Capital One Customer and Applicant Data Hacked
Details about one of the largest data breaches in history were released yesterday creating concern for Capital One Customers and Applicants. On July 19th a portion of Capital One’s data…
Details about one of the largest data breaches in history were released yesterday creating concern for Capital One Customers and Applicants. On July 19th a portion of Capital One’s data…
Chris McAree recently sat down with folks from LogMeIn who wanted to do a piece on LeafTech, and how we use their product. Check out the video and hear what Chris has to say about LeafTech…
Within the last century, humanity has begun using technology to maintain and enhance our own biology. The first pacemakers – electronic devices…
In IT, we love our acronyms. Ready for another one? “DNS”. DNS stands for Domain Name System. Three pretty boring words to string together, but what DNS does is quite exciting…
Humanity is the planet’s dominant species by virtue of tool use. Even primitive technologies allowed our ancestors to adapt the environment to their needs rather than adapting to the environment…
Almost all phishing emails begin with a call to action. This should be our first red flag that a message is suspicious. Whenever an email asks you to react immediately (usually to avoid some consequence…
I was able to sit down and chat with one of our longest standing vendors: I’m a native of Northern Colorado. I started my telecommunications career selling cell phones when they were still 3 watt bag phones and HUGE hand held phones…
Our telephony expert’s explanation of what Caller ID really is. “One of the most complex conceptual differences that I am called upon to explain is Caller ID vs. Caller ID Name. Caller ID is, as in the title, just a number. Caller ID is rarely wrong…”
Most phishing emails fall into three broad categories: CEO Fraud, Account Notification Fraud, and Blackmail. Any email that falls into these categories should be read with a critical eye…
Passwords are simply not enough in today’s world. Most companies now offer a second form of verification beyond the password to authenticate your login, commonly referred to as Two-Step…
Phishing is part of a spectrum of security threats referred to as social engineering. In a social engineering attack, the intruder targets us as technology users, rather than the technology itself…
When someone embarks on a deep dive into LeafTech Consulting and stumbles across this humble blog devoted to our website creation journey, I hope to impart all the excitement…
Hello out there LeafTech Friends and Colleagues! On occasion, one of our employees, as well as, our Partners and Senior staff disappear from LeafTech Headquarters on any given…
When it comes time to entertain our clients, LeafTech likes to give its clients the axe. Literally! LeafTech recently co-hosted an axe chucking event at The Axe Room in Downtown Denver…
For LeafTech’s new website and blog launch, we decided to talk about something that the Peanuts’ gang know all too well not to discuss: “Religion, Politics and…
Showcasing its continued strength and leadership in enterprise-capacity storage solutions, Western Digital (NASDAQ: WDC) announced the industry’s highest capacity HDD…
Just because small businesses tend to have small IT staffs doesn’t mean they can’t use technology to stay productive, get the most out of the resources they have, and even gain a competitive edge…
The core principle behind managed IT services is for you to spend your energy elsewhere – driving your business forward, fostering and nurturing relationships with your clients…