Believe it or not, there’s more news in Washington D.C. than matters concerning the upcoming election–namely the fact that the Library of Congress was struck by a DoS (Denial of Service) attack in July, supporting the members of government in their calls for an apparently much-needed update to the Library’s systems. While the average American […]
Hurricane season in can be a stressful time, especially when these storms have a variety of projected paths and it’s tough to tell which direction it’s headed. Our best advice is to prepare for the worst and keep up with the current path of the storm. Here are some great uses for your mobile phones […]
Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft–by no less than the Secret Service. Machines in Connecticut and Pennsylvania have been found to have periscope skimmer devices attached inside, especially in those machines with openable lids that […]
Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it. Called the Project Zero Prize contest, contestants must be able to hack into a Nexus 6P and a Nexus 5X with nothing but the phone numbers and associated email […]
The search for the perfect way to handle a data loss disaster has led many businesses to implement data backup and disaster recovery solutions, but the most challenging part of doing so is finding a solution that can minimize data loss and recovery time. Furthermore, there’s a specific need to understand the difference between data […]
Hackers have the ability to cripple systems and steal important (or sensitive) data, and if you’re not careful your business could become their latest victim. Here are five ways that you can make it more difficult for hackers to infiltrate your systems and steal your data. Protect Important Security Credentials Hackers naturally target the credentials […]
I think you guys always exceed my expectations and find you and your company to be one of integrity which is rare in these days. I stand behind my quick response to recommend you and RJ PRO when I hear that someone needs the service you guys provide and I appreciate the fact that I don’t […]
From the onset, your staff was very helpful in identifying the issues with our network, making sound recommendations and presenting your solution. I particularly appreciate the time RJ PRO took working with our Tech Committee reviewing the specifications of the equipment and the time you personally spent reviewing various hosted services. Your demonstration of Office 365 […]
I have found in the business world that it is uncommon for a company to lay out a detailed plan of action to resolve a problem and be able to fully execute it, as stated. However, RJ PRO was able to meet our challenging deadlines and give everyone at our office the level of comfort and reassurance […]
I also wanted to commend the entire RJ PRO Team for the effort that they demonstrated during the day of the actual relocation; the RJ PRO team was truly dedicated to our needs. Even when we asked to keep the network operational longer than initially planned and restored at the new location ahead of schedule, they made […]