logo1

US Govt Tracking Sheet for Foreign Tech Companies

We have created the Google sheet for tracking purposes as it relates to the recent slew of foreign technology companies that have been barred or are considered being barred from use by the US Government, either by one or multiple agencies. Commercial and private sector organizations may want to consider this guidance as well when […]

Transitioning from a file-server to the cloud

Symposit was recently tasked by a client to develop a strategy to migrate away from a legacy file server that the company used internally to collaborate, share large files, and store sensitive corporate data. We knew that the server was aging and the goal was to get rid of having a server altogether. Thus, we […]

Symposit Founder, Bobby Bermudez, to serve on Board of Directors for Byte Back

WASHINGTON D.C. Symposit LLC President and Founder, Bobby Bermudez, was recently appointed to the Board of Directors for Byte Back, a D.C. based non-profit with a mission to improve economic opportunity by providing computer training and career preparation to under-served Washington, DC metro area residents. By serving on the Board, Bobby will actively help play a […]

Defend against Hackers with Remote Monitoring & Management (RMM)

Even as businesses continue to invest in improving their technology infrastructure, they face the ever-present threat of IT failure known as downtime, any time that vital systems become unresponsive. Collectively, these periods of network inactivity cost businesses an estimated 127 million person-hours every year in lost productivity. NetworkWorld cites research firm Gartner placing the value of just one hour of […]

Control your privacy by managing advertising choices.

One of the best ways to manage your privacy is to manage and opt-out of advertising personalization settings for the browser that you most frequently use. This is especially helpful on mobile devices where targeted ads will annoy you and potentially expose your personal habits to marketers and ad agencies. Today we will share some […]

IT Contractor Symposit LLC Awarded General Services Administration Contract

For Immediate Release: IT Contractor Symposit LLC Awarded General Services Administration Contract Contract Simplifies Procurement Process for Government Agencies FALLS CHURCH, VA – Symposit LLC announced today that it was awarded a U.S. General Services Administration (GSA), Multiple Award Schedule (MAS) Schedule 70 contract. This five-year IT contract approves Symposit to a federal catalog of […]

Protect your network by implementing DNSCrypt

The Internet Domain Name System (DNS) is truly amazing technology – without it, you wouldn’t be able to type in google.com and reach your destination. DNS was created to assist humans in having an easy address to remember server IP addresses. Think of it as knowing a street address instead of remembering the longitudinal coordinates […]

ONLINE SECURITY – What can you do to become more vigilant?

ONLINE SECURITY – What can you do to become more vigilant? This the first, in series of Blog posts, to help you with identifying the threats and current redirect practices being conducted by online scammers. One of the tactics that online scammers are using to try to fool people into visiting malicious websites is a […]

CCleaner’s argument for open source

For many, many years we have lauded the use of CCleaner to clean and optimize Windows based workstations in many different environments. Unfortunately our stance is changing today. Security researchers at Cisco Talos discovered that the 32-bit version of CCleaner 5.33 was triggering alerts on their advanced malware protection systems. They found that malware was bundled […]

Mobile Device Management – Are you ready?

Do you remember when smartphones began showing up in the workplace over a decade ago? Whether they were company-provided smartphones or employee-owned smartphones phones, many business users were connecting to the corporate network without a hint of a mobile device management policy in place. This is a very dangerous practice, given that many do not […]

Skip to content