Cyber Security

    Learning From The Ashley Madison Data Breach

    Written by: Miles Technologies

    It seems that barely a month goes by these days without stories in the media of another high-profile data leak. Data breaches in past years at Target, Sony, and Home Depot have been joined by the recent leak involving online dating service, Ashley Madison. With these breaches seemingly becoming more and more common, is there […]

    READ MORE >>


    Why Your Business Must Not Ignore Cyber Security

    Written by: Miles Technologies

    Protecting your business from a major incident is crucial for companies of all sizes. When you think of the term “cyber security,” what is the first thing that comes to mind? Hi-tech firewalls or data encryptions? Protecting your network from intruders? While those are certainly important elements of cyber security, there is a whole lot […]

    READ MORE >>


    Lessons in Business Email Policy from Hillary Clinton

    Written by: Miles Technologies

    The recent revelation that Hillary Clinton did not use an official government email address during her four years as Secretary of State teaches us important lessons about having a sound business email policy. The intersection of business email policy and information security was brought to the forefront recently, when during a House Committee investigation into […]

    READ MORE >>


    Superfish Lenovo Security Issue Raises Concerns about Trust

    Written by: Miles Technologies

    What Does this Mean For Your Company’s Information Security? You may have read or heard about the recent Superfish Lenovo security fiasco (for lack of a better word) that has most recently resulted in Lenovo and Superfish being hit with class-action lawsuits charging them with “fraudulent business practices” as well as Lenovo’s website being breached […]

    READ MORE >>


    Top 7 Areas CIOs Should Focus on in 2015

    Written by: Miles Technologies

    Chief Information Officers (CIOs) play a vital role not only in a company’s technology operations, but also in its growth and overall success. A business’s information technology should stimulate its growth, and the CIO is the chief person responsible for making that happen. One of the most important parts of a CIO’s role is understanding […]

    READ MORE >>


    Cryptowall 2

    Written by: Miles Technologies

    The latest wave of Cryptowall 2.0, a variant of malicious software known as ransomware, is making the rounds recently. Unfortunately for users, it comes packed with even more advanced methods to increase its ability to affect computers.   For a brief bit of background, malware like Cryptowall 2.0 will typically enter a user’s machine from […]

    READ MORE >>


    Why Web API is Not Just for MVC

    Written by: Miles Technologies

    In this post, Eric Butler, Senior Software Developer at Miles Technologies, discusses the value of utilizing Web API in Web Forms Application.  It’s true that when most people speak of Web Application Programming Interface (API), they are referring to its use within an Model–view–controller (MVC) web application. While Web API naturally fits within the MVC world, […]

    READ MORE >>


    Five Tips to Ensure Data Security

    Written by: Miles Technologies

    With current news surrounding the Sony Pictures cyber-attack as well as recent memories of other 2014 vulnerabilities like CryptoWall and the POODLE/BEAST exploits, businesses are placing information security at a premium as the calendar turns to 2015. When exploring options for new IT solutions, businesses will be looking for solutions that not only perform well […]

    READ MORE >>


    What Microsoft’s Latest Critical Bulletins Mean for Your Business

    Written by: Miles Technologies

    In its largest Patch Tuesday to date this year, Microsoft released 16 total security bulletins, five of which were deemed “critical” while nine others were labeled “important.”   Patch Tuesday is a monthly occurrence where Microsoft releases any necessary patches for their various products. Many of them are Windows updates designed to keep Microsoft’s operating systems […]

    READ MORE >>


    2014 Vulnerabilities: CryptoWall, SHA1 Deprecation and POODLE/BEAST Exploits

    Written by: Miles Technologies

    Over the course of 2014 and particularly the last few months, we have seen a level of high-profile exploits and vulnerabilities that has never really been in the public eye before.  Exploits have existed for as long as computer security has been a concern, but at this time this information is much more available to […]

    READ MORE >>


“Everyone I've met at Miles Technologies has been super nice and super helpful. They are always there for me.”

— Marc Lewis, IT Manager
Origlio Beverage
Customer Since 2006

Do great things.

Get Started