Blog

READ THE LI TECH ADVISORS BLOG

It’s a smart way to invest your time!

Are You At Risk Of An ADA Violation Lawsuit?

Your website needs to be accessible to a range of potential users with disabilities, as part of your compliance with the American Disabilities Act. Failure to do so won’t just limit your potential client base – it can also mean you’re liable for legal damages as well.

keep Reading

Rockville Centre School District Welcomes Students Back With Ransomware

The Rockville Centre school district in Long Island, New York was hit with Ryuk Ransomware this summer. The ransomware encrypted files on their server and they had to pay nearly $100,000 to unlock their data.

keep Reading

Restore Your Health & Your Data with Health Data Importer

For anyone whose sole motivation to workout is to close their daily rings (like me) and unlock new achievements, the Health Data Importer app can be a literal life saver.

keep Reading

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company. This brief video courtesy of News24 discusses the […]

keep Reading

Demystifying A Tesla

The company does a “cost-based” business model; if they reduce the cost of production/features, they pass on the cost to the consumer.

keep Reading

The Price of Getting Hacked

Depending on the scope of the attack, the cost of getting hacked can be in the hundreds of thousands or more. Here’s what you need to know.  When it comes to cyberattacks, all too often the bad guys win. Hackers have targeted local governments, airports, banks, and businesses, stealing usernames, passwords, and sensitive private data. […]

keep Reading

The Complete Guide to Managing Popular Extensions Successfully

Protect Yourself from Potential Attacks Via Chrome Extensions Learn two simple ways to set the privacy and activity settings for each Google Chrome extension on your browser and steps the company is taking to protect users. Google’s Chrome web browser is a popular choice for businesses the world over. Managing the extensions gives you more […]

keep Reading

Is Your Android Infected by Malicious Adware?

Recently, Google Play Store app developer “CooTek” has had a wave of sketchy apps banned from the Google Play Store. Security firm Lookout has accused him of deploying adware BeiTaAd in its apps.

keep Reading

Name that Flower, Creature, or Critter with iNaturalist

iNaturalist, and its sister app, Seek, are two free mobile apps that can instantly tell you the names of the wildlife and plant life that surround you during your outdoor exploits.

keep Reading

New Features in Apple’s IOS 13 Update

In addition to these new features for IOS 13, Apple also revealed a new Mac Pro device at the conference that would be launched this fall.

keep Reading