Archive Monthly Archives: February 2017

The Cheapest Most Effective Security Change for Your Network

Revoking the admin rights for all of your users could be one of the most secure changes your make to your computer network. It's common to allow all your users to use admin accounts, that way they can install any software and make any changes they need to without issue.

The problem is that 97% of critical vulnerabilities that were found last year specifically require admin rights to be effective. But the good news, is that when you revoke admin rights, that leaves 97% of the critical vulnerabilities from last year harmless.

Even if you give the admin password to everyone so that they have it when they need it. That would still be more secure then having everyone operate with admin rights. If you have any questions, feel free to reach out. That's what we're here for.

Continue reading

Microsoft Office 2007 End of Life

All Microsoft products must come to an end. Microsoft's term for that is called "End of Life". When a product reaches it's "Extended Support End Date". That means that Microsoft will no longer release security updates for that product and any new products that are released will not be supported to work with the older one.

So based on those two factors, it can be costly to continue to run software that is no longer supported by Microsoft.

Microsoft has announced that Microsoft Office 2007 will reach it's End of Life on October of 2017.
Visit Here
That means that Word, Excel, Powerpoint and Outlook 2007 will no longer be supported or receive security updates from Microsoft.

If you're a contract business customer with us you should be receiving an email from us soon to start making plans to migrate away from that software. If you do not have a contract with us you'll certainly want to make arrangements to update that software before October. Cheers!

Continue reading

The Most Vulnerable Software of 2016

There's a really helpful website called cvedetails.com. They categorize and keep track of all security vulnerabilities found in any software or operating system. I was browsing their website last week and saw that they announced their 50 most vulnerable software of 2016 list. If you want to browse it for yourself, you can view it here:


Unfortunately, I noticed that Adobe products held 4 of the top 10 positions on the list, which is more then a little alarming. Those products are Flash Player(#4), Acrobat Reader DC(#7), Acrobat DC(#8), Acrobat(#9), and an honorable mention goes to Reader at #12. Fortunately there are alternatives to Adobe. If you use any of these products, read on to learn how to move away from them.


The Acrobat and Reader products are all centered around viewing and editing PDF's. If you are using any of these products a good alternative is Foxit. They offer a free reader for simply viewing PDF's and an affordably priced PDF editor. You can find all of this on their website here:


Flash Player is used for some content on websites. But with the growing concern over security issues surrounding Flash Player, more and more websites have been moving away from it. If you'd like to rid your PC of Flash Player and see if you can go without it, you can follow the instructions in this very helpful article. Worse case scenario is that you realize an important website you visit requires it and you need to reinstall it. Best case scenario is that your web browsing is significantly safer(and faster).
Visit Here


Maybe you are an avid Adobe user and can't go without them. Then please be sure that you're using the most recent version and are installing updates. That goes for any software that you're running. At Triad Tech Guys your internet security is our top priority. Happy web surfing!


Continue reading