RIVER RUN CLIENTS UNAFFECTED BY 'WANNACRY' CYBERATTACK

Posted by Paul Riedl

May 23, 2017 7:47:35 AM

Wannacry-Attack.jpg

Last week, tens of thousands of organizations worldwide were brought to their knees by a large-scale ransomware cyberattack called WANNACRY. River Run clients were unaffected, thanks to our advanced network monitoring and support services.

This global attack used a tool stolen from the National Security Administration (NSA) and exploited networks where TCP port 445 was exposed to the internet. We learned about WANNACRY early in its deployment and took immediate action to prevent it from affecting our client networks:

Read More

Topics: Network Security, Cyber Security, ransomware

Protect your Computer Network from Remote Access ATTACKS

Posted by Paul Riedl

May 23, 2017 7:31:37 AM

Remote-Access-Hacking.jpg

Did you know you may be leaving gaping holes in your company’s network firewall?

If you allow your traveling and remote workers to access your network via the internet, you may also be inviting attacks by hackers, who can easily encrypt all of your data and hold it for ransom. According to a recent study issued by Navigant Global Technology Solutions, there has been a significant increase in the number of security incidents caused by remote desktop protocol (RDP) hacking in the first quarter of 2017. 

Read More

Topics: Internet Security, Network Security, Hacked, remote monitoring

May 24, 2017: Visit River Run at Biz Expo 2017

Posted by Paul Riedl

Apr 25, 2017 1:48:26 PM

BizExpo-Logo.pngVisit us at the River Run booth at Biz Expo 2017, May 24, 2017 at the Potawatomi Hotel & Casino, where you can learn more about our BOSS backup service and our new voice over IP (VoIP) solution. We’ll be in booth 510.


BOSS replicates your data in three locations: two in the cloud and one onsite. It automates the process of creating frequent, verified backups of your data in multiple secure locations. In the event of a server failure or other disaster, BOSS will have you up and running with live data in a matter of hours. With malware exploits becoming frighteningly common today, frequent and redundant on- and off-site backups are a must!

Read More

Topics: VoIP, backup solutions, BizExpo, BOSS Backup Service

Cyphercon 2.0 Shines a Spotlight on Cybersecurity Threats and Solutions

Posted by Paul Riedl

Apr 20, 2017 12:51:29 PM


Cyphercon.jpg“Cybersecurity threats to Milwaukee-area businesses have never been bigger or more dangerous,” warns Joe Skotarzak, President of River Run Computers, Inc. “Malware has been monetized. It is now a business, an economy that is run on Bitcoins. As a result, there are 400,000 new pieces of ransomware released in the world every day. Today, if you make money and you can pay ransom, you’re a target,” he warns.

Read More

Topics: Security, Cyber Security

Slam the Door on Hackers With a Vulnerability Assessment

Posted by Paul Riedl

Apr 18, 2017 1:32:04 PM

Assessment.pngYour company’s network security is based upon a myriad of firewall, device and software settings. If even one of them is improperly configured, it could expose your business to a variety of internal and external threats. That’s why you ought to invest in a vulnerability assessment at least once a year, to ensure that you’re not unwittingly leaving the doors to your network wide open.

Read More

Topics: Hackers, Security, Cyber Security, vulnerabilities

How to Ensure Ransomware Doesn't Kill Your Business

Posted by Paul Riedl

Mar 15, 2017 11:48:49 AM

Ransomware-Lock.jpgRansomware is a type of malicious software that encrypts files on infected servers and computers. It forces companies to pay ransom to the hacker who created it to get a decrypt key. Unless you have a real-time backup of all of the drives on your network, you may have no choice but to pay the ransom to regain access to your files.

Read More

Topics: Network Security, Security, Cyber Security

Security on the Go

Posted by Theresa Hietpas

Mar 6, 2017 7:00:00 AM

 

SecurityOnGo.jpgMuch of modern business today is conducted on cell phones, tablets and laptops - in places such as public cafes, fast food restaurants and hotels as well as at home and remote offices. Effective mobile work requires reliable access to a broadband internet connection to connect, download, upload or access files.

Read More

Topics: Security, Bandwidth, mobile devices

Do Not Settle for Bad Communication

Posted by Paul Riedl

Feb 27, 2017 9:32:36 AM

phone image.jpgOur Phone Solutions are customized to your needs!

Technology continues to evolve every day, changing the way we communicate. Despite the various means of communication, the importance of a reliable phone system reigns supreme.

Read More

Topics: Communications

BEWARE of SPORA VIRUS

Posted by Theresa Hietpas

Feb 22, 2017 4:00:54 PM

Spora RansomwareOur River Run Security Team has recently been alerted to a ransomware called Spora.

Spora Ransomware is a file-encrypting ransomware, which will encrypt the personal documents found on victim’s computer, any mapped network drives, and USB drives. Then it displays a message which offers to decrypt the data if a payment in Bitcoins is made. Spora not only encrypts the files, it also creates shortcuts to folders that infect other network users when opened.

Read More

Topics: Virus Alert

Eliminate Bad Passwords Now – or Risk A Cyberattack

Posted by Theresa Hietpas

Feb 17, 2017 11:20:55 AM

 

PasswordSecurity-350px.pngCreating and using secure passwords is now more important than ever, thanks to the growing frequency and severity of network hacks. Despite the growing risk, the average person is not doing much to mitigate his/her risk of being hacked.

Many people still use predictable passwords that can easily be breached, leaving them vulnerable to having their accounts hacked. Data compiled by the National Cyber Security Alliance shows just how big this problem is. Of the people surveyed:

 

 

Read More

Topics: Network Security, Security, Cyber Security

Most Popular Posts

Subscribe

* indicates required

Posts by Topic

see all