• Notice: macOS Mojave 10.14.5, Security Update 2019-003

    Notice: macOS Mojave 10.14.5, Security Update 2019-003

    Apple has released security updates to address vulnerabilities in multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
  • Enable Do Not Disturb on Your Android Device

    Enable Do Not Disturb on Your Android Device

    Do Not Disturb on Android can do more than you might expect. Here’s how to enable and customize Do Not Disturb on your Android device.   Today’s quick tech blog explains how to enable Do Not Disturb on Android devices. We’ll also give a basic explanation of how to customize this feature, making it even […]
  • Critical Update From Microsoft: Remote Desktop Services

    Critical Update From Microsoft: Remote Desktop Services

    Impacted Systems: Windows Server 2003 Windows XP Windows7 Windows Server 2008 Nonimpacted Systems: Windows 10 Windows Server 2016 Windows Server 2019 If you are still using Windows Server 2003 or XP, Windows 7, Windows 2008 R2, or Windows 2008 you could be in trouble. A wormable virus may be coming your way. The virus is […]
  • Church Hit with Business Email Compromise

    Church Hit with Business Email Compromise

    There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches […]
  • What Is PII Under GDPR?

    What Is PII Under GDPR?

    The security of user data is of high importance, and that importance only grew with the implementation of the EU’s General Data Protection Regulation (GDPR). These sweeping new regulations went into effect on May 25, 2018. They are European Union regulations, but they have sweeping effects since they apply to any business that stores personal […]
  • Happy Mother’s Day!

    Happy Mother’s Day!

    May 12th is Mother’s Day – what are your plans to mark the occasion? Flowers? A special meal? A day out with the kids?   Whatever your plans are, take some time this Sunday to celebrate all of the mothers in your life, not just your own. And if this is your day? The Discovery Information Technologies […]
  • Malware attack hits US accounting firms

    Malware attack hits US accounting firms

    A major accounting software and cloud services company has been hit by malware, affecting their many clients across the US. Wolters Kluwer, a major provider of tax accounting software and cloud services, has been hit by malware. The many financial software services they offer to clients across the country have been down since Monday, May […]
  • 5 Must-Know Microsoft Outlook Hacks

    5 Must-Know Microsoft Outlook Hacks

    Take a minute to pull out your phone. How many email notifications are staring at you? 100? 3,000? More? Drowning in email is no way to live—or to conduct business. An out-of-control personal email account can cause plenty of problems, like missed bill payments. Even worse, an out-of-control business email account can be disastrous. No […]
  • Who Provides Managed IT Services In Beaumont, TX

    Who Provides Managed IT Services In Beaumont, TX

    Discovery IT provides managed IT services and IT support in Beaumont, TX? Searching for the perfect IT service company for your organization?
  • How Can You Save Money With The Cloud?

    How Can You Save Money With The Cloud?

    Cloud computing transformed the way companies approached their infrastructure. You’re not locked into using on-site resources only. Instead, you have access to a range of cloud-based service providers. It’s common knowledge that the cloud saves businesses money, but you may be wondering about the specifics of how that works and how to get the best […]
  • Are You Using Internet Explorer?

    Are You Using Internet Explorer?

    Do you still surf the Web with Internet Explorer?  If so, you’re not alone. Even after Microsoft came out with their new Edge browser in 2015, some people are still using Internet Explorer. The Problem? Security experts have found serious security flaws in Internet Explorer’s code. This means that if you use it, you’re opening […]
  • Why Do We Need Continuous Network Scans?

    Why Do We Need Continuous Network Scans?

    Hackers are working 24/7 to break into your IT network. Why not scan it 24/7 instead of waiting until a hacker gets in and steals your confidential data?
(409) 727-7080