Sales: 844.796.1717   •   Support: 801.999.4767
  • Support Portal
  • Payment Portal
  • Remote Support
Protek Support
  • Utah Managed IT Services
  • Contact Us
  • About Protek Support
  • News
See Service Pricing

Posts Tagged: Malware

July 22, 2020 Cyber SecurityBy: Eric Woodard Tips and TricksBy: Eric Woodard What the Tech?By: Eric Woodard

Four Kinds of Phishing Attacks (and what to do about it)

Four Kinds of Phishing Attacks (and what to do about it) A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the…

READ MORE READ MORE
August 31, 2018 Cyber SecurityBy: Eric Woodard

Cyber Security Threats Business Owners Should Know About

Cyber security is a threat to every business. Criminals are targeting businesses by using spam as a delivery mechanism for dangerous malware. Roughly 200 to 400 thousand Trojans, ransomware, and other malware are delivered to…

READ MORE READ MORE
April 26, 2018 Cyber SecurityBy: Eric Woodard How ToBy: Eric Woodard

How to Protect Yourself From Harmful Email Attachments

Are you afraid to open email attachments? Wondering how to protect yourself from viruses and harmful malware? From ransomware, key-loggers, and other harmful malware, scammers will do anything they can to lure you into clicking…

READ MORE READ MORE
July 25, 2017 How ToBy: Eric Woodard

4 Free Tools to Help Fix Your Computer

As a managed IT support provider, we have quite a few tools up our sleeves to help make your computer run faster and better. There are many free tools to fix your computer that even…

READ MORE READ MORE
February 28, 2017 Cyber SecurityBy: Eric Woodard

Top 5 Security Threats

If you watch television, you may have been swayed to believe that the top security threats on your computer network is intentional sabotage or unauthorized access to data and or equipment. This may hold true…

READ MORE READ MORE
August 19, 2016 Cyber SecurityBy: Eric Woodard

Sophisticated Spyware Finally Discovered

Smantec and Kaspersky Lab last week separately announced the discovery of a highly sophisticated advanced persistent threat that had eluded security researchers for at least five years. A previously unknown group called “Strider” has been…

READ MORE READ MORE
August 8, 2016 BusinessBy: Eric Woodard What the Tech?By: Eric Woodard

Feds Attempt Curb of Ransomware

Ransomware has received unprecedented popularity, and healthcare organizations are ripe targets . Criminals know it. In just a few short years, Ransomware has dominated the market, prompting a response from the federal government last week….

READ MORE READ MORE
May 24, 2016 Cyber SecurityBy: Eric Woodard

TeslaCrypt Ransomware Authors Release Master Key

Eset announced on Wednesday that it has developed a free tool that victims of all variants of the TeslaCrypt ransomware can use to unlock affected files. The criminal group behind TeslaCrypt recently abandoned support for the…

READ MORE READ MORE
February 27, 2015 BusinessBy: Eric Woodard

Are Your Employees Watching Porn At Work?

Here’s a statistic that’s going to shock business owners. We hope you’re sitting down for this because we were blown away when we first heard it. Did you know that 70 percent of all online…

READ MORE READ MORE
August 6, 2014 MiscellaneousBy: Eric Woodard

USB Software is Bad to the Bone, Literally

USB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus…

READ MORE READ MORE
April 8, 2014 Cyber SecurityBy: Eric Woodard

Should Increased Mobile Malware Attacks Deter You from BYOD?

The trend of employees bringing in their own mobile devices to the office and using them for work purposes (BYOD) is growing rapidly. In fact, a new report from Juniper Research forecasts that by 2018,…

READ MORE READ MORE
April 8, 2014 Cyber SecurityBy: Eric Woodard

What is a Botnet Attack and How Do You Stop It?

Hackers have many different tools at their disposal to access your computer. Some of these tools can even control your machine such as a botnet attack! When a hacker controls your PC, your computer is…

READ MORE READ MORE

Recent Posts

  • File Sharing 101 and How to help eliminate risk
  • All about Microsoft Edge and why you should make the switch
  • Why you should use Microsoft Outlook on your mobile device
  • 2021 Hardware Shortages & Delays: What to expect?
  • Your Laptop Was Stolen, What To Do Next?

Archives

Categories

Address: 542 W 9320 S, Sandy, UT 84070
Phone: 801.999.4767