Our Blog
3 Ways To Use Technology To Prevent And Catch Financial Fraud
Small businesses handle more cash on a day-to-day basis than most individuals handle in a month. How do you fight against fraud and e-crime? Here [...]
Learn From The Best vCSOs Officer in Knoxville
JM Addington Technology Solutions is known for its cybersecurity expertise, and we’ll never stop learning. This is why, in May, Jonathan & Michael attended ongoing [...]
Cybersecurity Lingo: What is a “DDoS” ?
Cybersecurity Lingo: What is a "DDoS" ? "Distributed Denial of Service" [attack]. A DDoS attack happens when thousands or more of computers send traffic to [...]
Client Spotlight | William D King
William D King founded ABA Business Advisors (ABA) in 2011 to provide tax minimization strategies to the medical community and small businesses. With clients in [...]
Cybersecurity Lingo: What is a “botnet” ?
Cybersecurity Lingo: What is a "botnet" ? A botnet is a group of computers bad guys have under their control, usually thousands or more. Botnets [...]
Take a Break and Have Managed IT Services
According to WATE, Knoxville police pulled over a driver speeding down I-40 at over 100 MPH in May. Why? He said he needed to use [...]
Cybersecurity Lingo: What is a “zero day” ?
Cybersecurity Lingo: What is a "zero day" ? A zero day is the worst kind of security bug: a hole that is already in use [...]
Cybersecurity Lingo: What is a “CVE”?
Cybersecurity Lingo: What is a "CVE"? It is a unique ID for a specific security bug. This ID is unique to every bug ever found, [...]
Cybersecurity Lingo: What is a “malicious actor” or a “bad actor”?
Cybersecurity Lingo: What is a "malicious actor" or a "bad actor"? The rest of the world calls these people hackers. It's pretty simple. Inside computer [...]
Cybersecurity Lingo: What is an “Attack vector” ?
Cybersecurity Lingo: What is an "Attack vector" ? This is *how* a malicious actor enters your system. For instance, they may buy passwords on the [...]
Cybersecurity Lingo: What is an “Attack Surface” ?
Cybersecurity Lingo: What is an "attack surface"? Simply: it is anywhere an attacker can get into your systems if proper security is not applied. This [...]
UPDATE YOUR SOFTWARE ALREADY
I know I know, you hear it all the time, BUT UPDATE YOUR SOFTWARE. Today's bugs all come from Chrome, where we have MULTIPLE security [...]
Free Threat Hunting Special Limited Time Offer
Did you know that the average time a Hacker is in your network is 6 months BEFORE they strike? There are TWO recent KNOXVILLE Ransomware [...]
Why You Should Start Encrypting Your Laptop
In March, we brought on a new client whose previous IT provider did not insist on encrypting laptops. One of the users also had a [...]
Don’t Use A VPN. Do This Instead
VPNs have been all the rage for the last couple of years. The hype is that they protect your privacy, encrypt your traffic, and increase [...]