News

Are You in Danger When Searching the Internet?

Research recently released by antivirus vendors Mcafee and Panda suggest that searching for certain key words on Internet search engines can prove dangerous.Hackers and malware authors have become adept at Search Engine Optimization and are using frequently searched key words to create sites that will rank favorably in search engines, but are a host for malware or phishing attacks. According to the report, many popular search terms are targeted, such as: lyrics downloads, free downloads, swine flu, and rihanna . Users are urged to always protect themselves by using patched systems and updated protection tools such as antivirus software. We can help you make sure you’re protected when surfing the Internet – give us a call today. Related articles: McAfee Finds Lyrics and Free Download Searches Most Dangerous Search Keywords The Riskiest Search Terms On The Internet | WebProNews Danger lurks in screensaver searches: internet security report

Are You in Danger When Searching the Internet? Read More »

SMBs poised to rebound when economy turns

A new study, “ Understanding Growth Priorities of Small and Medium-sized Businesses ” conducted by the Economist Intelligence Unit and sponsored by services company Verio, finds that 83 percent of small-business executives are optimistic about their potential for growth once the economy turns.More than half of the respondents believe there will be a worldwide economic upturn by the middle of next year. One-quarter expect to see the global economy begin to recover by the end of 2009 and 34% anticipate a rebound by mid-2010. An interesting insight from the study reveals the expected role of technology in the recovery. Approximately 57 percent of the executives surveyed “agree” or “strongly agree” that technology will be a huge deciding factor in their ability to emerge successfully from this recession. About 20 percent said they would invest more heavily in innovative technology to help them surpass their competitors. Are you one of them? Give us a call and we’ll help you explore ways technology can help your company grow. Related articles: Small Businesses: Hopeful of the future? Survey: SMBs poised to rebound when economy turns

SMBs poised to rebound when economy turns Read More »

Get Ready for a New Threat: Vishing

Tech-savvy criminals have thought of with a new way of scamming us out of our money. In a twist to “ phishing ” (when spoofed websites are used to trick users into surrendering passwords or credit card numbers), “vishing” is when phone calls using spoofed caller ID numbers hide the identity of the caller and trick people into surrendering sensitive information. Usually, vishing attacks play a recorded message that tells users to call a toll-free number, where they are asked via an automated attendant to punch in a credit card number or other personal information. Attacks are on the rise since with Voice over IP phone technology, caller ID spoofing is very easy to do.Protect yourself by registering your number with the National Do Not Call registry at donotcall.gov . Some criminals and unscrupulous telemarketers may ignore the list, and if you continue to get calls, it’s a tip that the offer is bogus. Contact the authorities immediately if you do get scammed, and always play it safe and don’t surrender your information to unknown sources. Related articles: Can You Trust Your Caller ID? 123Spoof Makes Caller ID Spoofing Easy 9 Simple Ways to Protect Yourself against Internet fraud

Get Ready for a New Threat: Vishing Read More »

Hackers Launch Cyber-Offensive Against American and South Korean Sites

Last July 4th and 5th, a massive denial-of-service attack was launched against several government and commercial websites in the United States and South Korea. According to security researchers, the attacks were the work of malware that infected PCs and routed traffic to government and commercial sites during the July 4 weekend in an attempt to take them down with the flood of simultaneous requests hitting them. Among those affected were the U.S. Department of Treasury, the Secret Service, the Federal Trade Commission, and several others. The attacks, which hit South Korean sites a few days later on July the 7th, are widely believed to have been carried out by an updated version of the MyDoom worm which gained infamy when it first hit Windows machines last 2004. The motive for the attack is not yet known. In the meantime, users are advised to scan their machines and update their operating systems to protect against known vulnerabilities. Contact us to learn more about protecting your business from a similar attack. Related articles: Mysterious cyber-attacker hits at federal websites, crisis averted? Cyber Attack Targets Government Websites Who’s behind cyber assaults?

Hackers Launch Cyber-Offensive Against American and South Korean Sites Read More »

Dual Boot Windows 7 and Vista on One Machine

Excited about Windows 7 but unsure if you want to replace your existing Vista installation? Worried about potential compatibility and driver problems with the Windows 7 beta or release candidate? Why not install both on the same machine? Microsoft has posted an interesting article on how to have both Vista and the upcoming Windows 7 Beta or Release Candidate on the same machine by dual booting from one operating system to the other. Be sure to check out the system requirements for Windows 7 ensure your system is up to the challenge. Generally speaking, if your system can handle Vista then it will likely have no problem with Windows 7; however, you’ll need ample space on your hard drive to have both running. Check out the article at Microsoft’s Technet website. Not sure how (or why) to do it? Contact us – we can help! Related articles Windows 7 testers have long path to upgrade Can a Windows Vista PC Run Windows XP Instead? Windows 7 release date announced

Dual Boot Windows 7 and Vista on One Machine Read More »

SMBs Buy and Use Software Differently

Surprise, surprise! According to Forrester Research , an analyst firm, small businesses buy and use software differently than their larger brethren. More than 2,200 IT executives and technology decision-makers in North America and Europe were polled, and the findings show that: small businesses are more likely to purchase software than build their own they are wary of open source software because of security and support issues interest in SaaS is growing but total cost of ownership is a concern they are more optimistic than big businesses and will allocate a greater portion of their IT spend on software These conclusions come from the recent Forrester Research report The State Of SMB Software: 2009 and data from Forrester’s Enterprise and SMB Software Survey “Enterprise Versus SMB: Who Influences Your Software Purchasing Decisions?” and “Software Budget Outlook And Preferred Purchasing Channels By Company Size: 2008 To 2009”. You can purchase the research at Forrester’s website or go to bMighty to read a summary . Do you agree with the findings? Let us know – we’re interested in what you think.

SMBs Buy and Use Software Differently Read More »

Do Your PCs Host Dangerous Apps?

New research from security firm Secunia reveals that the average PC user has over a dozen insecure applications on his or her computer. They found that the typical user installs over 80 applications on his or her desktop, and around 15% are vulnerable to attack due to failure to patch the applications in a timely manner. Vendors normally release updates or patches to fix known vulnerabilities in their applications. This is an acute problem for software which connects to the Internet, especially if it hosts sensitive or private data. Only 2% of users make it a point regularly update their applications. For businesses, the problem could be greater with the need to manage multiple PCs. Protect your network today by letting us implement software patch management tools to manage and automate this process for you. Related articles: Keep your software up to date with Secunia Personal Software Inspector Patch management no longer just an IT problem Another year of handwringing on cybersecurity

Do Your PCs Host Dangerous Apps? Read More »

New Swine Flu Outbreak: This Time the Virus may be in Your Computer

As if the scare from the Swine Flu virus were not enough, some opportunistic and malicious hackers have started spreading a computer virus with emails of the same name. Otherwise also known as the Navia.a virus, it seems to have surfaced during the height of the Avian Flu scare. However, the computer virus may have started spreading again. Initial reports from Japan say that the country’s National Institute of Infectious Diseases (NIID) posted on its website that a suspicious Japanese-language email message purportedly coming from them has been circulating with an attached file called “information on swine flu”. The email, originating from senders in the “@yahoo.co.jp” domain, seemed to be sent to random Internet users, the institute said. Users, as always, are advised to avoid opening attachments from suspicious-looking emails to prevent infecting their PCs with malware.While we can’t protect you from the real swine flu virus, we can help you protect your PCs from its new malicious online cousin. Contact us today to find out how. Related articles: Internet flooded with swine flu spam As If Swine Flu Virus Is Not Enough – We Now Have Swine Flu Computer Virus

New Swine Flu Outbreak: This Time the Virus may be in Your Computer Read More »

Survey Shows Insider Snooping on the Rise

Cyber-Ark Software, a security solutions company, recently released a survey showing that as much as 35 percent of people within an organization (that’s one out of three) admit to accessing corporate information without authorization. Furthermore, an alarming 74 percent claim they could circumvent the controls currently in place to prevent that access. The study polled over 400 IT administrators at the Infosecurity Europe 2009 and RSA USA 2009 conferences. While certainly a cause for concern, this is not surprising. Because of their technical knowledge and access to sensitive corporate information, internal IT staff are capable of circumventing internal policies and controls. If this is a cause for concern within your organization, don’t delay in giving us a call. We can help you secure your information and computing assets today. Related articles: Infosec 2009: Security must be built in from the start Securing business Slump prompts workplace snooping

Survey Shows Insider Snooping on the Rise Read More »

Big IT Lessons Small Businesses Can Learn

What are the key technology lessons that small and mid-sized businesses can learn from large enterprises? Be proactive. Be prepared. Take security concerns seriously. Always watch for ways to cut costs. That just might sum up the advice that enterprise-grade IT shops would give smaller businesses about how to avoid costly IT mistakes. But what are some specific technology lessons that smaller fry can learn from the big fish? We asked the experts, and here’s a partial list: Read more at Inc Technology…

Big IT Lessons Small Businesses Can Learn Read More »

Scroll to Top