shadow
There’s no shortage of IT providers in the area.

There’s no shortage of IT providers in the area.

View our quick (2-minute) read to help you make your decision.

If you use a Cisco firewall or router to protect your digital assets, it’s time to check your equipment. Cisco recently released a security advisory that covers three of its popular, widely used pieces of equipment: The RV 110W Wireless-N VPN Firewall The RV 130W Wireless-N Multifunction VPN Router The RV 215W Wireless-N VPN Router […]

Now, you have another very good reason to upgrade to Windows 10. If you refuse to do that, then at the very least, you have a very good reason to move away from versions of Windows that are no longer receiving critical security updates (Windows XP, Windows Server 2003, etc.). A devastating security flaw has […]

If you use Citrix’s “GotoMyPC” remote desktop service, you’re going to have to change your password the next time you log on. The company was hit with what it describes as a “very sophisticated attack,” and it’s not taking any chances. Because they’re not sure how many user accounts may have been compromised, they’re forcing […]

The University of Calgary recently submitted to the will of hackers and ponied up $20,000 to get their files back after more than 100 computers were locked via ransomware. Almost every security expert agrees that paying such a ransom is the wrong move, but the university felt that it had no choice. They did not […]

Once more into the breach with Twitter. A company called LeakedSource claims to have gotten its hands on a database containing some 32 million Twitter passwords associated with accounts via email (rather than user name). Although per the company’s information on the database, most of the passwords come from Russia, it certainly wouldn’t hurt to […]

The recent revelations about hundreds of millions of user names and passwords showing up for sale on the Dark Net from sites like Twitter, LinkedIn and MySpace has sent ripples of uncertainty through the entire digital world. If the data breaches of those companies were so much larger than it was originally thought, what other […]

More and more business are migrating increasing amounts of data to the cloud. That’s generally seen as a good thing, but there’s a fly in the ointment. The cloud, which is regarded by many to be safer and generally more secure, is seeing a rise in malware infected files. This information comes to us courtesy […]

If you have a Samsung desktop or laptop and are still running some version of Windows 7, hold off on upgrading, at least for now. Despite having more than two years to get their drivers in order, the company still isn’t ready, and some users who attempt to upgrade to Windows 10 from version 7 […]

Another month, another Flash vulnerability. This time, it’s designated as CVE-2016-4171 (details here: https://helpx.adobe.com/security/products/flash-player/apsa16-03.html ). This is yet another critical vulnerability, identified by Kaspersky Labs. So far, this hack has been spotted in the wild, being used in limited, targeted attacks. If successful, a hacker can crash your system, then take control over it when […]

TeamViewer, the company behind a popular remote desktop platform, which allows users to share their screens, access their computers remotely, or participate in online conferences, has been hacked…maybe. A little over a month ago, the company received reports from a cross-section of users who claimed that their accounts had been accessed by unauthorized users. The […]