Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Artificial Intelligence is Only as Unbiased as Its Data

Artificial Intelligence is Only as Unbiased as Its Data

Over the past few years, artificial intelligence has become a bona fide buzzword amongst businesses of all sizes, with 97% of respondents to a Forbes survey seeing a potential benefit in some way, shape, or form. However, with it being integrated everywhere in our modern lives, it is important that we remember that AI is still a human invention, as such, it is vulnerable to our own implicit biases.

0 Comments
Continue reading

3 IT Metrics to Pay Attention To

3 IT Metrics to Pay Attention To

Any business can benefit from data and use it to improve its operations. This is especially the case where information technology is involved. By collecting the right metrics, you can better evaluate your business IT’s performance and identify areas for improvement.

Let’s review what some of these metrics should be.

0 Comments
Continue reading

The Problems that Cybercrime Can Pose for Business

The Problems that Cybercrime Can Pose for Business

Unfortunately for small businesses, cyberthreats aren't limited to large corporations and enterprises. Even small businesses and local shops face the constant risk of cyberattacks. Let's take a look into some concerning statistics regarding one of the fastest-growing cyberthreats.

0 Comments
Continue reading

What We Can All Learn from the VirusTotal Data Leak

What We Can All Learn from the VirusTotal Data Leak

In 2004, a service called VirusTotal was launched and swiftly became a popular antivirus and malware scanner to help detect threats in various files and URLs. It became popular enough that it was officially acquired by Google in 2012 and ultimately assimilated into Chronicle, a cloud-based security operations suite for enterprise businesses. Despite this impressive pedigree, however, we find ourselves able to look to VirusTotal as a sobering reminder of how fickle cybersecurity can be, with the service being the source of some limited data exposure.

0 Comments
Continue reading

Tip of the Week: Putting Google Alerts to Work for You

Tip of the Week: Putting Google Alerts to Work for You

There are many ways that Google can be a hugely valuable resource for a business of any size. One way that you may not have thought of before: an automated insights collector.

Let’s talk about how you could be using Google Alerts to keep yourself up to speed on basically whatever you want.

0 Comments
Continue reading

Why Your IT Team Should Have Its Own Mission Statement

Why Your IT Team Should Have Its Own Mission Statement

You’re probably familiar with the concept of a mission statement, particularly in terms of your business as a whole. Did you know, however, that you don’t need to stop there? You can—and we’d argue, should—establish more specific organizational missions for your different departments. Let’s consider how you can benefit from creating a mission for your IT team to uphold throughout its operations, and how you might go about doing so.

0 Comments
Continue reading

Does Your IT Staff Have These Important Certifications?

Does Your IT Staff Have These Important Certifications?

Information technology is a constantly changing industry, with practices shifting all the time. As a result, anyone you have working on your company’s IT should be actively seeking out various certifications to confirm that they are keeping up on modern trends and standards. To help you accomplish this, we’ve put together a brief list of valuable IT certifications that your IT personnel—whether they’re in-house employees or outsourced professionals—should have.

0 Comments
Continue reading

The Metaverse Has Introduced a Complicated Question About Identity

The Metaverse Has Introduced a Complicated Question About Identity

Who are you? While it’s a question that’s been asked in all contexts with all levels of metaphysicality attached—from asking someone their name to prompting someone to follow a path of spiritual self-discovery—the growth of the metaverse once again urges us to ask it in a more literal way. When accessing a conglomeration of various services and platforms, how many identities will each user need to juggle?

0 Comments
Continue reading

The Tell-Tale Hard Drive

The Tell-Tale Hard Drive

If Edgar Allan Poe worked in an office, here’s what one of his works would sound like:

True!—nervous—very, very dreadfully nervous I have been and am, but why will you say that I am mad? The office had sharpened my senses—not destroyed—not dulled them. Above all was my sense of hearing. I heard all things in heaven and on earth and many things in…the other place. So, how then am I mad, especially when I can so healthily and calmly tell you this story?

0 Comments
Continue reading

What Would You Do in Response to a Breach?

What Would You Do in Response to a Breach?

While we—for reasons that should be obvious—tend to focus our attention on preventing and avoiding cybersecurity breaches, it is important that we address how your business responds to a successful breach attempt. Let’s go over how to create a data breach response plan.

0 Comments
Continue reading

Tip of the Week: How to Download Google Workspace Files

Tip of the Week: How to Download Google Workspace Files

Google Workspace is a great tool that allows you to get a lot done, but sometimes you might find yourself in a position where you need to download the files and take them with you or send them to someone. In these cases, you might not want to share the link. Instead, you can simply download them as whatever file format you might need!

0 Comments
Continue reading

Your Employee Data is Important to Protect Too

Your Employee Data is Important to Protect Too

When we talk about data privacy in a business, the default is to generally think about the data the business has collected and compiled from its clientele. However, that’s just one type of data a business has. There’s also a lot of data that is collected by the business about that business’ employees. So, how well protected is this data?

0 Comments
Continue reading

Encryption: What It Is, and How It Works

Encryption: What It Is, and How It Works

Keeping your data protected is a huge concern nowadays, with more and more safeguards needed to prevent it from being exfiltrated. Encryption is a great way to prevent your data from being any good to those who might steal it. Let’s review what encryption is, and delve into how it works in practice.

0 Comments
Continue reading

Remote Work Can Offer More Benefits than You Might Expect

Remote Work Can Offer More Benefits than You Might Expect

Remote work has been embraced over the past two years, in no small part due to the impact of the pandemic. However, some of the impacts of remote work have made it clear to many businesses that its advantages shouldn’t be sacrificed once it is no longer necessary. Let’s review how businesses can improve by continuing the practices of remote work, even after the need for remote work has passed.

0 Comments
Continue reading

If Your Google Drive Links Stop Working, It Might Be Due to an Update

If Your Google Drive Links Stop Working, It Might Be Due to an Update

While we cannot express how important it is to update your software and hardware in a timely manner, it is important to keep in mind that some of these updates aren’t going to be perfect. An upcoming update to Google Workspace serves as the perfect example, as the company has recently released an alert to inform users about an issue affecting Google Drive.

0 Comments
Continue reading

Maps May Soon Be Less Trustworthy Than Ever

Maps May Soon Be Less Trustworthy Than Ever

Did you know that maps as we know them are remarkably skewed? Due to some centuries-old superiority complexes and prejudices, the maps we’ve all been raised looking at have never been completely accurate. However, this problem could soon be an element of cybercrime thanks to a developing technology that many have yet to take seriously, deepfake images, and how they could revolutionize cyberattacks moving forward.

0 Comments
Continue reading

Demystifying Abused IT Buzzwords

Demystifying Abused IT Buzzwords

Nothing will annoy tech-savvy people more than listening to someone that basically doesn't know what they are talking about, but uses technology jargon to seem like they do. It’s pretty confusing for the non-technical too. This annoyance is largely due to the gap between using words and understanding complex and detailed technology processes. So, while there is some respect given to people who work to understand the terminology, most of the time, it’s just too much.

0 Comments
Continue reading

What We Can Learn from Coca-Cola’s Insider Trade Secret Theft

What We Can Learn from Coca-Cola’s Insider Trade Secret Theft

Your business’ data is perhaps its most crucial resource—which is why it is so important that it remains protected against all threats (including those that come from within your own business). Consider, for a moment, the ongoing trial of Xiaorong You, going on in Greenville, Tennessee. Accused of stealing trade secrets and committing economic espionage, You allegedly stole various BPA-free technologies from various companies—including Coca-Cola and the Eastman Chemical Company, amongst others—to the tune of $119.6 million.

0 Comments
Continue reading

What Would Happen if All Data Was Publically Available?

What Would Happen if All Data Was Publically Available?

What if I were to tell you that, by the time you finished reading this sentence, all personal data in existence was exposed? If every text sent, every Google search executed, every website visited, everything we had ever done online, was made public? Gizmodo recently reached out to an assortment of experts for their insights. Here, we’ve assembled their responses for you to consider.

0 Comments
Continue reading

Online Platforms are Collaborating for a More Secure Election

Online Platforms are Collaborating for a More Secure Election

The United States of America is well into its 2020 election season. Social media platforms, and other online services, are taking notice. Given the misuse of social media and other platforms in past contests, there is little wonder that there is some very real pressure on these platforms to establish policy and security measures to prevent these behaviors this time around.

Here, we’ll take a neutral look at the situation, and explain the initiatives that online platforms are now enacting.

0 Comments
Continue reading
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...