Ransomware continues to be a major threat and a new variant called Locky is spreading. It’s named “Locky” because it renames all your files with the .locky extension after it encrypts them. And in case you’re not familiar with this type of virus, the decryption key is offered for sale to you by the crooks […]
If your surge protector or UPS is more than 3-5 years old, it may not be providing much protection. The bottom line is that these devices don’t last forever and should generally be replaced every 3-5 years or after a major power event. Surge protection is essentially circuitry that absorbs the hit of an electrical […]
The holidays are a time when people buy new laptops. If its’ been a few years since your last purchase, then you may be baffled by the new hard drive configurations available. Check out this article for some insight into traditional rotating drives, SSD and hybrids.
Just announced, a pretty serious bug has been found in the Microsoft PowerPoint that could allow hackers to remotely execute malicious code on your computer. You can read the details here. The short advice: Be very careful opening a PowerPoint email or content you find on a website until a patch is available. Expect a […]
Thinking of getting a new business printer? The HP LaserJet Pro MFP M476nw pictured here is an outstanding unit. But always check the Duty Cycle when selecting a printer… then divide it by 20! The monthly duty cycle is really the maximum number of pages you should ever attempt to put thru the printer in […]
Shellshock is just the latest vulnerability discovered that may allow hackers to exploit a machine running the Bash command-line interpreter. Bash is common on many versions of Unix, Linux, BSD and Apple. Bash can also be found on other systems from Windows to Android, but it is not installed and/or used by default. Click here to […]
Exelos partner TrendMicro recently published a good article explaining several common backdoor techniques and the role of backdoors in targeted attacks. Backdoors are applications that open up computers to remote access. Unprotected networked computers can give attackers opportunities to issue silent commands to infected computers, allowing them to spy on online conversations, access infected sites, […]
Is you business using VoIP yet? If not, why not? Besides the fact that PSTN is dying and as it does, getting more expensive to cover the cost of maintaining antiquated technology, VoIP is over 20 years old and a mature technology. Yet studies show that many still believe that VoIP doesn’t offer cost savings, […]