Existing customers click OK below to open up your e-mail client to submit a support request. Note: if you are not an existing customer, your support request will be ignored. If you wish to become a customer, please click on the "Contact Us"
Existing Customer
New Customer
Our Insights
Discovery I.T. is your trusted Information Technology & Information Systems Support company in Nederland, Beaumont, Port Arthur, Orange and all of East Texas.
Organizations across the country are learning from cyber attacks perpetrated in Atlanta, Newark, and Sarasota. Similarly, large targets such as San Francisco’s transit authority and Cleveland’s airport have also been targeted. The growing threat from ransomware, which locks up the victim’s device and files, is hard to track down to the source. Fortunately, many attacks […]
Cybercriminals lock victims out of computer and network files – sometimes destroying data – and extort cash to get that data back. That’s a ransomware attack, costing businesses billions worldwide. Ransomware can spread by the simplest of user actions. Email phishing, or Business Email Compromise (BEC) – fraudulent and deceptive emails posing as legitimate messages – is […]
Every business should have a comprehensive cybersecurity plan and a competent team that can execute that plan. Otherwise, cybercriminals and malicious actors can and most likely will take advantage of security vulnerabilities to access company data and cause damage. But as important as it is to have skilled IT professionals looking out for your business, […]
As managed IT services have grown in popularity, you’ve probably heard the concept touted often as the answer to your business’s IT woes. Still, there can be plenty of mystery on the topic. What is managed IT services, exactly? How do organizations integrate managed IT services into their existing business and workflows? Also, who provides […]
Today’s digital-savvy educators do more than simply lecture their class. They’re creating interactive quizzes and gathering real-time feedback via an app. They’re assigning projects to students, while students complete and submit their homework digitally. They’re instantly sharing feedback with parents and students — and they’re finding new ways to engage with the world around them […]
Cyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophisticated, targeted hacks, and others occur thanks to enterprising hackers taking advantage of security holes in insecure or out-of-date software. At the end of the day, though, just about […]
If you are a lawyer or if you are hiring a lawyer, technology competence, often shortened to tech competence, is a term that you should be aware of. Recently, changes have been recommended in regards to tech competence and attorneys. Here is everything that you need to know about this topic. What is Tech Competence? […]
According to the LawSites blog, as of this writing, there are 36 states that have adopted the ABA’s updated Model Rule 1.1, which states that lawyers should maintain technology competence. The rule is purposefully vague to allow for the constant changes in technology that the legal industry is encountering. Unfortunately, the vagueness can create some anxiety […]
Once you click the link, guess what happens? A virus is downloaded onto your system. Sometimes it's malware, and sometimes it's ransomware. Ransomware encrypts all your files until you pay the ransom. Even then, there's no guarantee you'll get your database restored. Malware is all about stealing credentials, passwords, and other valuable information from your company. Sometimes it's just about destroying your data.
In early 2019, white-hat security expert Troy Hunt and other researchers shared a massive database of breached passwords and usernames. The stolen data constitutes 25 billion records and 845 gigabytes of stolen data. While many of the collected records are from previously reported thefts, there are new records there, too. It’s a clear indication of regularity, scope and potential damage […]
Since 1988, we’ve been serving organizations of all sizes in Southeast Texas. We believe that when we efficiently handle all of your technology needs, this frees you up to focus on growing your business.
Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that a site is secure) when sending potential victims phishing emails that imitate trustworthy companies or email contacts. […]