News

Keeping your data safe: Access Control

Keeping your data safe: Access Control Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold it hostage, but also inflict irreversible damage on your brand and business. As a norm, most businesses these days do […]

Read more

Ransomware part I

Ransomware part I The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. […]

Read more

Ransomware Part II

Ransomware Part II In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim. Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear […]

Read more

Denial is not a solution: Something you owe your customers and your employees

Denial is not a solution: Something you owe your customers and your employees Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen–at least in […]

Read more

Smaller firms less likely to keep up to date on the basics that protect them

Smaller firms less likely to keep up to date on the basics that protect them. On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure […]

Read more

Cyberattacks and the vulnerability of the small business

Cyberattacks and the vulnerability of the small business You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small […]

Read more

Limited investment capital and planning for trouble

Limited investment capital and planning for trouble Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to […]

Read more

Data Protection Laws and PIIs

Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be […]

Read more

Are you subject to Data Protection laws?

Are you subject to Data Protection laws? This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the securing of […]

Read more

Humans cause so much trouble

Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or […]

Read more

Reach out

Address:
Huntington Technology, Inc.
27718 Franklin Road
Southfield, MI 48034
Phone: (248) 357-7200
Fax: (248) 357-6601
Email: Huntington Technology

HT Career Opportunities

Join Our Mailing List

View previous campaigns.

Learn More

Looking for IT services we haven't listed?

We offer many custom IT support services and solutions for any sized business. If you're in need of a support team you can count on please email us or call us today at (248) 357-7200 to see what we can do for you!