If an email phishing attempt is successful there are two general things that can happen. Generally, the most common is sensitive information is gathered about accounts that you hold, and less common is something gets installed on your computer that can perform various actions without your knowledge. Read on to learn more about how to protect yourself... Information Can be Recorded The information that is recorded from you depends on the attacker. If your login credentials are recorded, the … [Read more...] about How Email Phishing Can Harm You and How to Recognize Scams
Computer Security
September Newsletter: Security Measures and Practices
Security in an office network has always been incredibly important, but now it seems more important than ever. Ransomware is becoming increasingly more threatening as it affects larger and larger targets at an increasing rate. As such, most IT service providers and MSPs (managed service providers) have been focusing harder on making sure that the state of their client's network security is top notch. However, there are a few issues that keep their efforts from being completely … [Read more...] about September Newsletter: Security Measures and Practices
Ransomware Protection
No one wants their computer to fall victim to malware. And among the most annoying malware viruses is ransomware. What is Ransomware? Ransomware has a very literal name. First it gets onto a computer, usually downloading on accident from an email or website. Then it will deny access to all data on the computer until you pay a ransom. Unless there's a device scanning the computer for ransomware, it lays dormant for an indeterminate amount of time before locking down the … [Read more...] about Ransomware Protection
May Newsletter: Remote or Local Backup and Ransomware
Last month, we discussed Windows 7, which will be going away soon.This month - Ransomware, which remains a threat. Find more on Blog at GrundigIT.comAs Always, Happy Computing! -- Tom Grundig Ransomware has a very literal name. Once it gets onto a computer, usually by downloading it by accident from an email or website, it will deny access to all data on the computer until a ransom is paid (even paying the ransom may not work). Prevention and Mitigation: CISA (Cybersecurity … [Read more...] about May Newsletter: Remote or Local Backup and Ransomware
Windows Security Software
Anti-virus is somewhat of an essential type of security to have on every computer. Even if you’re confident of your ability to avoid viruses, it never hurts to have. Windows 8 and Windows 10 have a free program called Windows Defender preinstalled as part of the operating system. In almost every case, Windows Defender is enough to secure your computer against viruses, and it needs very little attention to be effective. Older Edition Windows Security However, versions of Windows older than 8 … [Read more...] about Windows Security Software
Firewalls: What, Why, How
Computers, laptops and other devices that connect to the Internet are vulnerable potential targets for a range of different threats. Firewalls are one defense to know about above all others, as a basic foundation of security. What is a firewall? Firewall is a term used to describe a barrier protecting something. Be it protecting a building from fire or a computer network from dangers, firewalls are barriers. In terms of computers, firewalls can either be software or hardware that monitors … [Read more...] about Firewalls: What, Why, How
Why Get a Security Assessment?
There are many specific reasons to get a security assessment: You’ve had a data breach There has been loss of memory or destruction of data A virus has infected your systems Or something else has obviously gone wrong But there is a very large and less pin-pointable reason that every business should have a periodic Network Security Assessment: because you aren’t sure your systems are secure. You hope so. And you think so. At some point in the past you knew that your … [Read more...] about Why Get a Security Assessment?
May Newsletter: Business Computer Security
Greetings! Last month, we discussed Mac vs. PC This time: Computer Security Find more on Blog at GrundigIT.com As Always, Happy Computing! -- Tom Grundig Business Computer Security Computer security has been one of the most relevant and dynamic topics for a number of years. People are wondering how they can make their devices and networks more secure against cyber-threats. Let's talk about computer security practices that you should definitely consider to stay … [Read more...] about May Newsletter: Business Computer Security
5 Tips For Small Business Data Backup
In our last blog, we looked at how data can be recovered in the event a drive is damaged or inaccessible. Rather than trying to retrieve data after it has been lost, a more effective and safe way to preserve your data is to back it up regularly. If you’re a small business, knowing how to safely back up your data can seem overwhelming and confusing. These 5 simple tips can help you protect your valuable business and customer information with effective small business data backup. Get … [Read more...] about 5 Tips For Small Business Data Backup
October Newsletter: Beyond Passwords
Greetings! Last month, we we covered password security and what you need to know about it. This month, we go beyond passwords and examine the latest technology to solve some of the problems associated with passwords. This stuff is evolving fast and merits some attention. Next month, get ready for an overview of the improved Google Calendar as well as Google Backup and Sync (for consumers) and Google Filestream (for enterprises). Find more on Blog at GrundigIT.com As … [Read more...] about October Newsletter: Beyond Passwords