Blog

/Blog/
16 02, 2017

PCI Compliance and What It Means For Your Business

By | 2017-02-16T10:49:47+00:00 February 16th, 2017|IT News and Info|0 Comments

PCI Compliance The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. The security standard consists of 12 requirements that a business needs in order to be PCI compliant. If your company is not compliant then your business may face significant fines, increased transaction fees, and negative publicity. As part of [...]

26 01, 2017

Ransomware: Protect Yourself Before It’s Too Late

By | 2017-02-16T10:57:31+00:00 January 26th, 2017|Security News|0 Comments

What is Ransomware? Ransomware is a type of malicious software designed to block access to your company's computer systems until a monetary ransom is paid, usually in the form of BitCoins. There are several different types of ransomware but all of them are designed to prevent you from using your computer until the ransom is paid. In many cases, the ransom demand comes with a timer or deadline and if you do not pay before [...]

7 05, 2016

SpyEye Caused $1 Billion in Losses

By | 2016-12-16T13:46:05+00:00 May 7th, 2016|IT News and Info, Security News|0 Comments

Aleksandr Andreevich Panin and Hamza Bendelladj were sentenced last week for developing and selling malware that enabled cybercriminals to steal sensitive data and access bank accounts. Panin received a 9 and a half year sentence and Bendalladj was sentenced to 15 years in prison. SpyEye, the notorious malware that they created, caused $1 billion in losses in the finance industry around the world. Panin and Bendelladj used the aliases Gribodemon and Bx1 online, so you [...]

29 04, 2016

Why Data Security is Important for All Businesses

By | 2016-12-16T13:46:05+00:00 April 29th, 2016|IT Support Tips, Security News|0 Comments

There have been many data security scares in the headlines over the past year. World companies have been hacked and had customer information stolen. This not only angers customers but breaks their trust in your brand. Even if you already invest in network security, you might need a bit more protection in today's world. Here are five reasons you should take data security for your business seriously: You Could Be Unknowingly Hacked for Years Michael [...]

21 04, 2016

Why Your Website Should Be Mobile-Friendly

By | 2016-12-16T13:46:05+00:00 April 21st, 2016|Digital Marketing, SEO News, Website Management|0 Comments

You may have heard the term "mobile-friendly" a few times if you have your own website. It might seem like another buzzword, but it isn't. The fact is you lose traffic when your website isn't mobile-friendly because users have decreasing patience with ill-fitted sites on their phones and Google penalizes sites in mobile search for not being mobile-friendly. Google's Mobile Algorithm Change During April 2015, Google updated its algorithm to place more importance on whether or [...]

4 04, 2016

What is the “Locky” Ransomware? A New Variation on the Worst Malware Today

By | 2016-12-16T13:46:05+00:00 April 4th, 2016|Security News|0 Comments

Everywhere you turn, you read about ransomware becoming far too ubiquitous in infecting computer networks worldwide. What's more shocking is when you see the FBI clearly showing exasperation at how to solve the issue. After recently telling victims of ransomware to pay the ransom to get their files back, it shows there isn't any quick fix available. What's more alarming is we're seeing more variations on ransomware developing that use more insidious means to infect [...]

14 07, 2015

Adobe Flash and Microsoft Windows Vulnerabilities

By | 2016-12-16T13:46:05+00:00 July 14th, 2015|Security News|0 Comments

Original release date: July 14, 2015 Systems Affected Microsoft Windows systems with Adobe Flash Player installed. Overview Used in conjunction, recently disclosed vulnerabilities in Adobe Flash and Microsoft Windows may allow a remote attacker to execute arbitrary code with system privileges. Since attackers continue to target and find new vulnerabilities in popular, Internet-facing software, updating is not sufficient, and it is important to use exploit mitigation and other defensive techniques. Description The following vulnerabilities illustrate [...]

1 06, 2015

Windows 10 Release and Upgrade info

By | 2016-12-16T13:46:05+00:00 June 1st, 2015|IT News and Info|0 Comments

Announced today, June 1, 2015, at Microsoft’s Windows blog: “Hello World: Windows 10 Available on July 29” What are the basic facts of the Windows 10 upgrade? Microsoft is making Windows 10 available as free upgrade for qualified Windows 7, Windows 8.1, and Windows Phone 8.1 devices*. It will be available starting July 29, 2015; people can reserve their free upgrade today. As a starting reference, see Microsoft’s Windows 10 Q&A (ß This provides REALLY [...]

31 05, 2015

End of Life is Near for Windows Server 2003

By | 2016-04-17T14:48:57+00:00 May 31st, 2015|IT News and Info, Security News|0 Comments

Windows Server 2003 support is ending July 14, 2015 What does end of support mean for you? After July 14, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute a migration strategy to protect your infrastructure. By migrating to Windows Server 2012 R2, Microsoft Azure or Office 365, you [...]

25 09, 2014

The ‘Bash Bug’ That Could Be Worse Than Heartbleed

By | 2016-04-17T20:40:02+00:00 September 25th, 2014|IT News and Info, Security News|0 Comments

Security researchers have discovered a vulnerability in the system software used in millions of computers, opening the possibility that attackers could execute arbitrary commands on web servers, other Linux-based machines and even Mac computers. Some researchers say Shellshock, which affects an application called Bash (which is why it's often simply called the "Bash Bug"), is potentially more serious and widespread than the Heartbleed bug discovered in April, though the two vulnerabilities are quite different in [...]