Welcome to the New Normal

ransomware skull and files

Welcome to the new normal, as we usher in another massive worldwide fear inspiring ransomware attack.  I will spare you the technical details of this specific malware, but I do feel it is important to understand the common elements of this latest attack, and the ongoing preferred methodology being used in ransomware attacks. In April of this … Read moreWelcome to the New Normal

Top 10 Things We Can Learn from the Target Breach

cyber-security

For those of you not familiar with the SANS Institute http://www.sans.org, the SANS Institute was established in 1989 as a cooperative IT security research and education organization that today reaches more than 165,000 security professionals around the world.  It is a tremendous resource for everything related to IT security, and I highly encourage any organization or individual … Read moreTop 10 Things We Can Learn from the Target Breach

The Blindside Of: Data Breaches

data breach

Over the course of the last couple of years as the number of data breaches has become much more frequent, and the public awareness surrounding those breaches has heightened, many of our customers have come to appreciate our record on data breaches.  To date, none of our managed service customers have had to manage or … Read moreThe Blindside Of: Data Breaches

The Legendary Router Malware

router and cables

When diagnosing your computer’s security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved … Read moreThe Legendary Router Malware

Take Care of Your Computer and it Will Take Care of You

computer maintenance service repair

When it comes to owning anything expensive, it’s important to practice proper maintenance. One of the most basic things you can do to take better care of your computer is to periodically examine the software on your computer. Although software maintenance can be challenging at times, it can be incredibly rewarding. It doesn’t have to … Read moreTake Care of Your Computer and it Will Take Care of You

Internet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

virus network icon

With the world still on edge about the recent vulnerability found in most versions of Internet Explorer, another one has been discovered, this time in Internet Explorer 8. This bug allows a hacker to execute malicious code when a user opens an infected email or webpage. However, this vulnerability is different than the one previously … Read moreInternet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

You Can’t Live Without It

Disaster Recovery Plan, DRP

As I read the news and see images of the recent carnage caused by spring tornados all over the south-central United States,  I can’t help but be reminded that June 1st, the official start of the 2014 hurricane season, is now only 14 days away. If you are unlucky enough to have your building hit by a … Read moreYou Can’t Live Without It

Get “Replicated”

disaster recovery button

Backup technology is one of the areas of IT infrastructure that has seen some of the biggest changes in the last 5 years.  Tape backup has long been the standard in the industry for maintaining point-in-time snapshot backups. This method has been almost completely replaced by disk-to-NAS backups. Disk-to-NAS backups have many advantages over the … Read moreGet “Replicated”

Urgent: Protect Yourself Against Heartbleed

heartbleed bug icon

April 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, … Read moreUrgent: Protect Yourself Against Heartbleed

Cloud Safety Presents New Options for Businesses

cloud security icon

Admit it, you’ve thought about moving some of your computing infrastructure to the cloud, but just couldn’t take the leap because there is a perception out there that suggests cloud-based computing systems are less secure than the ones that you house within the confines of your office. The fact of the matter is that every piece of computing infrastructure … Read moreCloud Safety Presents New Options for Businesses

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.