Community Recycling Day

Posted by Theresa Hietpas

Apr 17, 2015 3:57:21 PM


Join River Run for a Community Recycling Day in Pewaukee, WI on May 16, 2015 from 9a.m.-12p.m.!

Hosted by Ellenbecker Investment Group, Foundations Bank and River Run Computers, the Annual Community Recycling Day will take place 9 a.m. - 12 p.m. on Saturday, May 16 in the parking lot of the Foundations Bank building, N35 W23877 Highfield Court, Pewaukee. This year, the hosts are expanding the annual paper shredding event to include electronics, eyeglasses and hearing aids. For more information about this event, including details regarding what can and cannot be accepted, please click here

Visit or to find out more about these companies. For general questions regarding recycling, visit

Read More

Topics: Technology Milwaukee, Computers, recycling

Celebrate Earth Month with a PaperLESS Office!

Posted by Theresa Hietpas

Apr 7, 2015 10:00:00 AM


How many file cabinets does your company use? Do you have rows and rows of files that keep accumulating more and more space? Now is the time to celebrate Earth Month and explore a PaperLESS™ Office.

Electronic filing provides better protection and access to stored information than paper ever can, and is far less expensive to manage effectively.  While few businesses will ever be able to eliminate paper entirely, it is easier than you might think to get away from the volumes of paper your office creates. When you do, you’ll find that you work better (and faster), with everything you need at your fingertips.

The River Run Application Services Group has been refining its PaperLESS™ Office document management system for over 30 years, using reliable and cost-effective services to create a customized solution that fits your business. To schedule an evaluation on how we can help your office go PaperLESS™, contact River Run!

Read More

Topics: applications, document management

Is Internet Explorer Going Away?

Posted by Theresa Hietpas

Mar 19, 2015 3:53:31 PM


The latest news has been that Microsoft will be switching to Project Spartan for its default web browser. But can Internet Explorer really go away? 

For those that panicked at hearing the news about Internet Explorer, don't worry! The web browser will not officially go away. The browser will still be shipped with the Windows 10 upgrade to remain compatible with your apps and programs, especially for business clients. But Internet Explorer will not be the default browser; Microsoft is trying to retire legacy code and adopt a more agile design model that reflects the nature of the web today and use of multiple devices.

Microsoft has redesigned the new platform, Project Spartan with new features and better usability. With its touchscreen ability, Project Spartan hopes to win back some users from the browser wars. It may be years before Microsoft can officially retire Internet Explorer.

Are you ready to let go of Internet Explorer? Share your comments!

Read More

Topics: Internet Explorer, Microsoft, Windows

Smaller Companies Are Vulnerable Too!

Posted by Theresa Hietpas

Mar 11, 2015 3:00:00 PM

computer_safeIf you think your business is too small for data breaches or hacking, think again! Cyber Criminals use scripts or automated attacks for any company or employee that may be vulnerable and easily accessed. If you work on a computer and do not follow well-defined procedures, then your company may be at risk.

Take for example the town of Orange Park, Florida. Just recently in the news, the town of Orange Park had money stolen from their bank account after the town’s computer system was hacked. The hackers were able to steal approximately $491,000 from their account and transferred the funds into another account within less than 30 minutes.

By hacking into an employee’s email account and sending a virus-infected attachment to key personnel, the hackers were able to gain access to the bank account. Luckily the cyber-attack was caught in time and the town was able to reverse the transaction. But other companies are not so lucky.

But this type of cybercrime happens more than reported. Too often companies place internet security or policies lower on their priority list and therefore put their data at risk for an attack.

As new types of malware and vulnerabilities surface, our Engineers keep on top of them and the methods to stop them. Our Engineers say abreast of the Cyber Criminals methods and finding tools to block them. River Run Computers wants to help keep your business safe. Our newest Vulnerability Scan service can scan your network for possible security gaps and how to remediate them. In addition, River Run can also help train and teach your staff how to help prevent data breaches and hacking. Don’t become a target for Cyber Criminals. Contact River Run today to help protect your data and keep you up and running-securely!

Read More

Topics: Security, Cyber Security, vulnerabilites, Cyber Crime

Application Services - Solutions for your Business

Posted by Theresa Hietpas

Mar 5, 2015 1:38:19 PM

Are there tasks you wish your technology could do for you?
Are you frustrated with the results you get from the applications you have? Do you know what other products are available that could make your work easier and more productive?

Take a look at the software and the processes you use every day. If your office spends time entering information in multiple places, searching for documents, duplicating efforts, “fixing” reports or  finding alternative methods to get the results you need – we can help!

Our Applications Services Group looks at how you run your business, and what you are using to do it.  We evaluate your workflow to find the best software solutions - including how to use the software you already have more effectively. 
Some examples:
  • Microsoft Office 365 is a powerful package of software and web-based applications, at a very affordable price, but few people who use it take full advantage of ALL of the features that are included.  We have the expertise in how to use these programs and we train you to reap all the benefits.
  • If your company bills for time, programs such as Tabs3 make it easy to track your hours and invoice your clients, and may even integrate with your accounting package.
  • Drowning in paper? Searching everywhere for important documents? Our specialists can help with Worldox, a powerful and affordable solution for document management and organization.
  • Law firms looking for practice management systems or cloud-based services like Clio – our Application Services Group are experienced legal services specialists.
Software should make your job easier, not more frustrating.  The right choices and right training helps your office work better, so you can focus on the things that matter most to your business. To learn more about our new Application Services click here.
Read More

Topics: Microsoft, Worldox, Office 365, Workflow

Has email communication become a distraction?

Posted by Theresa Hietpas

Feb 6, 2015 9:00:00 AM


Sending emails has become a quick and easy way to communicate with people around us. But now email inboxes are becoming overloaded with all types of messages. Companies treat their inboxes as storage areas, meeting notes, contract agreements and task lists. According to McKinsey Global Institute, people spend 28% of their work week (or 13 hours) reading, deleting, sorting and sending emails.

Emails have become a distraction to our workdays and prevent us from focusing on the tasks at hand. Do you ever wonder where your day went and feel like you have not accomplished the things you wanted to for the day? Have you thought about how much time you spend checking your emails and responding to every request?

As one of the first things we do in the mornings, we check our emails to find out what projects or tasks are due, what the priorities are for the day or what meetings to attend. But checking our emails has become a huge distraction. It keeps us from focusing on the tasks at hand and staying engaged in those tasks. People have come to expect instant responses from email communication. Therefore, we feel obligated to continually check our emails to make sure we aren’t missing something.

Here are a few things that help you stay focused on your projects:

  1.        Set up email filters in your mailbox so that less important emails go into these folders and you can read them at a later time
  2.        Set a time limit for reading and checking your emails. This will help to organize your day and have enough time to complete your projects. Pick a time that works for you, such as 11am-12pm each day.
  3.        Check your emails if you are looking for specific information. Otherwise, turn off your notifications so that they are not taunting you to open your mail. Better yet, close out of your email program until your designated time frame for checking emails.

Keeping a clean inbox is also important for being efficient. Once you read an email, decide if you need to respond to that email, file it away in a folder or delete it. Don’t let emails pile up and take up unnecessary storage space. If you need assistance in setting up folders or filters, River Run Computers will help you manage this process! 


Read More

Topics: Technology problems, Email, Email management

Time to Review your Passwords

Posted by Theresa Hietpas

Jan 21, 2015 9:18:00 AM


  Top 15 Worst Passwords for 2014. Did yours make the list? 


With the increase in cyber crimes and data theft, the need for secure passwords is more prevalent.

Yet each year, people continue to use the same, basic passwords that make it easier for someone to decipher. 

SplashData, a leading provider of security applications and services, has released its annual list of the worst passwords based on files containing over 3.3 million passwords leaked in 2014.

Here are the top 15 worst passwords:        

1. 123456
2. password
3. 12345
4. 12345678
5. qwerty
6. 123456789
7. 1234
8. baseball
9. dragon
10. football
11. 1234567
12. monkey
13. letmein
14. abc123
15. 111111

So did your password make the list? If so, it's time to change it! 

Security expert Bruce Schneier suggests, "Come up with an entire phrase that’s easy for you to remember, and then use the first instance of each letter, number and symbol from each word in the phrase, keeping punctuation intact as well."

We recommend to our clients to use a sentence for a password, including spaces. By using an entire sentence with punctuation, the length makes it harder to crack. A sentence would be much harder for someone to guess, as well.   

Brute force attacks will run through a cycle of possible passwords, getting longer and longer as it runs.  Each additional character in a password makes a brute force crack attempt take roughly 50 additional attempts (one for each possible character) to find the password.

A 9 character password could take in the area of 21,000,000,000,000 attempts to crack using a brute force attack. A ten character could take 50 times that number for attempts. So the longer the password, the better!

Changing your password is an easy way to help prevent data thieves from accessing your data. If you are using the same password multiple times across the internet, you run the risk of exposing your password if one of the services is compromised. Using a free password manager, such as KeePass, is also a great option for storing and changing all your different passwords.

Contact us or send us an email if you have additional questions!


Read More

Topics: Password protection, Security

Trojan.FakeAV Virus Update

Posted by Theresa Hietpas

Dec 22, 2014 4:55:00 PM

Trojan.FakeAV has been around for quite a while, however its making another debut. This type of malware tries to convince a user to remove non-existent malware or security risks from their computers by installing bogus software.

Users are offered a link to software from spam emails, blogs/forums that are spammed, malicious banner ads, pirated software, file sharing networks, or even exploited web pages.

Once installed, a constant stream of pop-up warnings appear stating a harmful virus has been detected alerting you to purchase software to clean this up.

Here is what we received via email:


Noted the following:

  1. From email address is from outside the US (.it=Italy)
  2. The “?” in the beginning of the body
  3. No mention of company name or logo
  4. No mention of what was “purchased”
  5. There have not been any purchases in the amount noted ($6,901) recently
  6. The attached .doc file with the supposed invoice.  This is not how any vendor in the past sends this information.

Also noticed the error in the header stating the following:

“If there are problems with how this message is displayed, click here to view in a web browser.”

This indicates that there is poorly coded HTML in the body of the message.  Viewing the source of the message verified this.  Any creditable online vendor would not be sending code riddled with errors.

The attached doc file was opened on a secured workstation to see the contents. A snip of the document is below:



The document contains direction to allow an embedded macro to run.  You should NEVER allow macros to run on any Office document that you do not completely understand the source and purpose of.

I extracted the macros out of the file to determine what they did and the infection.  I found that it was designed to download a file called rkn.exe from a web host in Australia.  That file, if executed, will infect the machine with the Trojan.FakeAV!gen29 malware.  This infection is from a family of “fake AV” malware that purports to be virus protection software.  It can cause pop ups that make it appear that a virus has been found on a workstation, and that software to remove the infection can be run to remove it.  This “removal” comes at a price, and does not remove the actual malware.

What can you do if you receive a message that appears like the example?

If you receive a message that appears like the example, do not open the attachment.  Let your IT support people know you received the message, and delete it immediately and clear it from your recycle bin if requested.

How can you prevent a message like this from getting to your email?

Unfortunately, anti-virus programs may not be able to block this type of email.  The example email was delivered through a spam/virus mail filter, and not captured by desktop antivirus.  The best method of blocking this type of infection through email is to use a gateway anti-virus and spyware solution.  The SonicWALL family of firewalls can be configured to clock all Office attachments with macros from entering the local network.

Contact River Run Computers immediately if you become aware of a virus on your computers. We will do our best to resolve the issues as quickly as possible. Click on this link for our Support Desk or call us directly at 414-228-5617.


Read More

Topics: Email protection, Email security, Malware, Virus Alert, Virus

Operation Global III Virus Alert

Posted by Theresa Hietpas

Dec 22, 2014 12:10:54 PM


Operation Global III ransomware is proving to be another malicious malware that not only encrypts your data but also infects it. This virus is starting to make it’s way around the internet including some of our clients. Once this ransomware attacks your system, a lock-screen is displayed and requests that a ransom fee be paid in return for your files. All of your file extensions are changed to .EXE and if double clicked or opened will infect and encrypt every computer where these files are launched.

Luckily there is a decryption key that can unlock the encrypted files. With the help of our team, we can help recover the files that this malware has encrypted.





1. In addition to encrypting files, it also spreads itself to other computers by infecting the files.
2. It does not target only existing mapped drives.
It seeks out all network shares and mounts them so that it can encrypt and infect them as well.
3. If a client pays the ransom fee, there still is no real guarantee that the files will work after the decryption. The decryption piece of the malware is known to be buggy.
4. It is currently decrypt-able for free with a tool that exploits a flaw in its design. Our engineers and technicians understand how to remove this malware using this new tool. Perfect results are still not guaranteed since the malware has bugs when decrypting, and backups will end up being the most reliable source of data recovery.


1. Review the permissions on your networks. Make sure that only the most absolute access required is in place. The malware only has as much access as the user it infects. This is something we can work with you on.
2. Make sure your backups are in place and are running great. This is something that we do one each of your RSVP visits.
3. Report unusual file behavior as soon as you see it. The sooner you catch it, the sooner we can stop it from accessing the network.

As these different types of viruses continue to evolve and mature, it is more important than ever
to have a policy in place to protect your data.

If you believe your network security has been compromised and your computer has already been infected, please contact us right away to remove this virus and install the decryption code: 414-228-3076.

Read More

Topics: Hackers, network protection, attacks, Malware, Virus Alert, Virus, ransomeware

The Office 365 Decision.

Posted by Theresa Hietpas

Dec 9, 2014 9:00:00 AM


In today’s market, subscription based software is becoming more and more popular for software developers. Many prefer to control the use of their software products through a subscription model rather than the traditional outright purchase of the software. Along with the ubiquitous nature of the Internet, this has led to offering software as a “rented” service, SaaS, rather than a product you buy once and may or may not upgrade. Microsoft’s Office Productivity suite, including popular programs such as Word, Excel, Outlook, and PowerPoint has followed suit, and for several years now has been offered as Office 365, a truly impressive, cloud-based SaaS, always current and up to date in a variety of sizes and combinations to fit a wide variety of customers.

The adoption rate has been through the roof…but, is it right for you?

There are some network management companies or service providers that actually refuse to sell and support in-house email systems believing that the cloud and SaaS models are the only viable option for their future. Fortunately for you, the client, the decision, at least for now, is in your hands. And River Run Computers will support you regardless of the direction you choose. There are good reasons to take either approach.

So what’s so good about a subscription based software package, like Office 365? Well, as mentioned above, it is the most secure, feature rich version available. If you use more than one device, say a tablet and both a home and work computer, Microsoft’s plans allow you to download their Office Suite software on up to 5 different devices at a single price, even if you have a mix of Apple and PC devices! And the software includes more than just the normal basic 4 or 5 applications you used to get with an Office license. You also get OneNote, Access, Publisher, OneDrive, SharePoint and even Lync on some plans. Each email account includes 50 GB of storage, spam filtering, and soon you will receive unlimited personal cloud storage for your files. The Service Level Agreement is for 99.9% uptime, secured backup and loads of other benefits. The plans are attractively priced and you can always change your mind and download your files and messages to an in-house solution.

So why wouldn’t you want to get rid of some of your servers and in-house network? For some, the idea of cloud storage and continuous payments is stressful and costly. They want the security of controlling their mail, controlling their files, controlling who gets what level of what software. If you have committed resources for your network, why pay for someone else’s server when you already support your own? Why pay for next year’s tweak on Word or Excel when you already have a piece of software that does the job, software that you’ve paid off and understand how to use? Why the hassle and cost for migration of your existing mail? Once you have your own servers and software installed and paid for, the reoccurring costs can be less per user.

How to decide? There are some who lease cars and some who buy and run them into the ground. Different philosophies. But at the very least you should get a full, detailed picture of the benefits and costs of either solution, for your particular situation. River Run Computers can help provide the analysis and whatever your decision, provide the expertise you need.

If you are interested in exploring the possibilities of Office 365 as a business solution, give us a call!
We would be happy to discuss this with you!

Request  Information

Read More

Topics: cutting costs, cloud computing, Microsoft, data protection

Request  Information

Subscribe to Email Updates

Posts by Topic

see all