The Case of the Talking Computer

Potential customer calls yesterday evening requesting information about anti-malware protection for his 14 year old son's computer. After some conversation, the father assisted me with gaining remote access to the son's computer. Once I was able to see the screen, it was full of pornographic images. I could hear, through the phone a half dozen [...]

By | 2017-12-21T12:12:15+00:00 December 21st, 2017|Business, Business Continuity, Security, Services|0 Comments

10-part series CyberSecurity for the Small Business – Introduction

Cybersecurity experts often refer to the 10/90 rule. The rule suggests that 10% of cybersecurity is reliant upon technology such as firewalls, anti-virus software and related tools. 90% of cybersecurity is up to the users. This past September (2017), the IRS released they were receiving reports of data breaches with tax professionals at the rate [...]

By | 2017-11-10T17:36:57+00:00 November 10th, 2017|Business, Policies, Procedures, Security|0 Comments

Another Ransomware Attack Raging Across Europe

And ... Here we go, again. Another Ransomware attack is raging across Europe, right now, and has hit at least one US business.  Here is the basics of what you need to know:  The Petya virus is successfully detected by only a few of the tested anti-virus softwares. Webroot (which I offer to my clients) [...]

By | 2017-06-27T11:49:02+00:00 June 27th, 2017|Backups, Business, Monitoring, Policies, Procedures, Security, Services|0 Comments

To Cookie or Not To Cookie

There are a lot websites that we visit daily who put 'cookies' on our computers and into our browsers. In reality, cookies are a small slice of data stored in a file on your computer. The cookie is used as a part of tracking software that can collect valuable information about you. These valuable pieces [...]

By | 2017-06-05T13:06:11+00:00 June 5th, 2017|Business, Policies, Security, Services|0 Comments

How-To Protect Against Ransomware

Today in a networking meeting, I was asked "What is the best way to protect against these ransomware threats?" As an I.T. guy, my immediate answer was … well, sarcastic. Something about air-gapped systems with no internet access and so on. In reality, not a practical, though accurate answer. Fortunately, Stephanie understood I was giving [...]

Why WannaCry was so easily spread

This past weekend, May 13th of 2017, the WannaCry ransomware virus spread like wildfire, around the planet. Worming it's way form machine to machine, the WannaCry virus used a network vulnerability in the Windows Operating System. A vulnerability that Microsoft had already released a patch for, the previous February. WannaCry infected thousands of computers, including [...]

By | 2017-05-15T10:37:33+00:00 May 15th, 2017|Backups, Business, Business Continuity, Policies, Security, Services|0 Comments

10 Reasons to get a Tune-Up

If your company has never had a Network Tune-Up then you may not realize all of the immediate benefits that you will receive upon its completion. Below are ten of the most compelling benefits to your company. As you know, a tune up will not solve all problems. The tune up catches problems early, before [...]