Author Archives for Gavin Mish

What is Antispyware?

August 25, 2016 1:19 pm Published by Comments Off on What is Antispyware?

In order to fully understand what anti-spyware is, you must understand what spyware is and does. As we have mentioned before, spyware is a type of malware that can monitor your computer by either tracking the web pages you visit or everything you could be navigating to in order to collect any information available. In order to fully protect your...


Internet Security Myths (Part 2)

August 23, 2016 8:00 am Published by Comments Off on Internet Security Myths (Part 2)

Welcome to the second part of our ‘Internet Security Myths’ series where we highlight myths that have been used to justify why we don’t really need to take further security precautions. Now, let’s continue with the myths… 1.“I don’t need a security system because I don’t access unsafe websites.” It’s true that many websites, emails, and pop-up ads can navigate...


Internet Security Myths (Part 1)

August 18, 2016 8:00 am Published by Comments Off on Internet Security Myths (Part 1)

Many myths have developed over time about Internet security that has been used to justify why we shouldn’t take greater precaution when it comes to security protection. Today, we will be highlighting some of those myths in our two-part series of ‘Internet Security Myths.’ In case you thought this could be irrelevant to you because you’re not “important enough” to...


What’s New with Ransomware?

August 16, 2016 8:00 am Published by Comments Off on What’s New with Ransomware?

Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. It is an access-denial type of attack that prevents legitimate users from accessing files[2] since it is intractable to decrypt the files without the decryption key. The use of ransomware scams has grown internationally. Security software vendor McAfee...


Worst Case Scenarios of Backup Disasters

August 11, 2016 8:03 am Published by Comments Off on Worst Case Scenarios of Backup Disasters

Prepare for the worst, hope for the best.   It is not what business leaders ever want to think about but it is a topic they must consider – worst case scenarios of backup disasters! What do we mean by worst case scenarios? Unfortunately, there is a long list of things that could go wrong and could jeopardize your technology...


Protecting your Technology While on Vacation

August 9, 2016 8:00 am Published by Comments Off on Protecting your Technology While on Vacation

Vacation! You have been waiting all year to kick back, relax and step out of the rat race for a while. You may have travel plans and are finally getting to visit the places you have only dreamed of all year. The last thing on your mind is protecting your technology. While we don’t want to ruin your blissfully happy...


How Often Should Technology Be Upgraded?

August 4, 2016 12:49 pm Published by Comments Off on How Often Should Technology Be Upgraded?

When your company is busy it means that business is good and while there may be funds to do necessary upgrades, there probably isn’t enough time in the day to get it all done. Then, when business is slow, it might mean that the extra funds for upgrades has dried up or been allocated for other projects. It is a...


When Should You Change your Password?

August 2, 2016 12:36 pm Published by Comments Off on When Should You Change your Password?

How often does your company change passwords? Once a month, twice a year? Never? The debate over how often to change passwords rages in the tech community. Some tech experts support regular password changes to avoid hackers and deter attackers from regularly gaining access to your business files and servers, while other experts take the position that password changes don’t...


Challenges of Ransomware

July 28, 2016 8:00 am Published by Comments Off on Challenges of Ransomware

You arrive at work, boot up your laptop and desktop. Instead of your usual screen, however, there is a hostile message. “This operating system has been locked for security reasons” or “You have browsed illicit material and must pay a fine.” Usually the group who has locked your computer demands money or they will destroy all of your business and/or...


Computer Needs – Be Proactive Rather than Reactive

July 27, 2016 8:00 am Published by Comments Off on Computer Needs – Be Proactive Rather than Reactive

We have all worked for, or dealt with companies that seem to be in a constant state of “putting out fires.” The adrenaline rush can be fun for a while but in the end it means that the focus of a business is not on the future but rather preventing a calamity from happening right at the moment.   What...


Most Common Malware

July 26, 2016 8:00 am Published by Comments Off on Most Common Malware

According to CNN Money, there are almost 1 million new malware threats being released daily. If that news isn’t bad enough, they also report that malware is becoming increasingly more creative and hard to detect, even for top enterprise companies. Malware is an abbreviated term meaning “malicious software.” Malware is software that is specifically designed to gain access or damage...


How to Move or Expand your Network

July 21, 2016 8:00 am Published by Comments Off on How to Move or Expand your Network

Moving and expanding your network can be a tedious and costly process, especially if your network isn’t wireless. Here are a few tips we’ve gathered to on how to move and/or expand your network. Physical Network: First you want to disassemble your network and make sure your equipment is prepared for transportation, if moving. Then, you want to organize and...