RIVER RUN CLIENTS UNAFFECTED BY 'WANNACRY' CYBERATTACK

Posted by Paul Riedl

May 23, 2017 7:47:35 AM

Wannacry-Attack.jpg

Last week, tens of thousands of organizations worldwide were brought to their knees by a large-scale ransomware cyberattack called WANNACRY. River Run clients were unaffected, thanks to our advanced network monitoring and support services.

This global attack used a tool stolen from the National Security Administration (NSA) and exploited networks where TCP port 445 was exposed to the internet. We learned about WANNACRY early in its deployment and took immediate action to prevent it from affecting our client networks:

Read More

Topics: Network Security, Cyber Security, ransomware

Cyphercon 2.0 Shines a Spotlight on Cybersecurity Threats and Solutions

Posted by Paul Riedl

Apr 20, 2017 12:51:29 PM


Cyphercon.jpg“Cybersecurity threats to Milwaukee-area businesses have never been bigger or more dangerous,” warns Joe Skotarzak, President of River Run Computers, Inc. “Malware has been monetized. It is now a business, an economy that is run on Bitcoins. As a result, there are 400,000 new pieces of ransomware released in the world every day. Today, if you make money and you can pay ransom, you’re a target,” he warns.

Read More

Topics: Security, Cyber Security

Slam the Door on Hackers With a Vulnerability Assessment

Posted by Paul Riedl

Apr 18, 2017 1:32:04 PM

Assessment.pngYour company’s network security is based upon a myriad of firewall, device and software settings. If even one of them is improperly configured, it could expose your business to a variety of internal and external threats. That’s why you ought to invest in a vulnerability assessment at least once a year, to ensure that you’re not unwittingly leaving the doors to your network wide open.

Read More

Topics: Hackers, Security, Cyber Security, vulnerabilities

How to Ensure Ransomware Doesn't Kill Your Business

Posted by Paul Riedl

Mar 15, 2017 11:48:49 AM

Ransomware-Lock.jpgRansomware is a type of malicious software that encrypts files on infected servers and computers. It forces companies to pay ransom to the hacker who created it to get a decrypt key. Unless you have a real-time backup of all of the drives on your network, you may have no choice but to pay the ransom to regain access to your files.

Read More

Topics: Network Security, Security, Cyber Security

Eliminate Bad Passwords Now – or Risk A Cyberattack

Posted by Theresa Hietpas

Feb 17, 2017 11:20:55 AM

 

PasswordSecurity-350px.pngCreating and using secure passwords is now more important than ever, thanks to the growing frequency and severity of network hacks. Despite the growing risk, the average person is not doing much to mitigate his/her risk of being hacked.

Many people still use predictable passwords that can easily be breached, leaving them vulnerable to having their accounts hacked. Data compiled by the National Cyber Security Alliance shows just how big this problem is. Of the people surveyed:

 

 

Read More

Topics: Network Security, Security, Cyber Security

CyberSecurity Defense Services

Posted by Theresa Hietpas

Jan 24, 2017 11:23:31 AM

security_image.jpg"According to leading industry and government reports, over 90% of all cyber attacks are successfully executed with information stolen from employees who unwittingly give away their system ID and access credentials to hackers." Identity Management Institute.

Read More

Topics: Cyber Security

Cybersecurity Training

Posted by Theresa Hietpas

Sep 13, 2016 2:02:05 PM

virus_alert_image.jpgSecurity Training 101

The threat of data security is growing at alarming speeds. Companies need to be on the offensive to protect and secure their critical systems and assets. Effective training and cybersecurity awareness programs should become a fundamental practice in today's business environment.

 

Read More

Topics: Security, Cyber Security, training

Tips To Prevent a Data Breach

Posted by Theresa Hietpas

Jul 12, 2016 9:02:21 AM

Computer Hacking Continues to Rise-Tips to Keep you Secure

cybersecurity_icon.jpgThe threat of malware and data hacking has become a known threat to businesses of all sizes. Every day we read the headlines of another business that has been hacked and information has been stolen. So what can you do to protect your data?

Read More

Topics: Hackers, data theft, Security, Cyber Security

Cyber-Security Begins with You!

Posted by Theresa Hietpas

Sep 23, 2015 1:54:00 PM

phishing on a smartphoneAt River Run, our mission is to keep your network up and running.  Our Technicians and Engineers work diligently to ensure the safety of your network with recommended software and hardware updates, malware protection, high quality firewalls, redundant backups, network monitoring, and more.  We can do everything technologically possible to protect your network, and you could still have a major breach of security because the “liveware” – you and your employees – accidentally opened the door.

Read More

Topics: Phishing attacks, Cyber Security

Smaller Companies Are Vulnerable Too!

Posted by Theresa Hietpas

Mar 11, 2015 3:00:00 PM

computer_safeIf you think your business is too small for data breaches or hacking, think again! Cyber Criminals use scripts or automated attacks for any company or employee that may be vulnerable and easily accessed. If you work on a computer and do not follow well-defined procedures, then your company may be at risk.

Read More

Topics: Security, Cyber Security, vulnerabilites, Cyber Crime

Most Popular Posts

Subscribe

* indicates required

Posts by Topic

see all