Chicago IT Support Blog

Steven Thom

Recent Posts

Why Us?

Posted by Steven Thom on May 26, 2017 1:35:58 PM

In the crowded Chicago I.T. landscape, why choose Thom Infotech?

Read More

Topics: Business, chicago computer support, chicago IT support, Chicago PC Support, security

The Anatomy of a Recent Fraud Attempt

Posted by Steven Thom on Mar 30, 2017 12:18:53 PM

As a Chicago-area computer firm, we regularly receive emails containing bid requests from complete strangers. In nearly every case the request is fraudulent and the individual making the request is merely trying to get some unsuspecting computer dealer to part with a bunch of expensive materials in exchange for payment from a credit card that later turns out to be fraudulent. Any guess who takes the hit when the fraud becomes evident? You guessed it, the merchant (i.e. me)!

Read More

Topics: chicago computer support, chicago IT support, Chicago PC Support, PCI, Security, cybersecurity, fraud, cybertheft

Are Turkish Hackers planning to wipe your iPhone, iPad, or Mac?

Posted by Steven Thom on Mar 29, 2017 11:34:26 PM

Are Turkish hackers planning to wipe your iPhone, iPad, or Mac on April 7th? Evidently they are. When news of the threat first came out, many didn't take it seriously. After further review, experts are growing more and more concerned. Here's what you need to know.

Read More

Topics: Apple, breach, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Data Backup, hacker, Mac, Security, iphone, cybersecurity

Are you backing up your PC?

Posted by Steven Thom on Mar 28, 2017 6:38:24 AM

Are you backing up your PC? I ask this question because I received a call recently from an old acquaintance. Jack (not his real name) had a problem that was somewhat urgent - his laptop experienced catastrophic data loss. Here is Jack's story.

Read More

Topics: BDR, Business Continuity, business continuity planning, chicago computer support, chicago IT support, Chicago PC Support, critical patch update, cryptolocker, Data Backup, disaster, disaster preparedness, Disaster Recovery, Man-Made Disaster, update, ransomware

What is two-factor authentication (and why should you care)?

Posted by Steven Thom on Mar 26, 2017 8:18:11 PM

Much has been said in recent stories about two-factor authentication (also known as "2FA"), with Instagram, Nest, Apple, Ebay, and many others making it available on their respective websites. A solution that sounded nerdy as recently as a few years ago is starting to sound almost mandatory for average folks. So what is two-factor authentication and why should you care?

Read More

Topics: breach, Business Continuity, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, disaster preparedness, disclosure, hacker, PCI, Security, threat, vulnerability

Should you be worried about the latest Yahoo security breach?

Posted by Steven Thom on Mar 21, 2017 2:59:49 PM

Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be concerned.

Read More

Topics: breach, Business, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, ePHI, exploit, hacker, Healthcare IT, Hipaa, Hippa, infection, malware, security, threat, vulnerability

It May Be Time to Outsource Your Computer Support

Posted by Steven Thom on Mar 19, 2017 2:25:58 PM
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion.

"prevention is better than cure"

-Erasmus

Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some cable connections, and the job was essentially done. The situation has changed dramatically in recent years, with proliferation of threats such as:

  • Viruses
  • Malware
  • Ransomware
  • Password stealing Trojans
  • Spearfishing attacks
Read More

Topics: 0-day, antivirus, breach, business continuity planning, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, exploit, hacker, Healthcare IT, Hipaa, Hippa, malware, medical, patch, PCI, PHI, privacy, Security, virus, viruses, vulnerability, zero-day, natural disaster

Idaho State University fined $400,000 for skipping HIPAA Security Risk Analysis

Posted by Steven Thom on Jun 18, 2013 8:43:35 AM

Skipped HIPAA Security Risk Analysis costs ISU $400,000

Read More

Topics: breach, chicago computer support, chicago IT support, disclosure, EHR, EMR, ePHI, firewall, Healthcare IT, Hipaa, Hippa, medical, PHI, security, vulnerability

Goodbye Windows XP

Posted by Steven Thom on Jun 10, 2013 10:33:16 AM

It's nearly time to say goodbye Windows XP. This past April marked the one year count-down to the eventual discontinuation of support for the venerable operating system (technically on April 8, 2014). What does this mean to you? In short, it's high time you moved on and adopted Windows 7 or Windows 8.

Read More

Topics: 0day, breach, chicago computer support, chicago IT support, exploit, explorer, hacker, internet explorer, malware, Security, software, update, virus, viruses, vulnerability, zero-day

RescueSMB Backup and Disaster Recovery

Posted by Steven Thom on Mar 18, 2013 11:08:54 AM

Read More

Topics: bcp, business continuity, Business Continuity, chicago computer support, chicago IT support, disaster, Hipaa, homeland security, medical, RescueSMB, Virtualization

Need Help Now? Click Here!

Chicago IT Support

Great IT support for the Chicago area and beyond

Thom Infotech has been providing quality IT support for the Chicago area and beyond since 2000. We deliver proactive IT services that improve security and reliability. Our flexible pricing plans make it possible for small to medium businesses to leverage enterprise-grade solutions for security and business continuity.

Contact us for:

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all
Real Time Web Analytics