Archive | News

RSS feed for this section

New “Locky” Ransomware In the Wild

Ransomware continues to be a major threat and a new variant called Locky is spreading. It’s named “Locky” because it renames all your files with the .locky extension after it encrypts them. And in case you’re not familiar with this type of virus, the decryption key is offered for sale to you by the crooks […]

Do Surge Protectors and UPS’s Wear Out?

If your surge protector or UPS is more than 3-5 years old, it may not be providing much protection. The bottom line is that these devices don’t last forever and should generally be replaced every 3-5 years or after a major power event. Surge protection is essentially circuitry that absorbs the hit of an electrical […]

Which Hard Drive – Rotating, SSD or Hybrid?

The holidays are a time when people buy new laptops. If its’ been a few years since your last purchase, then you may be baffled by the new hard drive configurations available. Check out this article for some insight into traditional rotating drives, SSD and hybrids.

Ouch… Another Threat!

Just announced, a pretty serious bug has been found in the Microsoft PowerPoint that could allow hackers to remotely execute malicious code on your computer. You can read the details here. The short advice: Be very careful opening a PowerPoint email or content you find on a website until a patch is available. Expect a […]

Don’t Pick a Printer by Duty Cycle Ratings…

Thinking of getting a new business printer? The HP LaserJet Pro MFP M476nw pictured here is an outstanding unit. But always check the Duty Cycle when selecting a printer… then divide it by 20! The monthly duty cycle is really the maximum number of pages you should ever attempt to put thru the printer in […]

Shellshock – Should I Worry?

Shellshock is just the latest vulnerability discovered that may allow hackers to exploit a machine running the Bash command-line interpreter. Bash is common on many versions of Unix, Linux, BSD and Apple. Bash can also be found on other systems from Windows to Android, but it is not installed and/or used by default. Click here to […]

The Role of Backdoors in Targeted Attacks…

Exelos partner TrendMicro recently published a good article explaining several common backdoor techniques and the role of backdoors in targeted attacks. Backdoors are applications that open up computers to remote access. Unprotected networked computers can give attackers opportunities to issue silent commands to infected computers, allowing them to spy on online conversations, access infected sites, […]

Voice Over IP Myths

Is you business using VoIP yet? If not, why not? Besides the fact that PSTN is dying and as it does, getting more expensive to cover the cost of maintaining antiquated technology, VoIP is over 20 years old and a mature technology. Yet studies show that many still believe that VoIP doesn’t offer cost savings, […]