Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Hardware Network Security Ransomware Facebook Operating System The Internet of Things Social Media Microsoft Office Office Backup Bandwidth Apps Business Continuity Disaster Recovery Communication Hacking WiFi Small Business Managed Service Provider Outlook Phishing App Mobile Computing communications Wireless Technology Big Data Safety Android Unified Threat Management Apple Quick Tips Best Practice Alert Firewall Networking Data storage Content Filtering Cybercrime Windows Data Experience Website Mobile Device Management Employer-Employee Relationship Money Network Smartphones Two-factor Authentication History Society Sports Router Spam Retail Google Wallet Office 365 Information Technology Running Cable Windows 8 Internet of Things Hosted Solution Windows XP Saving Money IT Services Managed IT services Analytics Lithium-ion battery Artificial Intelligence intranet Documents Compliance Tech Support Drones Bluetooth Social Social Networking Browser Automation Public Speaking Printer Virtualization Virtual Desktop Wireless Memory IP Address Unified Communications Securty Encryption Deep Learning Document Management Government Law Enforcement Keyboard SaaS VoIP BDR Augmented Reality Search User Cortana Vendor Management Hard Drives Proactive IT Network Congestion Shortcut Remote Computing DDoS Save Money Monitors Heating/Cooling Music Word Cryptocurrency Laptop IBM Displays Business Management Google Docs Education Competition Cleaning Holiday YouTube Processors End of Support Presentation Black Market Entrepreneur Domains Office Tips LiFi Staffing BYOD Downtime Streaming Media Help Desk Writing Hacker Passwords Micrsooft Visible Light Communication Disaster Application Data Management Customer Service Business Growth Robot Advertising Recovery
QR-Code