Our Blog
Take Advantage of Google Reviews
When you are deciding on a restaurant to dine at, you might check the Google reviews to help with your decision. The same thing goes [...]
Keep Your Information Secure by Using Strong Passwords
We use passwords for just about everything. Most of us have to enter a password to get into our computers and then enter other passwords [...]
Back to School Cyber Security Special
Are you SURE that you’re protected well enough? Can you tell your clients with 100% certainty that their data is secure? Do you ever stay [...]
Back to Cyber Security
What Businesses Need to Know Today to Protect Their Data and Their Clients’ Data By far my most popular presentation for Business Owners and Executives, [...]
Some People Gotta Learn the Hard Way
As a young investment advisor, I got my first taste of Fear Of Missing Out (FOMO) with the Beanie Babies craze. In 1995 the internet, [...]
Where Are You Going to Find Your Next Employee?
Where are you going to find your next employee, or replace one that is already on the way out the door, but you don’t know [...]
Client Spotlight: Brian Walton from Image Matters
Brian Walton is a Managed Print Specialist with Image Matters here in Knoxville. Through his integrity and customer-centric approach he has earned the spot of [...]
3 Ways To Use Technology To Prevent And Catch Financial Fraud
Small businesses handle more cash on a day-to-day basis than most individuals handle in a month. How do you fight against fraud and e-crime? Here [...]
Learn From The Best vCSOs Officer in Knoxville
JM Addington Technology Solutions is known for its cybersecurity expertise, and we’ll never stop learning. This is why, in May, Jonathan & Michael attended ongoing [...]
Cybersecurity Lingo: What is a “DDoS” ?
Cybersecurity Lingo: What is a "DDoS" ? "Distributed Denial of Service" [attack]. A DDoS attack happens when thousands or more of computers send traffic to [...]
Client Spotlight | William D King
William D King founded ABA Business Advisors (ABA) in 2011 to provide tax minimization strategies to the medical community and small businesses. With clients in [...]
Cybersecurity Lingo: What is a “botnet” ?
Cybersecurity Lingo: What is a "botnet" ? A botnet is a group of computers bad guys have under their control, usually thousands or more. Botnets [...]
Take a Break and Have Managed IT Services
According to WATE, Knoxville police pulled over a driver speeding down I-40 at over 100 MPH in May. Why? He said he needed to use [...]
Cybersecurity Lingo: What is a “zero day” ?
Cybersecurity Lingo: What is a "zero day" ? A zero day is the worst kind of security bug: a hole that is already in use [...]
Cybersecurity Lingo: What is a “CVE”?
Cybersecurity Lingo: What is a "CVE"? It is a unique ID for a specific security bug. This ID is unique to every bug ever found, [...]