News & Press


WannaCry: How To Respond

Posted: May 15th, 2017

Over the weekend US-CERT has issued a bulletin regarding a new ransomware called WannaCry. This ransomware variant uses email phishing, Remote Desktop compromise, or by exploiting a system that is not up to date on all security patches. Systems that are past end of life such as Windows 2003 server, or Windows XP that no… Read More

Read More »


Mainstream Technologies Hires Jeff Pracht

Posted: April 24th, 2017

Brings 28 years experience to NWA (Little Rock, Ark.) – (April 26, 2017) — Mainstream Technologies is pleased to announce the hiring of Jeff Pracht as IT Business Development Manager. He will be responsible for developing the Northwest Arkansas market for Mainstream’s managed IT services and hosting. Jeff has 28 years of experience in the… Read More

Read More »


Mainstream Technologies Completes MSP/Cloud Verify Certification

Posted: March 30th, 2017

For Immediate Release MSP/Cloud Verify Program offers vendor-agnostic Certification for Cloud and Managed Services Practitioners Worldwide; Provides Quality Assurance, and Stamp of Reliability for Current, Potential Customers (Little Rock, AR) –  March 30. 2017 – Mainstream Technologies today announced that it has successfully completed the MSPAlliance’s MSP/Cloud Verify Program (MSPCV) certification process, the oldest certification… Read More

Read More »


Mainstream Technologies Hires Pat Thomas

Posted: March 10th, 2017

Brings 13 years experience (Little Rock, Ark.) – (Mar.10, 2017) — Mainstream Technologies is pleased to announce the hiring of Pat Thomas as Tier II Service Engineer. Pat will serve as technical leader for Mainstream’s day-to-day IT client support operation. His responsibilities will include working with clients for support, troubleshooting, and resolution of issues across… Read More

Read More »


Security Tip – Understanding Anti-Virus Software

Posted: February 20th, 2017

What does anti-virus software do? Although details may vary between packages, anti-virus software scans files or your computer’s memory for certain patterns that may indicate the presence of malicious software (i.e., malware). Anti-virus software (sometimes more broadly referred to as anti-malware software) looks for patterns based on the signatures or definitions of known malware. Anti-virus… Read More

Read More »


Security Tip – Supplementing Passwords

Posted: February 20th, 2017

Why aren’t passwords sufficient? Passwords are a good first layer of protection, but attackers can guess or intercept passwords. Additional security measures can protect you even if an attacker does obtain your password. You can strengthen that first layer of protection by avoiding passwords based on personal information or words found in the dictionary; building… Read More

Read More »


Security Tip – Securing Your Home Network

Posted: February 20th, 2017

How are routers used in your home network? Home routers have become an integral part of our global communications footprint as use of the Internet has grown to include home-based businesses, telework, schoolwork, social networking, entertainment, and personal financial management. Routers facilitate this broadened connectivity. Most of these devices are preconfigured at the factory and… Read More

Read More »


Security Tip – Real-World Warnings Keep You Safe Online

Posted: February 20th, 2017

Why are these warnings important? Like the real world, technology and the internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real world, you need to take precautions to protect yourself online. For many users,… Read More

Read More »


Security Tip – Keeping Children Safe Online

Posted: February 20th, 2017

What unique risks are associated with children? When a child is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. You need to consider these characteristics when determining how to protect your data and… Read More

Read More »


Security Tip – Effectively Erasing Files

Posted: February 20th, 2017

Where do deleted files go? When you delete a file, depending on your operating system and your settings, it may be transferred to your trash or recycle bin. This “holding area” essentially protects you from yourself—if you accidentally delete a file, you can easily restore it. However, you may have experienced the panic that results… Read More

Read More »