Posts Tagged ‘tech support’

 

Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.
Continue reading ‘Can you Trust the Kindness of Tech Support Strangers?’


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling. Continue reading ‘Patching Nightmare – Please Forward to Your IT Pros’


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, Continue reading ‘Three Serious Trends to Watch Out for in Cyber Security’


Major Flaw in Computer Processors Affects Security

A security vulnerability, that has existed for 10 years, has only recently been discovered. Continue reading ‘Major Flaw in Computer Processors Affects Security’


Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Continue reading ‘Protecting and Restricting iPads, iPhones, and Android Devices’


About Half of All Breaches are Caused by a Contractor or Service Provider

In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Continue reading ‘About Half of All Breaches are Caused by a Contractor or Service Provider’


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. Continue reading ‘One Setting Can Protect Your Network from Ransomware’


Mac Vulnerability Permits Unauthorized Login

Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  Continue reading ‘Mac Vulnerability Permits Unauthorized Login’


A Secret Operating System is Running Inside Your Computers

If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. Continue reading ‘A Secret Operating System is Running Inside Your Computers’


Portable Radios Can Replace Family Phones

This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. Continue reading ‘Portable Radios Can Replace Family Phones’