The Armor Techs Blog

Posts Tagged IT

The Value of Brand Monitoring

What you need to know about the importance of brand monitoring is that local search results apply to so many types of businesses: restaurants, plumbers, roofers, towing companies—the list goes on, and every single business is going to...
Tuesday January 28th, 2020

Armor's Guide to Home Automation: 6 security measures you need to know about IoT

For the past five years, we have become surrounded by hundreds of different internet-connected devices: from smart door locks, smart switches, and smart light bulbs, to smart speakers, smart security cameras, smart thermostats, and smart sm...
Monday January 27th, 2020

Search Visibility: How to Improve Your Google Ranking

What Is Search Visibility? Search visibility is a metric that tells you what percentage of all possible organic clicks a website is getting for a given keyword. Search visibility is a great metric to help you figure out if you've been h...
Friday November 8th, 2019

Technical Debt, and how it should influence your business choices

Software is a highly competitive field. This is great because it gives users a large number of options to choose from when they need something, but the downside is that it makes it complex to choose the right tool for the job. When a busine...
Thursday May 16th, 2019

Protecting Yourself from Ransomware

As more and more of our lives are online, the chance of encountering a cyberattack increases. One of the most popular versions of cyberattacks today is through ransomware. But what exactly is ransomware, how can we protect ourselves and our...
Thursday May 9th, 2019

May 2019 Security Newsletter

Welcome to a new month, same problems. Last month, it became public knowledge that the city of Chicago had paid over $1,000,000 to a currently unnamed person or persons. How? The city was tricked by a phishing email that asked them to chang...
Thursday May 2nd, 2019

Change in Email Service: Users can no longer send themselves emails

There has been a particularly common scam/exploitation email going around recently. In the email, the scammer claims to have control over your email account, have evidence of some of your behavior that you wouldn't want getting out to y...
Tuesday April 23rd, 2019

How We Approach Website Optimization

This blog post is more of an explanation for our clients, and anyone interested in what we mean when we say we are optimizing a website, than one of our more traditional posts. This post is about how we achieve some of what we do, but more ...
Friday April 12th, 2019

April Security Newsletter

I don't know if you've been watching the tech news space recently, but if you have, you've probably at least seen mention of the fact that Facebook apparently stored some user's passwords in plaintext. Plaintext, of course, ...
Thursday April 4th, 2019

The Most Common Computer Problems

We all have problems with electronics, especially with our computers. It is extremely frustrating when the devices we rely on do not work. It's okay . . . there are places to go to get them fixed or to buy a used or new o...
Monday March 11th, 2019

March Security Newsletter

Oh man, Wordpress 5 is a thing now, and has been for a while now (since December 6th, for those keeping count at home), but have you updated to it? The tone of a lot of these security updates might make you think I'm joking, but I'm...
Thursday March 7th, 2019

Visual Composition: the Importance of Framing

Composition is one of the most important aspects of visual art, and it is one of the easiest for beginners to overlook. Have you ever seen someone doing that thing where they frame a shot using their hands? It may look silly, but what they&...
Monday March 4th, 2019

Modding Minecraft Part 1: An overview

Minecraft, while it was formally released in 2012, has been in active development for ten years: from its original inception as a single programmer's attempt to mimic and expand on the gameplay of the older and less successful Infinimin...
Thursday February 28th, 2019

Security Myths You Need To Stop Believing

Security Myths You Need To Stop Believing This guest post was witten by Jack Foster To read more of his work, head over to VPN Geeks. The Internet is a fantastic resource for information, where anyone can upload his or her knowledge to the ...
Monday February 18th, 2019

Logitech G710+ Keyboard: An Armor Review

Logitech G710+ Keyboard: An Armor Review ___ $124.79 (Amazon) INTRODUCTION Recently, half of our office upgraded our set of keyboards to the new Logitech G710+ series and my goodness, has it led to some interesting conversations. Let’...
Thursday February 14th, 2019

Feburary Security Newsletter

It's 2019, and if we could sum up technology news from the last year, it would probably sound a little like this: Big Data is invasive, everywhere, poorly protected, and often used without ethical consideration. Accepting all of that is...
Thursday February 7th, 2019

Jan 2019 Security Newsletter: Two Hackers Walk Into A Website . . .

Two hackers walk into a website . . . This isn't just the start of a joke, it's a very real occurence, and what happens next can depend on a number of factors. Types of Hackers First, you have your white-hat hackers. These are secur...
Thursday January 3rd, 2019

Convincing Spam Emails Contain Macro Malware

Email has long been the preferred method of communication for businesses and individuals across the internet. Unfortunately, with the popularity of this medium and the fact that it can be relatively insecure, email has also been a preferred...
Thursday December 27th, 2018

What is an Armor Tech?

What is an Armor Tech? An Armor Tech is a member of a group of technicians, developers, innovators, data entry and internet technology administrators who are always training and keeping abreast of current technology. An Armor Tech is moving...
Thursday December 6th, 2018

December 2018 Security Newsletter

Happy Holidays everyone. Did you know that the United States Post Office left an unpatched security vulnerability in an API that let users scrape information about any one of the millions of people in their database, and more terrifyingly, ...
Tuesday December 4th, 2018

Microsoft Remote Desktop vs. TeamViewer vs. LogMeIn: Which Is the Right Remote Software for You?

Being able to remote into a computer that you are away from can be a very handy thing sometimes—e.g., you're sick and have to stay home from work, but you have crucial work that needs to be done in order to make a deadline. Or may...
Tuesday November 20th, 2018

FAQ: What You Need to Know About Armor Techs' Services

Armor Techs has been in business for over 15 years, and each year we come across some of the same hurdles when communicating with our current and potential clients. In order to facilitate this, and to hopefully remove a lot of the confusion...
Tuesday November 13th, 2018

The Economics of Security: It pays to plan ahead

What a month October 2018 was: Facebook had another breach; Google was caught not disclosing their own, and in reaction shuts down the consumer service for Google+ (and it's 2 users). And hey, turns out there's a scandal brewing abo...
Tuesday November 6th, 2018

The Top 3 Free Antivirus Programs

Introduction Everyone using a PC nowadays knows how important it is to have some sort of antivirus installed. The question usually comes up, but which one should I install? Should I pay for antivirus software? Do I need to install more than...
Thursday October 18th, 2018

Mirror, Mirror On The Moon

History It all started on July 20, 1969, when Apollo 11 landed. Astronauts Neil Armstrong, Michael Collins, and Buzz Aldrin left a mirror on the Moon’s surface 49 years ago. This mirror was placed so that astronomers could fire lasers...
Tuesday September 18th, 2018

September Security Newsletter

Happy September everyone. The internet is still a vast hellscape of people who want to steal from you. So, business as usual. This month's topic is email, and all the ways it can be used to steal from you or damage you or your company&#...
Friday September 14th, 2018

Additional Security: The Importance of Two-Factor Authentication

The (Sad) State of Internet Security The Armor Techs' blog is full of posts discussing security and passwords, and this post is going to be in much of the same vein. The security of your data on the web is becoming (read: has always bee...
Tuesday September 11th, 2018

Why Not Build It Yourself?

Our owner was working with a client recently trying to collect on an invoice that had stretched too far, when the client responded with a rather interesting justifcation: "Well, I just don't understand what I pay you for? I was tal...
Tuesday August 7th, 2018

August 2018 Security Newsletter

A Quick Change Of Format We've been watching the statistics on these security blog posts, and they are among our least read content, so we're going to mess with the content a little. Instead of taking more of a marketing/newsletter ...
Friday August 3rd, 2018

At The End of the Phishing Pole.

A basic diagram of what Phishing boils down to. What is it? Phishing (pronounced "fishing") is the process of "fishing" for more information about a person, often by posing as a source they would have no qualms about giv...
Friday July 27th, 2018

Real Life in a Virtual World

Real Life in a Virtual World "LOOK OUT!" This phrase has preceded countless catastrophes. It is one of the last things you want to hear when on the worksite. "How can we prepare for this?," a question all doctors ask the...
Wednesday July 18th, 2018

TROJANS & MALWARE & RANSOMWARE, OH MY! - The Necessity of an Antivirus

INTRODUCTION Every week, someone brings a device into Armor because of malware. Every day, the AV-TEST Institute registers over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA). These are examined using t...
Tuesday July 17th, 2018

THE PROBLEM WITH PASSWORDS: Looking at Future Solutions

INTRODUCTION The problems with a password are obvious: the login system was first designed for time-sharing computers in the 1960s, working on mainframes that took up an entire lab. To use the computer, you tapped in your login name and pas...
Thursday July 12th, 2018

GDPR and You: What You Need to Know about Europe's New Privacy Laws

Introduction to GDPR If you're even a semi-regular internet user, you've probably seen this in the last month: you log into your favorite service, like Facebook or Twitter, and see a huge notification, "We have updated our priv...
Tuesday July 10th, 2018

Night Of The Living Pop-Up

Picture it: you're on Facebook doing the usual—checking on family, clicking links to interesting articles that might come up in your feed, or even playing those (sometimes ridiculous) Facebook games. Out of nowhere, a window appea...
Thursday June 7th, 2018

Make Your Own VR

There are two things you need to accept before we go forward: Virtual Reality is awesome. It is an experience that is still awkwardly growing into its own, but when it is done with care for both the experience and the user, there is nothing...
Monday May 14th, 2018

May 2018 Security Newsletter

General Security News In the good news column for April, Dutch Police raided and took down the online DDoS marketplace Webstresser, which sold DDoS attacks for relatively low prices. Additionally for the first time ever, Microsoft developed...
Friday May 4th, 2018

Tech-xercise: Keep Your Kids Moving

Techxersice, Keep your kid moving. Too often, I see my kids playing video games. Then their behavior gets a little out of control, so then we end up implementing a TECH STRIKE! No video games, no television, no tablet; just blocks, art,&nbs...
Tuesday April 10th, 2018

April 2018 Security Newsletter

Chicago-based Orbitz was in the news this month for a data breach. The consensus seems to be that the breach took place sometime between October 2016 and December 2017. If you're wondering how a company that builds itself on successfull...
Wednesday April 4th, 2018

Forest Cities: One Man Brings Kashyyyk to Life

Or, One Man's Solution to Battle the World's Pollution Problem ___     INTRODUCTION   In the wake of President Trump's decision to remove America from the Paris Climate agreement, you'd be forgiven for feeling...
Friday March 9th, 2018

March 2018 Security Newsletter

Let's be upfront: it's 2018, and if you've been paying even partial attention to the news, you know that the trend for technology stories is [Company] Data [Breach/Leak] day after day. According to self-reported data, compa...
Friday March 2nd, 2018

Logitech G430: It's Blue

If you’ve ever come into our office, it would be pretty easy to see how much we favor Logitech products here at Armor. We’ve got Logitech keyboards at all the development stations, as well as Logitech track balls and Logitech wi...
Monday February 26th, 2018

The Virtual Tunnel You Never Knew You Needed: A Brief Guide to VPNs

A virtual private network (VPN) is a technology that creates a network-encrypted tunnel into your firewall, maintaining a level of security that is often important for businesses. This basically simulates an internal network connection thro...
Thursday February 1st, 2018

Logitech MX ERGO: An Armor Review

Logitech MX ERGO Advanced Wireless Trackball: An Armor Review Price: $95 (Amazon) $85 (Newegg) Features: Wireless Functionality Battery life of up to 4 months (1 minute of charge can give up to 1 day of full use) Adjustable hinge, allowing ...
Monday January 22nd, 2018

Social Media Marketing Tips: I Post, What, When, and How?

Running your business’s social media accounts can be a daunting task. This is especially true when you realize the time and dedication it requires. Sure, it’s easy to run a personal account and post random thoughts you have thro...
Thursday January 18th, 2018

Social Media Sematics: Targeting on Facebook

    Many businesses are struggling to keep up with present-day marketing trends, especially when it comes to methods of capturing your ideal audience on Facebook. Facebook is a blessing for small businesses, as it’s ano...
Thursday December 28th, 2017

A Short Guide To Password Security

All of the online security in the world can be useless if it depends on a weak password. Statistically speaking 95% of users use an insecure or repeated password that puts them at much greater risk for breach of data. In 2015 2 in 5 people ...
Friday December 15th, 2017

The Logitech G710 Keyboard - An Armor Review

Logitech G710 Mechanical Keyboard: An Armor Review Price: $120 (Newegg) $90 (Amazon) Features: Cherry MX Blue, high-speed mechanical keys Adjustable dual-zone backlighting Six programmable G-Keys, 3 Macro settings 26-Key rollover, 110 anti-...
Tuesday November 7th, 2017

Clear Text Login Discontinued

On Monday October 2nd at 6:00pm we will be changing the password transmission policies of our server. Up until this point we have permitted cleartext logins and logins with older encryption protocols, while adding support and recommending n...
Wednesday November 1st, 2017