Devices like smartphones, laptops, and tablets use this to connect to the Internet and communicate with each other
What is Wi-Fi
The president and vice-president of Harper Technologies.
Who is Abe and Carl Harper
What is IT?
Information Technology
The recommended frequency that you should back up your data.
What is daily.
A proactive approach to IT where we take on the responsibility of maintaining, monitoring, and supporting your technology infrastructure.
What is Managed Services
The essential software that manages your computer's hardware and provides a platform for applications to run.
What is the Operating System or OS
The year Harper Tech was founded.
2002
The account login process that requires users to enter more information than just a password.
What is (MFA) Multi-Factor Authentification
The average lifespan of a computer
What is 5 years.
Hardware and software that work together to enable devices to communicate, share resources, and access information efficiently and securely.
What is Network Infrastructure.
A device that allows wireless-equipped computers and other devices to communicate with a wired network.
What is an Access Point
Lonnie Johnson was the speaker at this Chamber Event which Harper Tech has been 3x honored.
What is The Eagle Awards.
This is used as your Computer's short-term memory storage.
What is (RAM) Random Access Memory
Masks your IP address and creates a secure, encrypted connection over a less secure network.
What is a VPN (Virtual Private Network)
A range of solutions designed to access, manage, or store data. This includes data storage and backup and recovery.
What is Data Solutions
When an attacker sends a fraudulent message designed to trick an End User into revealing sensitive information
What is Phishing.
The number of buildings Harper Tech occupied before calling 50 North Broad Street Home.
What is 2.
Serves as your computer's long-term memory, storing and remembering files even when your device is off.
What is a Hard Disk Drive (HHD) or Solid State Drive (SSD)
You should verify the sender BEFORE you open this on an email.
What is an attachment
Educates team members on recognizing and responding to potential security threats, such as phishing attacks, malware, and data breaches
What is Security Awareness Training
A security device or software that acts as a barrier between a network and external threats. It monitors and controls incoming and outgoing network traffic based on predefined security rules.
What is a firewall.
This is the number of years that separate Abe and Carl by age.
What is six.
Defines the service to be provided and the level of performance to be expected.
What is a Service Level Agreement
Like Hercules, this should be strong.
What is Password.
An authorized, simulated cyber attack exercise aimed at finding and notating vulnerabilities/weak points in your computer system.
What is Penetration Testing.