Blog

It's Always Phishing Season

April 19, 2018 Articles
Although they are pronounced the same, phishing is far from the favorite childhood pastime associated with boats and dads. The only similarity comes from the term “phishing,” referencing the act of casting a baited hook with the hopes of catching a bite.

AR vs VR: What's the Difference?

March 12, 2018 Articles

Two rising tech terms that we frequently hear are augmented reality (AR) and virtual reality (VR). It can be difficult to distinguish the difference between the two, so for this month’s newsletter we have broken them down.
Understanding the basics
For background, both AR and VR fall under the concept of mixed reality (MR). According to Reality Technologies’ article, “Mixed reality…attempts to combine the best of both virtual reality and augmented reality.

The CEO's State of the Union

February 5, 2018 Articles

Each year SWAT picks an overall theme to rally behind.  This year we have chosen KAIZEN.  This Japanese word means “continuous improvement,” and as SWAT turns 18 it is a perfect time to focus on just that. Our goals, accountability, and transparency will all mesh to make our final years as a teenage company the best they can be.

Meet the Goonies' New Team Lead!

January 30, 2018 Articles

Our adventurous group of misfit engineers have gotten a new leader: Jordan Ritchie.

Their previous leader, David Talley, is still with the Goonies but assists in a supportive role as he takes on a new endeavor. Jordan originally joined SWAT Systems in 2015 as a Systems Engineer.

7 last-minute gifts for your favorite techie

December 19, 2017 Articles

Technology enthusiasts are some of the most difficult people to get a gift for. They normally take care of buying all technology-related items themselves. If they do want something, it’s usually too hard to remember what it was, or it’s pretty expensive.

Understanding the Global Wifi Security Scare

November 15, 2017 Articles

On October 18, all of the top news broadcasters and tech bloggers were covering the breaking news that took the world by surprise. A flaw was found in the most-used protocol that password-protects a wireless network. It was now a race between developers and hackers.

Top Five Things to Protect Against Malware

July 3, 2017 Articles

While hackers are getting smarter and stealthier with their attacks, humans are still capable of putting up a good defense. You may not know this, but a lot of malware attacks are successful because of their ability to trick people into giving them access to their computers.

Office 365: Increase ROI with Power BI

It’s rare that business owners have a chance to get move value out of their existing IT solutions without investing more resources in them. But with Microsoft’s latest data analytics platform, business owners can make sure they’re squeezing every last drop of productivity from Office 365, for free.

Your Business Needs a UPS System

For some businesses, power loss could result in profit loss. Natural disasters such as storms and hurricanes, construction or utility accidents, and other unforeseeable technical failures can put your business’s operations to a grinding halt. Businesses that depend on a continuous power supply to function might endure a slight disruption, but some might not.

Protect Your Android Mobile Devices

When personal and professional informational lives on one mobile device, the risk of malware attacks and huge data breaches rises. As the adoption of bring your own device policy increases, so should employee awareness when it comes to ever-growing cyber threats.