BLOG

Mar
06
Product Review: TrackR™ bravo

temp-post-image

This product review is a combined effort from one of our staffers, Ryan. This is a product that we now both use and has been a huge time saver.

WHAT IS IT?

It’s called TrackR™ and it’s that device you always wanted for when you lose your; keys, wallet, remote control, keys, fill in the blank… It connects with your smartphone or tablet via Bluetooth. Then via their app, you can locate your lost item or at least show you the last place it was within 30ft of your phone.

WHY ARE WE USING IT?

Who doesn't lose there (fill in the blank) from time to time. This is a product that people have wished for since the beginning of time.

HOW IT WORKS?

The device comes in several different models and sizes depending on the application. We’ve been testing using th...


Mar
06
Self Help For Ransomware

temp-post-image

No More Ransom Project!

Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can’t get to the data unless you pay a ransom. However this is not guaranteed and you should never pay!

The "No More Ransom!" project is a collaboratinon between Europol, the Dutch National Police and Kespersky Lab. If you found you've been the victim of ransomware, your best bet is to recover from backup. If no good backup, try this project.

If you're interested in preventing ransomware or wonder if your current strategy is up to par, give us a call.


Mar
06
Microsoft Ending Support for Many Products in 2017 — Check Your Setup

temp-post-image

Microsoft Ending Support for Many Products in 2017 — Check Your Setup

Microsoft is ending support for many of their older products this year, including certain versions of Word, Excel, and other popular tools. This means they will stop providing security patches, which can leave your computers vulnerable to attacks. We can make sure you are upgraded to supported versions to avoid being affected. Contact us today to review your systems before it's too late. (Microsoft)


Mar
06
How to Know If Your Computer Has Been Hacked

temp-post-image

How to Know If Your Computer Has Been Hacked

Is your computer behaving differently than you are used to? Here are the most common things that you may notice after a computer has been hacked. Share these tips with your friends to help keep them safe. Call us if you're concerned that something doesn't feel right with your IT equipment. (Computer Hope)


Mar
06
Your Webcam May Be Secretly Spying on You — Here's What to Do

temp-post-image

Your Webcam May Be Secretly Spying on You — Here's What to Do

It's true. Hackers can really spy on you with your webcam without your knowledge. Learn what you need to know to protect your privacy. (How to Geek)


Mar
06
Top 5 Tax Season Scams

temp-post-image

Top 5 Tax Season Scams

We've been hearing lately from businesses that some of their employees have received information about their recent tax filing from the IRS, only problem is, they hadn't filed yet... Be on the look out, stay aware and make sure you're browsing safely. Our clients use Webroot for their security platform which embeds browser plugins for safe Internet surfing (Webroot.com).


Mar
06
Analysis: Rethinking cloud architecture after the outage of Amazon Web Services

temp-post-image

Analysis: Rethinking cloud architecture after the outage of Amazon Web Services

With the outage of major Internet players (AWS, Dyn), it's easy to pack it in, head to the beach and wait for things to come back online. If you're not able to get your apps working, maybe your competitor isn't either. If using any cloud applications online for personal or business, chances are they are touching the AWS cloud. This of course makes sense with all things that you get, but then this happens... Now what. Almost all of our clients are approaching cloud technology as a hybrid. Where are your eggs? (GeekWire)


Mar
06
Scary new malware hides in memory, uses DNS to communicate, and spreads through phishing

temp-post-image

Scary new malware hides in memory, uses DNS to communicate, and spreads through phishing

Cisco has a separate threat research group called Talos. They just published a report on a scary new form of malware that’s hard to detect. (KnowBe4)


Mar
06
Microsoft Teams rolls out to Office 365 customers worldwide

temp-post-image

Microsoft Teams rolls out to Office 365 customers worldwide

This something to keep an eye on. Some big names already using the product. Not sure if this is SMB down market ready. If your SMB is not already using a collaboration platform, then this is something to definitely consider. We'll be testing in house and will report back.


Mar
06
High Success Rates of Phishing Attacks

temp-post-image

End users are the weakest link when it comes to security. What's your plan for when your employee let's in a network attack? With stats like these, it's not if but when. Having top rated endpoint security is only part of the equation. Educating your employees on identify phising attacks is where your security plan should start. Like any good strategy, you don't want a live event to be your first practice run. Don't have a plan? That's OK, let us help you develop one.

http://www.novustek.net/webroot-secure-anywhere