Resources

At American Technology Services (ATS), we understand that navigating differing IT solutions can be overwhelming. That’s why we’ve dedicated our resources page to being a repository of information that can serve as a compass for understanding how technology can help your organization reach its goals. Our commitment goes beyond offering top-tier technology services and IT support; it’s about empowering you with the knowledge and insights to make informed decisions that drive your organization forward.

 

Our team writes every article, case study, eBook, and advisory to enhance your understanding of the latest IT advancements, cybersecurity threats, and strategic solutions. From the nuances of cloud computing to the intricacies of cybersecurity, our resources are designed to provide comprehensive insights.

 

Here, each piece of content is crafted to equip our readers with the knowledge they need to make smart choices about their technology stack, providers, and cybersecurity posture. The expertise that shapes our resources is rooted in a deep understanding of technology’s role in business and society.

 

We don’t just stop at providing information. ATS is committed to fostering a community where learning is a shared journey. Our resources are meticulously crafted by experts who not only understand the technical aspects of IT but also appreciate the impact of technology on businesses and society. Whether diving deep into the depths of data privacy, learning best practices regarding technology implementation, exploring the value of collaborating with cloud services or seeking guidance on IT strategy, our resources serve as your guide.

COVID-19 Phishing Scheme

In light of the heightened fear around the COVID-19 pandemic, criminals are targeting and exploiting remote workers that are isolated from their regular daily routines. Download Security Advisory Summary In light of the heightened fear around the COVID-19 pandemic, criminals are targeting and exploiting remote workers that are isolated from their regular daily routines. This […]

IT Strategy & Consulting

Technology is ever-evolving, it’s the nature of the beast. And having an innovation advisor by your side is vital. We will tailor a strategy that fits your needs, and uncover the right technology for your toughest business problems—no matter the industry. Download Infosheet

RDP Vulnerabilities

Microsoft’s Security Response Center announced a vulnerability affecting Windows Server versions 2008 R2, 2008, and 2003. Windows 7 and XP are also affected. Download Security Advisory Summary On Tuesday, May 14th, 2019, Microsoft’s Security Response Center released a statement along with a patch for a critical Remote Code Execution vulnerability in Remote Desktop Services. The

IT for Financial Institutions

Whether it is managing your day-to-day IT operations, upgrading your technology infrastructure or leveraging technology to help you connect with your members, we bring together our knowledge of core processors and industry-leading technologies to deliver risk-free, innovative IT solutions. Download Infosheet

GDPR Quick Guide

We understand that your organization is accountable for GDPR compliance. Our holistic and structured methods will ensure an effective and efficient compliance journey. Download Infosheet

The International Society for Heart and Lung Transplantation

The International Society for Heart and Lung Transplantation

Website redesign project on Kentico CMS and custom application development Background:  The International Society for Heart and Lung Transplantation (ISHLT), is a highly successful and helpful organization, but their website was not reaching the appropriate standards for their needs. The website was static, housed a great deal of content, did not render well on mobile

Petya Malware Attack

On Tuesday, June 27th 2017, reports of a new, widespread malware outbreak appeared on security forums and eventually mainstream media sites. Download Security Advisory Summary On Tuesday, June 27th, reports of a new, widespread malware outbreak appeared on security forums and eventually mainstream media sites. The malware at the center of this outbreak, known as

WannaCry Ransomware Attack

“WannaCry” ransomware encrypts non‐system files and presents user with instructions to pay for decryption. Download Security Advisory Summary On Friday morning, a widespread Ransomware attack began spreading across the globe. Going by the name “WannaCry” and some variations, this attack takes advantage of a vulnerability in the Server Message Block (SMB) in Microsoft’s Windows operations

Scroll to Top
Skip to content