Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Microsoft Office Firewall Content Filtering Wireless Technology Android Cybercrime Smartphones Website Apple Best Practice Alert Employer-Employee Relationship Networking Two-factor Authentication Data storage History Data Windows Small Business Phishing Experience App Mobile Computing Big Data communications Safety Unified Threat Management Money Mobile Device Management Network Quick Tips Managed Service Provider Outlook Remote Computing Hosted Solution Shortcut Windows XP IT Services Documents DDoS Writing Artificial Intelligence Heating/Cooling Tech Support Word Compliance Drones Social Printer Business Management Browser Virtual Desktop Wireless Securty Retail Competition Unified Communications Presentation Document Management Entrepreneur Encryption Domains Law Enforcement SaaS VoIP Managed IT services Hacker Proactive IT Cortana Network Congestion Bluetooth Application Save Money Customer Service Music Automation Laptop Memory Cryptocurrency Router IBM Office 365 Google Docs Deep Learning Education Holiday BDR Cleaning Analytics Black Market YouTube Saving Money Processors Lithium-ion battery Office Tips Vendor Management LiFi intranet Staffing Downtime BYOD Passwords Streaming Media Help Desk Micrsooft Monitors Visible Light Communication Social Networking Disaster Public Speaking IP Address Business Growth Virtualization Data Management Robot Displays Advertising Recovery Government Sports Society Augmented Reality Google Wallet Keyboard Spam Search End of Support User Information Technology Running Cable Windows 8 Internet of Things Hard Drives
QR-Code