Cyphercon 2.0 Shines a Spotlight on Cybersecurity Threats and Solutions

Posted by Paul Riedl

Apr 20, 2017 12:51:29 PM


Cyphercon.jpg“Cybersecurity threats to Milwaukee-area businesses have never been bigger or more dangerous,” warns Joe Skotarzak, President of River Run Computers, Inc. “Malware has been monetized. It is now a business, an economy that is run on Bitcoins. As a result, there are 400,000 new pieces of ransomware released in the world every day. Today, if you make money and you can pay ransom, you’re a target,” he warns.

Read More

Topics: Security, Cyber Security

Slam the Door on Hackers With a Vulnerability Assessment

Posted by Paul Riedl

Apr 18, 2017 1:32:04 PM

Assessment.pngYour company’s network security is based upon a myriad of firewall, device and software settings. If even one of them is improperly configured, it could expose your business to a variety of internal and external threats. That’s why you ought to invest in a vulnerability assessment at least once a year, to ensure that you’re not unwittingly leaving the doors to your network wide open.

Read More

Topics: Hackers, Security, Cyber Security, vulnerabilities

How to Ensure Ransomware Doesn't Kill Your Business

Posted by Paul Riedl

Mar 15, 2017 11:48:49 AM

Ransomware-Lock.jpgRansomware is a type of malicious software that encrypts files on infected servers and computers. It forces companies to pay ransom to the hacker who created it to get a decrypt key. Unless you have a real-time backup of all of the drives on your network, you may have no choice but to pay the ransom to regain access to your files.

Read More

Topics: Network Security, Security, Cyber Security

Security on the Go

Posted by Theresa Hietpas

Mar 6, 2017 7:00:00 AM

 

SecurityOnGo.jpgMuch of modern business today is conducted on cell phones, tablets and laptops - in places such as public cafes, fast food restaurants and hotels as well as at home and remote offices. Effective mobile work requires reliable access to a broadband internet connection to connect, download, upload or access files.

Read More

Topics: Security, Bandwidth, mobile devices

Do Not Settle for Bad Communication

Posted by Paul Riedl

Feb 27, 2017 9:32:36 AM

phone image.jpgOur Phone Solutions are customized to your needs!

Technology continues to evolve every day, changing the way we communicate. Despite the various means of communication, the importance of a reliable phone system reigns supreme.

Read More

Topics: Communications

BEWARE of SPORA VIRUS

Posted by Theresa Hietpas

Feb 22, 2017 4:00:54 PM

Spora RansomwareOur River Run Security Team has recently been alerted to a ransomware called Spora.

Spora Ransomware is a file-encrypting ransomware, which will encrypt the personal documents found on victim’s computer, any mapped network drives, and USB drives. Then it displays a message which offers to decrypt the data if a payment in Bitcoins is made. Spora not only encrypts the files, it also creates shortcuts to folders that infect other network users when opened.

Read More

Topics: Virus Alert

Eliminate Bad Passwords Now – or Risk A Cyberattack

Posted by Theresa Hietpas

Feb 17, 2017 11:20:55 AM

 

PasswordSecurity-350px.pngCreating and using secure passwords is now more important than ever, thanks to the growing frequency and severity of network hacks. Despite the growing risk, the average person is not doing much to mitigate his/her risk of being hacked.

Many people still use predictable passwords that can easily be breached, leaving them vulnerable to having their accounts hacked. Data compiled by the National Cyber Security Alliance shows just how big this problem is. Of the people surveyed:

 

 

Read More

Topics: Network Security, Security, Cyber Security

Business Phones Services - One Call Away!

Posted by Theresa Hietpas

Jan 26, 2017 1:20:10 PM

Voip image.jpgIs your business phone system 5 years or older?  Having trouble finding new parts for your aging phone system or is it nearing ‘end of life’?  Are you looking for ways to potentially save money on your phone bill? River Run can help! 

Business phone systems have changed dramatically since the days of rotary phones. In today's world, we rely on our phones for instant communication no matter where our location. 

Read More

Topics: Communications, VoIP

Be the Spark Initiative

Posted by Theresa Hietpas

Jan 24, 2017 11:24:30 AM

MPS-logo-sm.jpgRiver Run is proud to host seventh-grade students from the Morse Middle School for the Gifted and Talented on Thursday, January 26, 2017 as part of the Be the Spark initiative.  As a sponsor of Metropolitan Milwaukee Association of Commerce’s (MMAC) Council of Small Business Executives (COSBE), the Be the Spark business tour initiative gives students a chance to explore different opportunities and businesses throughout the Milwaukee area.

Read More

Topics: training

CyberSecurity Defense Services

Posted by Theresa Hietpas

Jan 24, 2017 11:23:31 AM

security_image.jpg"According to leading industry and government reports, over 90% of all cyber attacks are successfully executed with information stolen from employees who unwittingly give away their system ID and access credentials to hackers." Identity Management Institute.

Read More

Topics: Cyber Security

Most Popular Posts

Subscribe

* indicates required

Posts by Topic

see all