Chicago IT Support Blog

It May Be Time to Outsource Your Computer Support

Posted by Steven Thom on Mar 19, 2017 2:25:58 PM
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion.

"prevention is better than cure"

-Erasmus

Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some cable connections, and the job was essentially done. The situation has changed dramatically in recent years, with proliferation of threats such as:

  • Viruses
  • Malware
  • Ransomware
  • Password stealing Trojans
  • Spearfishing attacks
Read More

Topics: 0-day, antivirus, breach, business continuity planning, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, exploit, hacker, Healthcare IT, Hipaa, Hippa, malware, medical, patch, PCI, PHI, privacy, Security, virus, viruses, vulnerability, zero-day, natural disaster

Lessons learned from the Target PCI Breach

Posted by Steven Thom on Feb 15, 2014 1:51:31 PM

More information has been trickling out regarding the massive Target PCI breach that took place during the 2013 Christmas shopping season. Forensic researchers first learned that hackers penetrated Target's network by means of a business transaction portal. It appears that Fazio Mechanical Services was the source. Fazio is a Pittsburgh-area nationwide mechanical contractor that services many large retailers. Now more details are emerging about the mechanism hackers used to infect the HVAC contractor. There are serious lessons here that businesses of all sizes need to learn. It's safe to say the face of PCI compliance will forever be changed as a result of the findings.

Read More

Topics: 0day, breach, business continuity, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, disclosure, exploit, firefox, firewall, hacker, homeland security, internet, internet explorer, java, Mac, malware, PCI, privacy, security, Security, software, update, virus, vulnerability, zero-day

Defend Against the CryptoLocker Virus

Posted by Steven Thom on Nov 16, 2013 7:39:06 PM

The "CryptoLocker" virus has been making a great deal of noise lately. Though we at Thom Infotech have not personally encountered it, we know others who have. We've written this post to help you to understand and defend against the CryptoLocker virus.

Read More

Topics: 0day, adobe, breach, business continuity, Business Continuity, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, cryptolocker, disaster, disclosure, email, encrypt, encryption, ePHI, exploit, explorer, facebook, firefox, firewall, flash, google, hacker, Hipaa, Hippa, homeland security, infection, internet, internet explorer, java, malware, microsoft, oracle, patch, privacy, security, Security, software, update, UTM, virus, viruses, vulnerability, zero-day

WordPress now offers automatic updates

Posted by Steven Thom on Oct 31, 2013 6:37:41 PM

There is welcome news for web developers this week as WordPress now offers automatic updates to the uber-popular web development platform. Starting out as a blogging tool, WordPress has morphed into a full website development ecosystem. Like many, this author has embraced WordPress due to its simplicity, flexibility, and easy search engine optimization.

Read More

Topics: 0day, adobe, Apple, breach, chicago computer support, chicago IT support, Chicago PC Support, disclosure, email, exploit, firefox, firewall, flash, hacker, Hipaa, homeland security, internet, internet explorer, java, Mac, malware, microsoft, oracle, privacy, security, Security, software, threat, unpatched, update, virus, viruses, vulnerability, Wordpress, zero-day

Advocate Healthcare HIPAA Breach Results in Class Action Lawsuit

Posted by Steven Thom on Sep 21, 2013 4:02:31 PM

Reports of HIPAA breach incidents are nothing new. HIPAA (Health Insurance Portability and Accountability Act) stipulates that healthcare providers, insurance companies, and those who serve them (also known as "Business Associates") take extensive measures to protect the Protected Health Information (PHI) of their patients. Even the dearly departed are protected from such disclosures. For this reason, the United Stated Department of Health and Human Services (HHS) requires that providers report data breaches that reach a certain threshold. Though disturbing, this is nothing new.

Read More

Topics: breach, chicago computer support, chicago IT support, Chicago PC Support, disclosure, EHR, EMR, ePHI, Healthcare IT, Hipaa, Hippa, medical, privacy, Security

Evernote hack results in forced password change

Posted by Steven Thom on Mar 2, 2013 4:09:12 PM

Evernote is a really cool app. I use it heavily in conjunction with David Allen's "Getting Things Done" system to organize my day and achieve my goals. I also use it for more mundane tasks such as grocery lists. I use it on my PC, my iPad, and my Android phone - it syncs up between devices. I also managed to get my wife to buy into the shopping list idea and we now share a folder between our accounts, syncing the shopping lists to our respective phones. We use the handy checkbox feature to make lists for the various stores we frequent, checking things off as we place them in the cart. It's very cool and I am no doubt the hippest, coolest shopper in the store. In fact I'm sure of it.

Read More

Topics: breach, chicago computer support, chicago IT support, disclosure, email, exploit, internet, patch, privacy, security, Security, update, vulnerability

"Terrific Employee" loses job over USB Memory Stick HIPAA breach

Posted by Steven Thom on Jan 23, 2013 11:17:13 AM

The woman faulted for the latest HIPAA breach of Utah Medicaid data, an account manager for Goold Data Systems, is no longer employed at Goold.

Read More

Topics: EHR, EMR, Healthcare IT, Hipaa, Hippa, internet explorer, medical, privacy, security, vulnerability

"Terrific Employee" loses job over USB Memory Stick breach

Posted by Steven Thom on Jan 23, 2013 11:17:13 AM

The woman faulted for the latest breach of Utah Medicaid data, an account manager for Goold Data Systems, is no longer employed at Goold.

Read More

Topics: EHR, EMR, Healthcare IT, Hipaa, Hippa, internet explorer, medical, privacy, security, Security, vulnerability

MA medical billing practice faces Hipaa penalties

Posted by Steven Thom on Jan 15, 2013 4:32:31 PM

Former owners of a Marblehead-based medical billing practice and four pathology groups have agreed to collectively pay $140,000, settling allegations that sensitive medical records and confidential billing information for tens of thousands of Massachusetts patients were improperly disposed of at a public dump, Attorney General Martha Coakley announced today.

Read More

Topics: chicago IT support, disclosure, Healthcare IT, Hipaa, Hippa, medical, privacy, vulnerability

Java 6 support to end in February 2013

Posted by Steven Thom on Dec 10, 2012 8:21:06 PM

Oracle has announced that the end-of-life (EOL) of Java SE 6 has been moved from November 2012 to February 2013. This is to give organizations small and large more time to transition to Java SE 7. This is the second EOL extension given to Java SE 6, the original EOL date being July 2012. The last publicly available release of Java SE 6 will be in February 2013 with the release of Java SE 6u37.

Read More

Topics: chicago computer support, chicago IT support, chrome, disaster, email, exploit, explorer, firefox, google, Hipaa, internet, internet explorer, java, malware, microsoft, oracle, patch, privacy, security, Security, software, update, virus, viruses, vulnerability, zero-day

Need Help Now? Click Here!

Chicago IT Support

Great IT support for the Chicago area and beyond

Thom Infotech has been providing quality IT support for the Chicago area and beyond since 2000. We deliver proactive IT services that improve security and reliability. Our flexible pricing plans make it possible for small to medium businesses to leverage enterprise-grade solutions for security and business continuity.

Contact us for:

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all
Real Time Web Analytics