New Certification for MintzIT: Certified Wireless Technician
We at MintzIT believe the path to serving you best, includes continuous self-improvement. This is our latest certification. We are the first, and currently only IT consultancy in New Mexico to have successfully passed this certificate.
New Certifications for MintzIT: iOS Deployment Essentials
We at MintzIT believe the path to serving you best, includes continuous self-improvement. This is our latest certification. We are the first IT consultancy in New Mexico to have successfully passed this course.
New Certifications for MintzIT: iOS Security & Privacy
We at MintzIT believe the path to serving you best, includes continuous self-improvement. This is our latest certification. We are the first, and currently only IT consultancy in New Mexico to have successfully passed this certificate.
New Certifications for MintzIT: Certified Wireless Technician
We at MintzIT believe the path to serving you best, includes continuous self-improvement. This is our latest certification. We are the first, and currently only IT consultancy in New Mexico to have successfully passed this certificate.
Q: What are the current industry-standards for IT password policies?
Q: What are the current industry-standards for IT password policies? A: The great thing about standards is there are so many to choose from 😉 The industry-standard that most businesses and individuals can pay attention to is the NIST SP-800-171. This details IT...
Q: How do I know who’s monitoring my calls on iOS? I keep hearing beeping sounds in calls
Q: How do I know who's monitoring my calls on iOS? I keep hearing beeping sounds in calls. A: It is almost inconceivable that the sound you are hearing has any association with possible monitoring of your phone. The reasons is there isn’t any reason for a penetration...
Q: MAC addresses are coming up on my network. How do I block them?
Q: MAC addresses are coming up on my network. How do I block them? A: Every device that is able to access either ethernet or wi-fi has a unique MAC (Media Access Control) address. Although the MAC address is hard-coded into the network chip, it can be spoofed. Any...
Q: What are the limitations of an antivirus in protecting a PC?
Q: What are the limitations of an antivirus in protecting a PC? A: First and foremost is an antivirus (anti-malware) is limited to protecting against only malware. Malware is just a minor player in the cybersecurity arena. They are limited to protecting only against...
Q: What Wi-Fi system is recommended to cover 1,000 users per month
Q: What Wi-Fi system is recommended to cover 1,000 users per month. A: It’s not so much the users/month, but the maximum number of concurrent users, and the bandwidth of your internet connection that are limiting factors. Your available budget is also a factor. For...
Q: How can I stop other people from seeing what I’m doing on my tablet when using their WiFi?
Q: How can I stop other people from seeing what I'm doing on my tablet when using their WiFi? A: The same easy answer to many cybersecurity questions - install and use a Virtual Private Network (VPN). When using VPN all of your communications are encrypted between...
Q: Is Hard Drive the best data archival option?
Q: Is Hard Drive the best data archival option? A: With few exceptions, acid-free paper is by far the best archival storage. A few years back Ziff-Davis did a study on the archival options for IT. This was before solid state drives. Pretty much everything (HD’s,...
Q: How can I recover my deleted documents on a Mac?
Q: How can I recover my deleted documents on a Mac? A: There are any number of data recovery utilities for macOS available for the consumer. When an item is moved to the Trash, it is no different than moving it to another folder–as the Trash is just a folder. When the...
Q: How does one get identified through Tor?
How does one get identified through Tor? Tor is a web browser, that attempts to ensure anonymity by routing web traffic through a series of Tor nodes. Each node only knows which node it is receiving the packet from, and which it is delivering to. The nodes used change...
Practical Paranoia macOS 10.13 Security Essentials Update: Chapter 20 Social Media
Practical Paranoia macOS 10.13 Security Essentials Update: Chapter 20 Social Media As of April 21, 2018, The Practical Paranoia macOS 10.13 Security Essentials workbook has been substantially updated. Included is a rewrite of chapter 20 Social Media to reflect changes...
Practical Paranoia macOS 10.13 Security Essentials Update: Chapter 19 Internet Activity
Practical Paranoia macOS 10.13 Security Essentials Update: Chapter 19 Internet Activity As of April 21, 2018, The Practical Paranoia macOS 10.13 Security Essentials workbook has been substantially updated. Included is a rewrite of chapter 19 Internet Activity to...