Call Us Today at: 503-850-3055

Blog

iCloud For Windows Adds Cloud Password Access And Management

iCloud For Windows Adds Cloud Password Access And Management

August 27, 2021BlogNo Comments »

Version 12.5 of iCloud for Windows is now out and features a small but important upgrade. The new version adds password access and management features. These allow users to manage passwords that have been saved in the iCloud from a Windows-based machine. The management features you will find here are pretty bare bones which makes it similar to Apple's Chrome...

Read More

End to End Encryption Comes Facebook Messenger

End to End Encryption Comes Facebook Messenger

August 26, 2021BlogNo Comments »

Facebook has recently announced an important addition to its Facebook Messenger app. Most popular communications platforms utilize end-to-end encryption (E2EE). These include Zoom, Microsoft Teams, and even Facebook's WhatsApp. Until recently Facebook's Messenger app was a notable holdout. Although popular it simply wasn't as secure as the others mentioned above. Facebook has now changed that by finally adding E2EE to...

Read More

Change Your NAS Device Password To Avoid Ransomware Attacks

Change Your NAS Device Password To Avoid Ransomware Attacks

August 25, 2021BlogNo Comments »

A NAS manufacturer based in Taiwan called Synology recently issued a warning to its customers relating to the StealthWorker botnet. This botnet has been targeting a wide range of NAS (Network Attached Storage) devices using simple brute force tactics. Anytime the botnet succeeds in breaching the security of a NAS it will deploy a ransomware payload to encrypt any files...

Read More

Coalition Of Big Names Coming Together To Fight Ransomware

Coalition Of Big Names Coming Together To Fight Ransomware

August 24, 2021BlogNo Comments »

If you're worried about ransomware attacks know that help is on the way. The CISA (Cybersecurity & Infrastructure Security Agency) has announced a partnership with some of the biggest names in tech. The specific purpose of this collaborative effort called the Joint Cyber Defense Collaborative is to put an end to ransomware and other serious cyber threats. In recent years...

Read More

Even Computer Hardware Manufacturers Can Get Hit By Ransomware

Even Computer Hardware Manufacturers Can Get Hit By Ransomware

August 23, 2021BlogNo Comments »

Retailers, hospitals and financial institutions tend to be the targets of choice for the hackers of the world. Of course they're not the only targets. The simple truth is that any company can find itself in the cross hairs of a hacker. The most recent victim is Taiwanese motherboard manufacturer Gigabyte. In addition to shutting down manufacturing operations in Taiwan...

Read More

Google Working On One Tap Solution To Password Issue

Google Working On One Tap Solution To Password Issue

August 21, 2021BlogNo Comments »

Internet users are notoriously bad at selecting secure passwords for the sites they frequently use that require a login. Surveys reveal that more than a third of internet users are in the habit of using the same password across multiple sites. The danger is that if a hacker breaches one of your accounts then many of your others may be...

Read More

How Co-Managed IT Could Save Your Company From Financial Disaster

How Co-Managed IT Could Save Your Company From Financial Disaster

August 20, 2021BlogNo Comments »

When you consider the investments in your business that you can make as a CEO, you probably think to yourself, “Which investments will give my company the best ROI?” With that in mind, would you think of making a significant investment in bolstering your IT department? Many CEOs are understandably hesitant to throw a lot of money into their IT...

Read More

New Stalkerware Tracks The Location Of Its Victims

New Stalkerware Tracks The Location Of Its Victims

August 19, 2021BlogNo Comments »

A startling revelation was made at the recent Black Hat cybersecurity conference in Las Vegas, Nevada. The ongoing pandemic has given rise to a new threat named Stalkerware. It is defined as apps (both malicious and mundane) that are being used increasingly to coerce and control individuals. Stalkerware is used mostly by one intimate partner against another which makes it...

Read More

Older Industrial Technology May Have Security Risks

Older Industrial Technology May Have Security Risks

August 18, 2021BlogNo Comments »

The vulnerability of Industrial Control Systems has been getting a lot of press in recent months. That's a good thing because most people don't spend much time thinking or worrying about such systems. Unfortunately they are among the most vulnerable systems of all. Industrial Control Systems haven't really changed all that much in the past decade or two. The protocols...

Read More