Cyber-Attacks

  Cyber-Attacks   Small- and medium-sized businesses (SMBs) are the prime targets for cyber-attacks because they tend to be easier targets. They’re often less secure and unprepared for attack. Think about burglars that go after houses where they know no one is home. With more cyber crime automation and the rise of hacking kits, the […]

Windows 7 Updates… Causing hardware issues!

Many users have reported recent hardware issues related to the Windows 7 updates. Check out below the symptoms, cause, and what you can do about it. Symptom: Not being able to use a device, connect to the internet, or you see an error related to your hardware. These devices could include network adapters, your mouse, keyboard, […]

Critical PC Chip Security Vulnerability Found

ISSUE Computer researchers have recently found out that the main chip in most modern computers—the CPU—has a hardware bug. It’s really a design flaw in the hardware that has been there for years. This is a big deal because it affects almost every computer, including workstations and servers (and yes, even Apple iOS and MACs!) […]

Email Flows and Woes

Many of us live in our email inbox as we communicate with the world.  We expect that, when we hit that send button, our very important message will be delivered.  Then you see something like this: “The message or attachment did not reach the intended recipient(s). Please contact your help desk for assistance” This week McAfee […]

Alert! Cyber Phone Scams

As technology advances in the industry, many companies are looking for the best competitive edge.  Some companies go above and beyond to provide the greatest service possible to their clients.  Unfortunately, there have been more concerns about scams via phone calls and other sources. We’ve had a number of clients receiving phone calls (sometimes multiple […]

Beware of Ransomware

If you haven’t heard of this phrase, it describes software that is run on a computer and it’s goal is to encrypt your files and then pop up an alert that wants to extort you (the user) into paying to “unlock” your files. This type of Malware has been called a number of different names; […]