As a Chicago-area computer firm, we regularly receive emails containing bid requests from complete strangers. In nearly every case the request is fraudulent and the individual making the request is merely trying to get some unsuspecting computer dealer to part with a bunch of expensive materials in exchange for payment from a credit card that later turns out to be fraudulent. Any guess who takes the hit when the fraud becomes evident? You guessed it, the merchant (i.e. me)!
Are Turkish hackers planning to wipe your iPhone, iPad, or Mac on April 7th? Evidently they are. When news of the threat first came out, many didn't take it seriously. After further review, experts are growing more and more concerned. Here's what you need to know.
Are you backing up your PC? I ask this question because I received a call recently from an old acquaintance. Jack (not his real name) had a problem that was somewhat urgent - his laptop experienced catastrophic data loss. Here is Jack's story.
Topics: BDR, Business Continuity, business continuity planning, chicago computer support, chicago IT support, Chicago PC Support, critical patch update, cryptolocker, Data Backup, disaster, disaster preparedness, Disaster Recovery, Man-Made Disaster, update, ransomware
Much has been said in recent stories about two-factor authentication (also known as "2FA"), with Instagram, Nest, Apple, Ebay, and many others making it available on their respective websites. A solution that sounded nerdy as recently as a few years ago is starting to sound almost mandatory for average folks. So what is two-factor authentication and why should you care?
Topics: breach, Business Continuity, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, disaster preparedness, disclosure, hacker, PCI, Security, threat, vulnerability
Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be concerned.
Topics: breach, Business, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, ePHI, exploit, hacker, Healthcare IT, Hipaa, Hippa, infection, malware, security, threat, vulnerability
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion.
"prevention is better than cure"
Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some cable connections, and the job was essentially done. The situation has changed dramatically in recent years, with proliferation of threats such as:
- Password stealing Trojans
- Spearfishing attacks
Topics: 0-day, antivirus, breach, business continuity planning, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, exploit, hacker, Healthcare IT, Hipaa, Hippa, malware, medical, patch, PCI, PHI, privacy, Security, virus, viruses, vulnerability, zero-day, natural disaster
Experts say that the car you currently own is far less expensive to operate than a new one. Is this also true when it comes to computers? The car adage is demonstrably true, provided maintenance has been performed on a regular basis.
I recently had a chat with a colleague who recounted his recent experience with a computer he recovered from a local electronics recycling center. His story was a bit shocking and I thought it really deserved a write-up.