by Laura Peters | Jun 11, 2014 | Blog, Business IT, Computer Security, Virus Protection and Security
There is now an updated variation of Cryptowall, please see this article for updated information. Cryptowall is an imitator of the ransomware, Cryptolocker. Cryptolocker is typically passed through emails that appear to come from legitimate sources and is it executed...
by Laura Peters | Jun 6, 2014 | Blog, Business IT, IT, Tech
Online computer support is a convenient alternative to bringing a computer into a repair shop. So what benefits are there to working with a technician over the internet? How secure is online computer support? Are there limitations to online computer repair? Customer...
by Laura Peters | May 9, 2014 | Blog, Business IT, Computer Security, IT, Virus Protection and Security
Data loss, file encryption, stolen identities, compromised financial information…and the list goes on further. Malware becomes more complex every day, however, the ways that it enters our systems remains persistent. Here are the most common ways that computers get...
by Laura Peters | May 7, 2014 | Blog, Business IT, Computer Security, Internet, Virus Protection and Security
Malware creation and deployment are a global, multi-billion dollar industry. Your computer can either be compromised by criminals to obtain your own financial information, or your computer can be used to aid criminals in illegally gathering information or resources to...
by Laura Peters | Mar 27, 2014 | Blog, Business IT
Microsoft is ending support for Windows XP. As a result, routine security patches will not be released and this means XP machines will have more security vulnerabilities. If you plan to remain on Windows XP after support ends on April 8, here are some tips to keep...