by Roger McClelland | Apr 5, 2023 | Business, Cybersecurity, Disaster Preparedness, Exploit, Managed Services, Threats and Malware |
Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new updates, there are often weaknesses in the code. Hackers exploit these. Software makers then address the vulnerabilities with a security patch. The cycle...
by Roger McClelland | Feb 25, 2023 | Disaster Preparedness, Exploit, Threats and Malware |
In recent news, a new threat actor referred to as TA886 has been discovered by Proofpoint targeting organizations in the United States and Germany using custom malware called “Screenshotter.” This malware takes screenshots of the victim’s machine and sends them...
by Roger McClelland | Aug 29, 2019 | Disaster Preparedness, Tips and Tricks |
As a storm approaches, it’s important to prepare and make sure that you and your family stay safe. One major step is to make sure your computing devices are in good working order and that you have all the necessary documents in a safe place. Here’s a list...
by Roger McClelland | Aug 10, 2019 | Back Ups, Business, Cybersecurity, Disaster Preparedness, Managed Services, Productivity, Threats and Malware |
In today’s digital world, businesses of all sizes rely heavily on technology to function and grow. However, managing and maintaining technology infrastructure can be a daunting task for businesses, especially for those without an in-house IT department. This is...
by Roger McClelland | Aug 10, 2019 | Business, Disaster Preparedness, Hardware Tips |
Surge protectors are essential in safeguarding your electronic devices from power surges, spikes, and other electrical disturbances. However, choosing the right surge protector can be a daunting task. Among the various factors to consider when selecting a surge...