Citara Systems Blog

Martin brings over 18 years’ experience as a financial analyst, accountant, and technology consultant for companies like Gillette, Teradyne, and News Internet Services. During that time, he was involved in some of the first web hosting ventures, serving clients like Major League Baseball and Fox Network. He was also part of the team that setup Europe’s first ISP for News International/British Telecom.

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

IBM Concludes Data Breaches Aren’t Getting Any Cheaper

Working in conjunction with the Ponemon Institute, IBM Security completed a report tracking trends in 2018’s data breaches. As you might imagine, much of the data contained in this report could be seen as troubling to a business.

0 Comments
Continue reading

Intro to Your Tech: Dark Web

Intro to Your Tech: Dark Web

The dark web has a bad reputation - and for quite a few good reasons. However, like any tool, there is a lot of good that the dark web can be used for as well. Here, we’ll review what the dark web is, how it can be used (and abused), and what the landscape is like.

0 Comments
Continue reading

Six Critical Small Business Mistakes to Avoid

Six Critical Small Business Mistakes to Avoid

There are many obstacles that any business owner needs to avoid in order to keep themselves from backsliding like Sisyphus did in Greek myth. Some of these obstacles may not be the first that come to mind, either. Here, we’ll review six mistakes that a business owner can make that can prevent them from reaching their goals. 

0 Comments
Continue reading

Tip of the Week: Two Taskbar Tips

Tip of the Week: Two Taskbar Tips

Microsoft Windows is run on a majority of business computers. As a result, having a good understanding of some of the features that will make using the software easier is beneficial. This week, we will go over some things you can do with the taskbar that will make navigating your computer easier. 

0 Comments
Continue reading

Tip of the Week: Simple Windows 10 Tips to Leverage

Tip of the Week: Simple Windows 10 Tips to Leverage

Windows 10 is the culmination of all the prior versions of the operating system, which means it offers all the great options that earlier versions did with contemporary improvements to make these options even better. To leverage the full potential of Windows 10, we recommend following these five simple tips.

0 Comments
Continue reading

You Need More than a Firewall to Secure Your Business

You Need More than a Firewall to Secure Your Business

Whether or not you’re familiar with computers, there are a few terms that are thrown around commonly enough that chances are good that you know them. One such term is “firewall.” Unfortunately, there are often misconceptions as to what these terms refer to or what they do. Firewalls are a prime example, as many believe that a firewall is the only security they need.

0 Comments
Continue reading

Downtime Adds Up to a Big Deal, Really Quickly

Downtime Adds Up to a Big Deal, Really Quickly

There are a lot of words that a business owner doesn’t like to hear. One of the worst? Downtime. While this word may seem essentially harmless at first glance, it signifies a much larger range of issues. Here, we’ll examine how to calculate the impact of a downtime event.

0 Comments
Continue reading

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

0 Comments
Continue reading

Tip of the Week: How to Wind Down with Night Mode

Tip of the Week: How to Wind Down with Night Mode

Productivity is a huge priority in today’s business world, and with today’s technology, it can be achieved at just about any time. However, with the way our brains are wired, staring at our screens late at night isn’t great for our capacity to sleep. However, there are a few settings that you can change to reduce these impacts. Here, we’ll give a few tips to help you do so.

0 Comments
Continue reading

A Guide to Help You Understand All the Digital Threats You Face

A Guide to Help You Understand All the Digital Threats You Face

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

0 Comments
Continue reading

With Deepfakes, Seeing Shouldn’t Be Believing

With Deepfakes, Seeing Shouldn’t Be Believing

Machine learning and artificial intelligence have enabled us to accomplish great things with the computers we have access to today. However, it is equally true that these same innovations have also produced a great number of threats. One threat that is particularly dangerous in today’s day and age is the presence, and growing prevalence, of “deepfakes” in the media.

0 Comments
Continue reading

All You Need to Know Before Buying a Computer, Part V

All You Need to Know Before Buying a Computer, Part V

In the previous parts of this computer buying guide, we discussed how to determine the specifications for your desired PC, including CPU, RAM, storage, and display options. In this final part, we’ll cover some ideas that didn’t quite fit into the previous parts.

0 Comments
Continue reading

All You Need to Know Before Buying a Computer, Part IV

All You Need to Know Before Buying a Computer, Part IV

Your desktop needs a monitor or a screen to plug into it, so let’s discuss some of the options and considerations you should keep in mind when purchasing a new display. Chief among these are how many monitors you’ll need, the graphics type, and the specs associated with each of the monitors.

0 Comments
Continue reading

All You Need to Know Before Buying a Computer, Part III

All You Need to Know Before Buying a Computer, Part III

We’ve reached part three of our guide to buying a new computer. As you’re comparison shopping, you’ll probably notice that there are a few options regarding their storage. This is true of most modern gadgets, like smartphones and tablets. iPhones can come with 64 GB (gigabytes) of storage, or you can invest in a model with 128 GB. However, when selecting a computer (desktop or laptop), its memory is especially important to its performance.

0 Comments
Continue reading

All You Need to Know About Buying a Computer, Part II

All You Need to Know About Buying a Computer, Part II

Part two of our desktop buying guide is dedicated to RAM, or random access memory. Many users find this difficult to understand, so we’ll do our best to explain it and emphasize how important it is to ensure you get the best build possible for your new computer.

0 Comments
Continue reading

All You Need to Know Before Buying a Computer, Part I

All You Need to Know Before Buying a Computer, Part I

If you are looking to purchase a new desktop for your office or your home, you need to ask yourself several difficult questions to get the most bang for your buck. This is a five-part blog that will help you determine the right computer for the job. In this article, you’ll learn how to select the right CPU, or central processing unit.

0 Comments
Continue reading

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

Make Sure You Are Using Supported Software

Make Sure You Are Using Supported Software

Any organization that is running unpatched versions of older Windows operating systems is playing with fire… period. Therefore, it’s your prerogative to make sure you’re adequately protecting your business’ data, and one of the most important ways you can do this is by ensuring your infrastructure is properly maintained.

0 Comments
Continue reading

Tip of the Week: Simplify Your Day at Work

Tip of the Week: Simplify Your Day at Work

Work isn’t always great, and it can be stressful to boot. Distractions certainly don’t help, as they can complicate your schedule and get in the way of responsibilities. With the right strategies on your side, you could potentially eliminate some of this stress. Here are some of the ways you can do so.

0 Comments
Continue reading

Is it Wrong to Purchase Access to Your Own Data?

Is it Wrong to Purchase Access to Your Own Data?

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

0 Comments
Continue reading