East Valley | Metro Phoenix (480) 894-8640

Blog

Playing Videos Could Allow Hackers Into Your Phone

Do you have an Android device?  Are you running Android Nougat, Oreo, or Pie (versions 7x, 8x, or 9x)?  Do you play games on your phone? If you answered yes to those ...

Security Flaw Found In Open Source Office Program LibreOffice

Do you use LibreOffice? It's an open source clone that's functionally similar to Microsoft Office that has grown quite popular over the years. It is available for Windows, macOS and Linux systems. ...

Facebook Is Making Changes To Privacy Following Huge Fine

We're talking about the result of a massive five billion dollar fine over violations surrounding the Cambridge Analytica scandal. While the staggering size of the fine made all the headlines, there's more ...

Capital One Data Breach Puts Millions At Risk

Another week, another massive data breach. In this case, Capital One was the target when an unknown individual gained access to the company's servers. The breach was detected by an independent security ...

Bluetooth Security Issue Could Affect Most Devices

Recently, researchers from Boston University published a paper called "Tracking Anonymized Bluetooth Devices". The paper detailed a flaw in the ubiquitous Bluetooth communication protocol that could expose device users to tracking and ...

Equifax Breach Victims Could Be Entitled To Settlement Claims

Equifax is one of the three credit reporting firms in the US that suffered a massive data breach in 2017 that exposed the personal and financial state of literally half the country ...

Update iPhone to Avoid Possible iMessage Bug

People like and tend to gravitate to Apple products because the company has gone to great lengths to make their products are highly secure. Sure, you pay more for them, but most ...

Some Android Apps To Receive Your Data Without Permission

When it works, Android's app permissions are awesome. They're straightforward and easy to understand. When you install a new app on your phone, you'll get a popup box that gives you a ...

New Ransomware Targets Network Attached Storage Devices

Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer.  The new strain has been dubbed "QNPCrypt" by Intezer ...

New Phishing Scam Targets Your Amazon Account

McAfee researchers have discovered a new version of the 16Shop phishing kit in use by hackers around the world. According to the latest research, there are now more than 200 URLs currently ...

Blog

Report Shows 118 Percent Increase In Ransomware Attacks In 2019

Report Shows 118 Percent Increase In Ransomware Attacks In 2019

Ransomware roared onto the global stage in 2017. Companies and government agencies around the world felt the impact with widespread[...]
Popular PDF Creator App Found To Have Malware

Popular PDF Creator App Found To Have Malware

Do you use the PDF Creator App called CamScanner?  If you do, you've got plenty of company.  Since the app[...]
Microsoft Is Extending Windows 7 Support For Only Some Users

Microsoft Is Extending Windows 7 Support For Only Some Users

There's some good news for Enterprise users who are still using Windows 7.  By now, almost everyone is aware that[...]

Locations

Gilbert (HQ)

890 W. Elliot Rd, Suite 110
Gilbert, AZ 85233
(480) 894-8640

Texas Office

555 Republic Drive, Ste 500
Plano, TX 75074
(480) 809-4550 Live Support 24/7

Local Areas Served

Arizona

Company

Since 1999, The I.T. Workshop has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the East Valley and Metro Phoenix areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite

Nationwide Service Provided

Arizona