• 888 238 7732
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Blog

Netcotech Blog

This Florida City Will Pay 65 Bitcoins to Get Files Back

273707836_florida_400

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Continue reading
  36 Hits

End of Life for SQL Server 2008 and 2008 R2 Coming Soon

123309551_eol_400

When was the last time you thought seriously about upgrading your business’s technology solutions--particularly its software? We know that administering patches and updates can be challenging for some businesses to maintain, but with the right support, it’s more manageable and certainly more secure. Unfortunately, after a certain period of time passes, Microsoft stops supporting certain outdated solutions, rendering them dangerous and obsolete.

Continue reading
  81 Hits

Sick of Spam Calls? VoIP is Partly to Blame

92570700_anger_400

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

Continue reading
  70 Hits

Mobile Malware is on the Rise

121033144_mobile_malware_400

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

Continue reading
  72 Hits

Is Your Business Leaking Data?

243538626_leak_400

Take a moment and consider the data that you have collected during your business’ operations. How valuable is it to you? What would it mean if it were to leak out of your business’ control?

Continue reading
  91 Hits

When Is a Phone Not a Phone? When It’s a Security Key

184408493_key_phone_400

I’d be willing to bet that your phone is within reach at the moment, assuming you aren’t actively using it to read this blog right now. The tendency that people have to always have their phones on them has contributed to these devices becoming more deeply integrated into work processes - including security, via two-factor authentication. For this week’s tip, we’ll discuss how you can leverage an Android device as an added security measure.

Continue reading
  104 Hits

Google Location Services and How They Apply to the Average User

170087526_googlepin_400

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

Continue reading
  149 Hits

How to Go About Detecting Cryptomining

205527911_cryptomining1_400

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s find out.

Continue reading
  157 Hits

Is Your Business a Target for Internet-Based Threats?

73820691_S_threats_400

It feels like only yesterday when the only action you needed to take to protect a computer was to install antivirus software. Back in the year 2000, there were around 50,000 known computer viruses. Today, that number is over 185 million unique malicious threats.

Continue reading
  142 Hits

How to More Securely Utilize Your Email

keep_email_safe_400

Studies have shown that email still has a safe place in the business world, with an estimated 124.5 billion business emails sent and received each day. However, are the emails that your business is actually receiving safe? If you aren’t adopting the following practices in your daily business operations, they probably aren’t.

Continue reading
  141 Hits

Considering Payment Cards and Business Use of Them

secure_pay_card_400

People use all types of payment options. With more people moving away from cash as a payment option, businesses have to accept and process more payment card transactions. Depending on your business, it could put you in a very precarious position. Today, we will look at payment card statistics, and how the increase in payment card usage could end up be a devastating problem for the modern business.

Continue reading
  157 Hits

Tip of the Week: NIST Password Guidelines

totw_nist_password_400

Passwords have always been important to businesses, but they are priorities for organizations in certain industries. Government-based organizations in particular need to be concerned about using secure passwords. Of course, not all businesses are government-based, but there’s a thing or two your own can learn about some of their password practices.

Continue reading
  191 Hits

Then and Now: Move Forward with Your IT Security Initiatives

mobile_phone_threat_400

Mobile devices are great tools that allow for enhanced mobility and convenience, but this increased accessibility is also a major detriment in terms of data security. Mobile devices are notorious for being considerable security threats to businesses that utilize them. Therefore, businesses that use mobile devices on a regular basis should absolutely be aware of how they can influence security policies.

Continue reading
  193 Hits

The Unofficial Guide to Comprehensive Google Account Security

google_account_security_400

There is no denying that a Google account is a very valuable thing to have today, and if valuable doesn’t seem like the right word to use, let’s say practical. Business and casual users alike use the wide variety of services for many purposes - but are they doing so safely?

Continue reading
  196 Hits

Scammers Can Use Gift Cards to Target Your Company

scammers_gift_card_400

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

Continue reading
  191 Hits

Tip of the Week: Businesses Fuel Growth with Technology

fuel_growth_400

An IT provider can do a lot for your business, but it can exceed your organization’s expectations in more ways than one. A growing business, however, often runs into issues that need to be addressed regarding its technology. We’ll outline some of the major benefits that technology management from an IT provider can offer for a growing business.

Continue reading
  227 Hits

Intro to Your Tech: Zero-Day

ityt_zero_day_400

While a technology exploit or vulnerability is never a good thing, hearing one described as “zero-day” adds another level of sinister malice to the term. However, it is still important to understand what is meant by zero-day, which is why we are going to review that term below.

Continue reading
  210 Hits

Windows 10 to Have a Major Upgrade in October

windows_10_400

Microsoft’s Windows 10 is a great operating system that many users are finding to be extremely helpful for their everyday needs, but even the most rabid Windows fan will tell you that the constant updates are irritating and disruptive at best. While they do bring with them new features and updates--particularly the large updates that happen twice a year--they do take some time to install. The upcoming update they are releasing in October, however, poses a problem for businesses and users alike.

Continue reading
  247 Hits

Protecting Your Business is Easy with Managed Security Services

managed_security_service_400

Security threats are unfortunately common in the business world of today, and these threats are only getting more sophisticated. In response, more businesses and companies are turning to security professionals to help protect them. We’ll dive into some of the tools that a managed security service provider leverages, and how it can incorporate into a business’ IT strategy.

Continue reading
  248 Hits

Do Browser-Saved Passwords Stay Secure?

pw_secure_browser_400

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

Continue reading
  264 Hits
© 2019 . All Rights Reserved. The IT Communication Group Inc Netcotech