Edward Snowden Tackles Phone Security

When Edward Snowden met with reporters in a Hong Kong hotel room to reveal NSA secrets, he famously asked them to put their phones in the fridge to block any radio signals that might be used to secretly activate the devices microphones or cameras. It’s fitting then that 3 years later he has returned to […]

USB Lock; An Innovative Solution

The ways criminals gain access to your personal information and passwords are ever changing. But a timeless staple has been the keylogger, a low maintenance, hard to detect alternative way into your machine. These devices do exactly what it sounds like, they log and store every keystroke you make with your keyboard.   The true […]

What Protek Does to Shield You From Ransomware

April saw the largest increase in Ransomware attacks in the history of the malware, an increase of 159% from just the previous month. But the prevalence of Ransomware is not a new occurrence; the malware has been slowly increasing in popularity with an average increase in usage of 9-20% each month.   Ransomware is especially […]

MicrosoftTeams-image

IT support in Salt Lake City.

Modern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, presenting a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called […]

Terrorists Get Their Wings Clipped

Twitter

Twitter has announced that since mid-2015 they have clipped the wings of over 125,000 twitter accounts advocating or promoting terrorist acts. Most accounts primarily relating to ISIS (the self-named Islamic State), have been flooding the social media platform. With the tail end of 2014 seeing 46,000 accounts advocating terrorism, now the numbers are in the […]

What do Your Employees Have Access To?

It’s clear that your IT department should have administrator privileges with your business’s technology, but the average employee is another story altogether. Administrator privileges provide users with the ability to do many things, such as install programs and access admin settings. Administrator privileges are exactly what you want to keep users away from, and it […]

Data Breaches are in, Your Information is Out

IT support in Salt Lake City

2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to […]

Social Engineering: Not All Hackers Target Technology

The nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as “social […]

20210114_124205

Watching Porn at Work

Here’s a statistic that’s going to shock business owners. We hope you’re sitting down for this because we were blown away when we first heard it. Did you know that 70 percent of all online porn access happens during business hours? What does this mean for your company? One thing that we hope this doesn’t […]

Screenshot_20210114-100247_Outlook

Remotely Wipe

A common occurrence in the business world is the employee who wants to use their sweet new smartphone for the purposes of work. The average business owner might be ecstatic that the employee wants to get more done in the day, especially when the device isn’t on the company’s dime. However, some professionals forget that […]