Blog & News
Stay up-to-date with the latests trends, news, and top secret tech talk. We are always geeking out and we love to share. Check out some of the latest articles, blogs and news below.
New Exploit in the wake of Capital One Hack
Attackers are now exploiting news of the recent CapitalOne breach to push a malicious backdoor trojan via a phishing email purporting to offer a Windows Security Update…
Video Interview with Reid Clark SVP of Technology
Reid Clark also sat down with the folks from LogMeIn for an interview on LeafTech, and how we use their product. Check out the video and hear what Reid has to say about LeafTech…
Capital One Customer and Applicant Data Hacked
Details about one of the largest data breaches in history were released yesterday creating concern for Capital One Customers and Applicants. On July 19th a portion of Capital One’s data…
Video Interview with Chris McAree CEO
Chris McAree recently sat down with folks from LogMeIn who wanted to do a piece on LeafTech, and how we use their product. Check out the video and hear what Chris has to say about LeafTech…
Technology’s Influence on Humanity – Part 2 – Rise of the Cyborgs
Within the last century, humanity has begun using technology to maintain and enhance our own biology. The first pacemakers – electronic devices…
How does the internet work anyway?
In IT, we love our acronyms. Ready for another one? “DNS”. DNS stands for Domain Name System. Three pretty boring words to string together, but what DNS does is quite exciting…
Technology’s Influence on Humanity – Part 1
Humanity is the planet’s dominant species by virtue of tool use. Even primitive technologies allowed our ancestors to adapt the environment to their needs rather than adapting to the environment…
Recognizing Phishing Emails – Phishing Part 3
Almost all phishing emails begin with a call to action. This should be our first red flag that a message is suspicious. Whenever an email asks you to react immediately (usually to avoid some consequence…
Interview with Scott Eastman
I was able to sit down and chat with one of our longest standing vendors: I’m a native of Northern Colorado. I started my telecommunications career selling cell phones when they were still 3 watt bag phones and HUGE hand held phones…
Caller ID is just a number, baby.
Our telephony expert’s explanation of what Caller ID really is. “One of the most complex conceptual differences that I am called upon to explain is Caller ID vs. Caller ID Name. Caller ID is, as in the title, just a number. Caller ID is rarely wrong…”
Common Phishing Emails – Phishing Part 2
Most phishing emails fall into three broad categories: CEO Fraud, Account Notification Fraud, and Blackmail. Any email that falls into these categories should be read with a critical eye…
Two Factor Authentication – Tech in Brief
Passwords are simply not enough in today’s world. Most companies now offer a second form of verification beyond the password to authenticate your login, commonly referred to as Two-Step…
A Brief History of Phishing – Phishing Part 1
Phishing is part of a spectrum of security threats referred to as social engineering. In a social engineering attack, the intruder targets us as technology users, rather than the technology itself…
New LeafTech Consulting Website Launched
When someone embarks on a deep dive into LeafTech Consulting and stumbles across this humble blog devoted to our website creation journey, I hope to impart all the excitement…
Interview with Chris McAree – Elkhart, IN Office Relocation
Hello out there LeafTech Friends and Colleagues! On occasion, one of our employees, as well as, our Partners and Senior staff disappear from LeafTech Headquarters on any given…