Danville (217) 446-9574 | Terre Haute (812) 561-0211 | Indianapolis (317)-759-1051

Blog

Your Company’s Data was Hacked – Are You Legally Responsible?

So, who should be held responsible when a company’s data system gets breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over half ...

IBM Invests Billions To Purchase Popular Red Hat Linux

IBM has recently announced what is to be the largest open source acquisition in history.  They're buying Red Hat for a staggering $34 billion dollars.  This, as the saying goes, changes everything. ...

Deleting Your Google Search History Will Soon Be Easier

Google is rolling out some important changes that will make it easier for people who use their services to control their data. They're starting with their most widely used service, which is ...

Google Finally Cracking Down On Manufacturer Device Updates

Security in the Android ecosystem is awful.  There's just no other word to describe it. In large part, the blame for that can be placed at the feet of Google.  Although they ...

Hackers Now Targeting Girl Scouts, Raising Privacy Concerns

As far as hackers are concerned, no target is safe.  Not even the Girl Scouts. Recently, one of the Girl Scouts' official email accounts was accessed by an "unauthorized third party" and ...

Some Tumblr Users May Have Had Their Data Breached

Do you use Tumblr?  If so, be aware that your personal information may have been exposed. Tumblr recently added a feature called "Recommended Blogs" that presents you with a list of blogs ...

New Fake Antivirus Tech Support Scam Tricking Users

McAfee has long been a popular target of scammers, but recently, they've changed the nature of their game. In years past, they'd display a webpage informing you that any McAfee products on ...

Uninstall Fake App Called “The Album by Google Photos”

If you take a lot of photos with your Android device, you're probably constantly on the lookout for a better way to organize them and access them.  That's exactly what the authors ...

Passwords: Not as Secure as You Might Think

We’ve all heard that in order to protect our information and online accounts we need to create complex passwords with uppercase and lowercase letters, numbers, and special characters, right? Following such ...

HIPAA Fines For Data Breaches Continue To Grow

Anthem is one of the largest insurance providers in the United States. Unfortunately in 2015, they had the dubious honor of suffering the largest health data breach in history. It left protected ...

Blog

Malware Now Hiding Inside Fake Copies Of Online Books

Malware Now Hiding Inside Fake Copies Of Online Books

Kaspersky Lab has recently issued a warning that should alarm and dismay students around the world.  Based on the findings[...]
Poshmark Retailer Member Passwords Are Being Sold Online

Poshmark Retailer Member Passwords Are Being Sold Online

There is grim news for users of the online marketplace Poshmark, which is a thriving community where people buy and[...]
Hackers Can Now Use Fake Voices To Steal Money

Hackers Can Now Use Fake Voices To Steal Money

You've almost certainly been seeing stories on the internet this year about the growing trend of Deep Fakes. They are videos[...]

Location

Illinois Offices

21 N Vermilion Street
Danville, IL 61832
(217) 446-9574

Indiana Offices

333 N Alabama St
Indianapolis, IN 46204
(317) 759-1051


672 Ohio Street #27
Terre Haute, IN 47807
(812) 561-0211

Texas Offices

6600 Chase Oaks Blvd
Suite 100
Plano, TX 75023

Company

Since 1991, CTS Computers has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in central Illinois and Indiana. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite