LTech Solutions Blog

LTech Solutions has been serving the Hudson area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

Continue reading

Tip of the Week: How to Remotely Wipe Your iPhone or iPad Data

b2ap3_thumbnail_iphone_data_format_400.jpgThe new iPhone 6 was released several weeks ago, and it was greeted by many users eager to get their hands on the flexible new device. These users will likely sell their old devices in order to pay the hefty purchase fee. Little do they know, however, that their old devices should be wiped completely before being sold to another person, especially if the company they work for deals with sensitive information.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Productivity Google Hackers Cloud Workplace Tips Miscellaneous Mobile Devices Email Business Internet Efficiency Microsoft Backup Hosted Solutions Windows 10 Browser Malware Android User Tips Marketing Holiday Windows Save Money Innovation Small Business Business Computing Employer-Employee Relationship Office Upgrade Computer Smartphone VoIP Hardware Data Server Communication Mobile Computing Application WiFi Microsoft Office IT Services Hacking Social Media Remote Computing Automation Business Continuity Disaster Recovery Chrome Software Business Management Going Green Network IT Solutions Gmail Big Data IT Support Gadgets Bandwidth Lithium-ion battery Health Managed Service Provider Mobile Device Management Passwords Mouse Retail communications Environment Website History Saving Money Office Tips Budget Social Engineering Operating System Quick Tips Apple Telephone Systems Fax Server DDoS Biometrics Networking Entertainment App The Internet of Things Mobility Spam Recovery Smartphones Memory Virtualization Unified Threat Management Touchpad Encryption Save Time Ransomware Shadow IT SharePoint User Safety Notifications Social Excel Vendor Management Internet Exlporer eWaste Bluetooth Virus Network Security Social Networking Facebook Hacker Phone System Sports User Error WIndows 7 USB Best Practice Compliance Robot Science VPN Wearable Technology Virtual Reality Managing Stress Analytics Customer Relationship Management Worker Commute Settings Windows 8 YouTube Running Cable Bloatware Customer Service People Tablet Windows Media Player NarrowBand Entrepreneur Online Currency Mobile Office iPhone Tablets Computers Wireless Technology Two-factor Authentication Data Management Meetings Hard Drives PowerPoint Chromecast Distributed Denial of Service Twitter Consultant Maintenance Human Resources Uninterrupted Power Supply Office 365 Privacey Humor Best Available BYOD Bring Your Own Device Collaboration Programming Shortcut Avoiding Downtime Cleaning Risk Management Laptop Streaming Media Remote Monitoring Search Tech Support Wireless Analyitcs

Blog Archive