Blog & News

Stay up-to-date with the latests trends, news, and top secret tech talk. We are always geeking out and we love to share. Check out some of the latest articles, blogs and news below.

New Exploit in the wake of Capital One Hack

New Exploit in the wake of Capital One Hack

Attackers are now exploiting news of the recent CapitalOne breach to push a malicious backdoor trojan via a phishing email purporting to offer a Windows Security Update…

Capital One Customer and Applicant Data Hacked

Capital One Customer and Applicant Data Hacked

Details about one of the largest data breaches in history were released yesterday creating concern for Capital One Customers and Applicants. On July 19th a portion of Capital One’s data…

Video Interview with Chris McAree CEO

Video Interview with Chris McAree CEO

Chris McAree recently sat down with folks from LogMeIn who wanted to do a piece on LeafTech, and how we use their product. Check out the video and hear what Chris has to say about LeafTech…

How does the internet work anyway?

How does the internet work anyway?

In IT, we love our acronyms.  Ready for another one? “DNS”. DNS stands for Domain Name System. Three pretty boring words to string together, but what DNS does is quite exciting…

Technology’s Influence on Humanity – Part 1

Technology’s Influence on Humanity – Part 1

Humanity is the planet’s dominant species by virtue of tool use. Even primitive technologies allowed our ancestors to adapt the environment to their needs rather than adapting to the environment…

Recognizing Phishing Emails – Phishing Part 3

Recognizing Phishing Emails – Phishing Part 3

Almost all phishing emails begin with a call to action. This should be our first red flag that a message is suspicious. Whenever an email asks you to react immediately (usually to avoid some consequence…

Interview with Scott Eastman

Interview with Scott Eastman

I was able to sit down and chat with one of our longest standing vendors: I’m a native of Northern Colorado.  I started my telecommunications career selling cell phones when they were still 3 watt bag phones and HUGE hand held phones…

Caller ID is just a number, baby.

Caller ID is just a number, baby.

Our telephony expert’s explanation of what Caller ID really is. “One of the most complex conceptual differences that I am called upon to explain is Caller ID vs. Caller ID Name. Caller ID is, as in the title, just a number. Caller ID is rarely wrong…”

Common Phishing Emails – Phishing Part 2

Common Phishing Emails – Phishing Part 2

Most phishing emails fall into three broad categories: CEO Fraud, Account Notification Fraud, and Blackmail. Any email that falls into these categories should be read with a critical eye…

Two Factor Authentication – Tech in Brief

Two Factor Authentication – Tech in Brief

Passwords are simply not enough in today’s world.  Most companies now offer a second form of verification beyond the password to authenticate your login, commonly referred to as Two-Step…

A Brief History of Phishing – Phishing Part 1

A Brief History of Phishing – Phishing Part 1

Phishing is part of a spectrum of security threats referred to as social engineering. In a social engineering attack, the intruder targets us as technology users, rather than the technology itself…

New LeafTech Consulting Website Launched

New LeafTech Consulting Website Launched

When someone embarks on a deep dive into LeafTech Consulting and stumbles across this humble blog devoted to our website creation journey, I hope to impart all the excitement…