Posts Tagged: Malware
Four Kinds of Phishing Attacks (and what to do about it) A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the…
August 31, 2018 Cyber SecurityBy: Eric Woodard
Cyber Security Threats Business Owners Should Know About
Cyber security is a threat to every business. Criminals are targeting businesses by using spam as a delivery mechanism for dangerous malware. Roughly 200 to 400 thousand Trojans, ransomware, and other malware are delivered to…
April 26, 2018 Cyber SecurityBy: Eric Woodard How ToBy: Eric Woodard
How to Protect Yourself From Harmful Email Attachments
Are you afraid to open email attachments? Wondering how to protect yourself from viruses and harmful malware? From ransomware, key-loggers, and other harmful malware, scammers will do anything they can to lure you into clicking…
July 25, 2017 How ToBy: Eric Woodard
4 Free Tools to Help Fix Your Computer
As a managed IT support provider, we have quite a few tools up our sleeves to help make your computer run faster and better. There are many free tools to fix your computer that even…
February 28, 2017 Cyber SecurityBy: Eric Woodard
Top 5 Security Threats
If you watch television, you may have been swayed to believe that the top security threats on your computer network is intentional sabotage or unauthorized access to data and or equipment. This may hold true…
August 19, 2016 Cyber SecurityBy: Eric Woodard
Sophisticated Spyware Finally Discovered
Smantec and Kaspersky Lab last week separately announced the discovery of a highly sophisticated advanced persistent threat that had eluded security researchers for at least five years. A previously unknown group called “Strider” has been…
August 8, 2016 BusinessBy: Eric Woodard What the Tech?By: Eric Woodard
Feds Attempt Curb of Ransomware
Ransomware has received unprecedented popularity, and healthcare organizations are ripe targets . Criminals know it. In just a few short years, Ransomware has dominated the market, prompting a response from the federal government last week….
Eset announced on Wednesday that it has developed a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files. The criminal group behind TeslaCrypt recently abandoned support for the…
February 27, 2015 BusinessBy: Eric Woodard
Are Your Employees Watching Porn At Work?
Here’s a statistic that’s going to shock business owners. We hope you’re sitting down for this because we were blown away when we first heard it. Did you know that 70 percent of all online…
August 6, 2014 MiscellaneousBy: Eric Woodard
USB Software is Bad to the Bone, Literally
USB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus…
The trend of employees bringing in their own mobile devices to the office and using them for work purposes (BYOD) is growing rapidly. In fact, a new report from Juniper Research forecasts that by 2018,…
April 8, 2014 Cyber SecurityBy: Eric Woodard
What is a Botnet Attack and How Do You Stop It?
Hackers have many different tools at their disposal to access your computer. Some of these tools can even control your machine such as a botnet attack! When a hacker controls your PC, your computer is…