Blogs

Identity theft scenarios to help you avoid becoming a victim of stolen identity

Although you cannot completely prevent identity theft – for example, your personal information is compromised in a data breach – there are many ways you can greatly reduce your risk of becoming a victim. To avoid the time and money required to provide reports and affidavits proving the theft and which accounts have been compromised and then working to recover your identity, here are 10 typical identity theft scenarios to help you protect yourself from identity theft.

Sextortion – Don’t be a victim!

Sextortion is a sensitive subject AND now is one of the top three online scams that people need to be aware of. Trust me it happens! I have assisted three clients with this over the last year. Cybercriminals use sextortion mostly to exploit victims to extort money, or blackmail.

Celebrating 25 years in business

OrLANtech is celebrating its 25th anniversary this year. Keith Coker and Chriss Rhode, the partners, are looking back at humble beginnings and the many milestones in the company’s history, where they are today and what’s ahead – always with the focus on their clients and staff.

What you should know about the internet, deep web and dark web

As you read on, you will learn that while searching the “internet” using popular search engines, such as Google, Bing, Yahoo, etc., you are gaining access to accessible, indexed links. These indexed links are used to rank search engine results based on relevancy, inbound links and keywords. Online, it is important to remember there is the internet, deep web and then the dark web and there is a difference in all of them

Typical IT support requests

Help is on the way! We collected an assortment of typical IT requests that may help you to solve or maneuver technical issues. Some of these could apply to you, or simply enlighten you. There is a combination of solutions to commonly asked questions, tips, tricks, shortcuts, etc.