East Valley | Metro Phoenix (480) 894-8640

Blog

Are Some SSD Drives Susceptible To Hacking?

A research team has found an exploit that allows hackers to decrypt and view encrypted files on a number of well-known SSD drives.       They include: Samsung T5 Portable Samsung ...

Apple Adds Physical Security Feature To New MacBook

In recent months, hackers around the world have been finding new ways to invade people's privacy, hijacking an increasing number of cameras and microphones attached to smartphones and PCs.  Apple is responding ...

5 Reasons Why Your Company Should Outsource its IT Support

Companies commonly outsource its accounting and bookkeeping duties, customer service, and HR management… so why should technical support be any different? It shouldn’t. Outsourcing provides a lot of benefits, especially to ...

Another Intel Processor Vulnerability Found

Intel just can't seem to catch a break.  By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first ...

Video Embedding Feature In MS Word Has Security Vulnerability 

Researchers have discovered a security flaw in MS Office 2016 and older versions that leave the door open to hackers who can take advantage of it to run malicious code on a ...

Most Apple Devices Are Getting A Major Software Update

If you own Apple devices that use iOS, watchOS, tvOS, or macOS, there's good news.  The company just released major updates for all of those. They're available right now, and here are ...

iOS Gmail Users Will Be Able To Access Multiple Accounts

Earlier this year, Google introduced a new and improved Gmail that gave users virtually unlimited customization options. In addition to that, it included some exciting new AI-based features that cut down on ...

Yahoo Is Compensating Victims Of Their Massive Data Breach

Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, the company has recently agreed to pay $50 million in ...

Your Company’s Data was Hacked – Are You Legally Responsible?

So, who should be held responsible when a company’s data system gets breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over half ...

IBM Invests Billions To Purchase Popular Red Hat Linux

IBM has recently announced what is to be the largest open source acquisition in history.  They're buying Red Hat for a staggering $34 billion dollars.  This, as the saying goes, changes everything. ...

Blog

New Microsoft Excel Feature Could Be Useful For Some

New Microsoft Excel Feature Could Be Useful For Some

In the earliest days of the smartphone, there were only a few apps that people could use to perform genuinely[...]
Health Organization Says Gaming Addiction Is A Mental Disorder

Health Organization Says Gaming Addiction Is A Mental Disorder

Do you like video games?  Are you the kind that can get so lost and involved in your favorite title[...]
Hackers Had Access To Flipboard User Information

Hackers Had Access To Flipboard User Information

Do you use the news aggregator service called Flipboard? If so, be aware that the company has recently started notifying its[...]

Locations

Gilbert (HQ)

890 W. Elliot Rd, Suite 110
Gilbert, AZ 85233
(480) 894-8640

Texas Office

555 Republic Drive, Ste 500
Plano, TX 75074
(480) 809-4550 Live Support 24/7

Local Areas Served

Arizona

Company

Since 1999, The I.T. Workshop has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the East Valley and Metro Phoenix areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite

Nationwide Service Provided

Arizona