Blog & News

Stay up-to-date with the latests trends, news, and top secret tech talk. We are always geeking out and we love to share. Check out some of the latest articles, blogs and news below.

Introducing LeafTech’s CSR, Danielle

Introducing LeafTech’s CSR, Danielle

Imagine this: It’s Friday afternoon, right before a long holiday weekend, you have a million and one things left to finish in your day, but all of a sudden your email stops working or maybe your internet went down…

LeafTech’s First (and Best) Intern

LeafTech’s First (and Best) Intern

Stigmas attached to internships usually involve coffee runs and mindless data entry. My experience this summer was anything but mindless. My name is Sheldon Ray, and I was the first-ever LeafTech intern…

New Exploit in the wake of Capital One Hack

New Exploit in the wake of Capital One Hack

Attackers are now exploiting news of the recent CapitalOne breach to push a malicious backdoor trojan via a phishing email purporting to offer a Windows Security Update…

Capital One Customer and Applicant Data Hacked

Capital One Customer and Applicant Data Hacked

Details about one of the largest data breaches in history were released yesterday creating concern for Capital One Customers and Applicants. On July 19th a portion of Capital One’s data…

Video Interview with Chris McAree CEO

Video Interview with Chris McAree CEO

Chris McAree recently sat down with folks from LogMeIn who wanted to do a piece on LeafTech, and how we use their product. Check out the video and hear what Chris has to say about LeafTech…

How does the internet work anyway?

How does the internet work anyway?

In IT, we love our acronyms.  Ready for another one? “DNS”. DNS stands for Domain Name System. Three pretty boring words to string together, but what DNS does is quite exciting…

Technology’s Influence on Humanity – Part 1

Technology’s Influence on Humanity – Part 1

Humanity is the planet’s dominant species by virtue of tool use. Even primitive technologies allowed our ancestors to adapt the environment to their needs rather than adapting to the environment…

Recognizing Phishing Emails – Phishing Part 3

Recognizing Phishing Emails – Phishing Part 3

Almost all phishing emails begin with a call to action. This should be our first red flag that a message is suspicious. Whenever an email asks you to react immediately (usually to avoid some consequence…

Interview with Scott Eastman

Interview with Scott Eastman

I was able to sit down and chat with one of our longest standing vendors: I’m a native of Northern Colorado.  I started my telecommunications career selling cell phones when they were still 3 watt bag phones and HUGE hand held phones…

Caller ID is just a number, baby.

Caller ID is just a number, baby.

Our telephony expert’s explanation of what Caller ID really is. “One of the most complex conceptual differences that I am called upon to explain is Caller ID vs. Caller ID Name. Caller ID is, as in the title, just a number. Caller ID is rarely wrong…”

Common Phishing Emails – Phishing Part 2

Common Phishing Emails – Phishing Part 2

Most phishing emails fall into three broad categories: CEO Fraud, Account Notification Fraud, and Blackmail. Any email that falls into these categories should be read with a critical eye…

Two Factor Authentication – Tech in Brief

Two Factor Authentication – Tech in Brief

Passwords are simply not enough in today’s world.  Most companies now offer a second form of verification beyond the password to authenticate your login, commonly referred to as Two-Step…