Cyphercon 2.0 Shines a Spotlight on Cybersecurity Threats and Solutions

Posted by Paul Riedl

Apr 20, 2017 12:51:29 PM


Cyphercon.jpg“Cybersecurity threats to Milwaukee-area businesses have never been bigger or more dangerous,” warns Joe Skotarzak, President of River Run Computers, Inc. “Malware has been monetized. It is now a business, an economy that is run on Bitcoins. As a result, there are 400,000 new pieces of ransomware released in the world every day. Today, if you make money and you can pay ransom, you’re a target,” he warns.

Read More

Topics: Security, Cyber Security

Slam the Door on Hackers With a Vulnerability Assessment

Posted by Paul Riedl

Apr 18, 2017 1:32:04 PM

Assessment.pngYour company’s network security is based upon a myriad of firewall, device and software settings. If even one of them is improperly configured, it could expose your business to a variety of internal and external threats. That’s why you ought to invest in a vulnerability assessment at least once a year, to ensure that you’re not unwittingly leaving the doors to your network wide open.

Read More

Topics: Hackers, Security, Cyber Security, vulnerabilities

How to Ensure Ransomware Doesn't Kill Your Business

Posted by Paul Riedl

Mar 15, 2017 11:48:49 AM

Ransomware-Lock.jpgRansomware is a type of malicious software that encrypts files on infected servers and computers. It forces companies to pay ransom to the hacker who created it to get a decrypt key. Unless you have a real-time backup of all of the drives on your network, you may have no choice but to pay the ransom to regain access to your files.

Read More

Topics: Network Security, Security, Cyber Security

Security on the Go

Posted by Theresa Hietpas

Mar 6, 2017 7:00:00 AM

 

SecurityOnGo.jpgMuch of modern business today is conducted on cell phones, tablets and laptops - in places such as public cafes, fast food restaurants and hotels as well as at home and remote offices. Effective mobile work requires reliable access to a broadband internet connection to connect, download, upload or access files.

Read More

Topics: Security, Bandwidth, mobile devices

Eliminate Bad Passwords Now – or Risk A Cyberattack

Posted by Theresa Hietpas

Feb 17, 2017 11:20:55 AM

 

PasswordSecurity-350px.pngCreating and using secure passwords is now more important than ever, thanks to the growing frequency and severity of network hacks. Despite the growing risk, the average person is not doing much to mitigate his/her risk of being hacked.

Many people still use predictable passwords that can easily be breached, leaving them vulnerable to having their accounts hacked. Data compiled by the National Cyber Security Alliance shows just how big this problem is. Of the people surveyed:

 

 

Read More

Topics: Network Security, Security, Cyber Security

Google Discloses Security Flaw in Windows

Posted by Blog Tipster

Nov 2, 2016 12:37:15 PM

windows bug.jpgThe Google Threat Analysis Group disclosed to the public a major security flaw in Windows. This comes 10 days after Microsoft was alerted. But is that enough time to develop a patch and protect our systems? 

Read More

Topics: Microsoft, Google, Security

Cybersecurity Training

Posted by Theresa Hietpas

Sep 13, 2016 2:02:05 PM

virus_alert_image.jpgSecurity Training 101

The threat of data security is growing at alarming speeds. Companies need to be on the offensive to protect and secure their critical systems and assets. Effective training and cybersecurity awareness programs should become a fundamental practice in today's business environment.

 

Read More

Topics: Security, Cyber Security, training

Keep Your Phone Safe From the Heat

Posted by Theresa Hietpas

Jul 19, 2016 10:33:08 AM

small_sun.jpgThe hot summer weather can be great for outdoor activities, but it also puts your smart phone at risk for overheating. Overheating is a serious risk when the weather is hot outside and it can permanently damage or destroy your phone's battery and components.

Here are some tips to keeping your phones cool during the hot weather:

Read More

Topics: Smartphones, Security, Tech Support, battery safety

Tips To Prevent a Data Breach

Posted by Theresa Hietpas

Jul 12, 2016 9:02:21 AM

Computer Hacking Continues to Rise-Tips to Keep you Secure

cybersecurity_icon.jpgThe threat of malware and data hacking has become a known threat to businesses of all sizes. Every day we read the headlines of another business that has been hacked and information has been stolen. So what can you do to protect your data?

Read More

Topics: Hackers, data theft, Security, Cyber Security

Guardrail or Roadblock?

Posted by Theresa Hietpas

Apr 19, 2016 1:00:00 PM

road_block.jpgDo your Policies Help or halt Production?

A current metaphor for implementing corporate IT policies and procedures suggests comparing them to guardrails, keeping your employees moving safely, versus throwing up roadblocks that are so onerous that they stop progress. At River Run Computers, we agree. Good IT policies and practices actually can keep your company moving forward, avoiding a show-stopping catastrophe.

Read More

Topics: Online Passwords, Security, web content

Most Popular Posts

Subscribe

* indicates required

Posts by Topic

see all