Nasty malware can bypass Windows 10 security

December 16th, 2019

Researchers have discovered a type of malware that can easily bypass the security protocols of Windows 10. This malware is a new variation of ransomware called Snatch, and it comes with an added data stealer component. Designed to target corporate networks rather than consumers, Snatch has been modified to reboot your PC in Safe Mode to disable any security programs from initiating.

No ransom: A place for free decryption

September 3rd, 2019

Although a ransomware attack may seem targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, and the further it goes, the more resources are allocated to fighting it. If your data is held hostage, refer to this list of free decryptors you can use.

9 Cybersecurity terms you need to know

May 28th, 2019

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or consulting your tech support.

Every business needs an MSP for cybersecurity

March 22nd, 2019

Businesses can no longer afford to relegate cybersecurity to the bottom of the budget, not with cyberattacks targeting any business regardless of size, strict security, and privacy regulations surrounding data. Businesses with a small or limited budget have the advantage of partnering with a managed IT services provider (MSP) for their cybersecurity needs.

Setting up your new laptop with Windows 10

May 30th, 2018

First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you're all done, right? Not really. Your notebook isn’t ready -- until you do some tweaking. Let's get the ball rolling.

#1 Check for updates

Your new laptop should check for updates automatically, but you can also check manually.

Fighting ransomware with virtualization

February 2nd, 2018

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions.

Big gains for small-business IT in 2017

January 2nd, 2018

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past.

Watch out! More ransomware attacks incoming

September 4th, 2017

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks.

New Locky ransomware: what you need to know

August 30th, 2017

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

How will blockchain affect healthcare?

July 31st, 2017

New IT trends are usually equal parts exciting and confusing. Today, that generalization describes blockchain technology perfectly. It’s a complex concept that has the potential to totally revolutionize every industry -- including healthcare. Even if you have no plan to invest in blockchain soon, you need to understand what it is.