Meltdown and Spectre: What You Need to Know

By now, you’ve probably seen two names swirling around every industry news headline. These, of course, are Meltdown and Spectre; two critical vulnerabilities found in current CPUs from Intel, AMD and ARM. On Wednesday January 3, several researchers disclosed the security flaw in modern processors that could affect practically every Intel computer released in the last [...]

By | 2018-02-02T17:56:28+00:00 February 2nd, 2018|IT and Your Business|0 Comments

IRS Warns Against Email Tax Scams

The holidays are over and tax season is on the horizon. For many it's a season of paperwork and stress. For scammers, it's a season ripe with opportunity. The IRS is warning consumers to be on the lookout for email phishing scams related to next year's tax filing. Cyberthieves create emails with just enough [...]

By | 2018-01-05T18:51:44+00:00 January 5th, 2018|IT and Your Business, Ransomware|0 Comments

How MSPs Can Prevent Ransomware Attacks

By Chris Bruneau The growing ransomware threat presents an opportunity to protect business-crippling attacks while generating more profit. A proper ransomware protection strategy requires a three-pronged approach, including education, security, and backup. Check out a few key points below: Education: Education is essential to protect your business from ransomware. It's critical that your staff understands what [...]

By | 2017-12-20T18:14:49+00:00 December 18th, 2017|About MSPs, Ransomware|0 Comments

5 Ways to Secure Wifi Networks

By Eric Geier, Network World Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just [...]

By | 2017-11-27T16:12:17+00:00 November 27th, 2017|IT and Your Business|0 Comments

In Light of Recent Events

Some of you may have already heard about the tragedy that has befallen our owner's family. Rest assured, business at Hoola Tech is still going on as usual. Your systems are being monitored and our team is ready for any and all maintenance requests. Keep submitting tickets and someone from the Hoola team will [...]

By | 2017-10-25T19:58:55+00:00 October 25th, 2017|Ramblings of a CEO|0 Comments

What You Should Know about ‘Bad Rabbit’ Virus

The U.S. government has issued a warning about a new ransomware attack that spread through Russia and Ukraine and into other countries around the world. Cybersecurity experts said the ransomware -- which posed as an Adobe update before locking down computers and demanding money for people to get their files back -- targeted Russian [...]

By | 2017-10-25T20:04:10+00:00 October 25th, 2017|Ransomware|0 Comments

How Much Downtime Can You Tolerate?

Read the original article here. Network downtime comes in all shapes and sizes. Whether it’s from a catastrophic storm or fire, a data center outage, ransomware, DDoS attack, internet outage or even a careless mistake. No one is totally safe, and it isn’t a question of if, but instead when it will strike. The Ponemon [...]

By | 2017-09-18T16:06:03+00:00 September 18th, 2017|IT and Your Business|0 Comments

5 Benefits of Managed IT Services for Your Small Business

5 Benefits of Managed IT Services with Your Small Business If you run a small business, it can be difficult to focus on growing your business at the same time as keeping your cybersecurity up to date. But you don't want to sacrifice one for the other. A managed services provider like Hoola [...]

By | 2017-08-02T17:18:35+00:00 August 2nd, 2017|About MSPs, IT and Your Business|0 Comments

Understanding Managed Services, Part 2

As we talked about in our last article, managed services are a new way for a business to tackle its technology problems. Instead of following the old-school tradition of break-fix (literally meaning wait until the server, desktops or other critical networking devices fail, then scramble to fix them), a business operating with a managed service [...]

By | 2017-08-03T00:23:46+00:00 July 1st, 2017|Ramblings of a CEO|0 Comments

Fresh IT Strategies Like the Human Firewall Are Crucial for Countering Cybersecurity Threats

Fresh IT Strategies Like the Human Firewall Are Crucial for Countering Cybersecurity Threats By CMIT Solutions Recently, IT security experts revealed a sharp increase in so-called “fileless” malware — device and network infections that are not readily apparent since they’re embedded directly into a computer’s actual memory. These malicious agents can quietly infiltrate data [...]

By | 2017-06-13T16:03:34+00:00 June 13th, 2017|IT and Your Business, Ransomware|0 Comments