Blog

#
A new type of Phishing message has been circulating that uses your own passwords to create the appearance that the attacker knows who you are and has valuable information about you.  
Read More >
#
If your organization’s network and NTFS shares aren’t properly structured, you may be leaving open a gaping hole for cyberattacks. Share permissions allow you to access specific folders and files on your computer network. NTFS permissions control your ability to interact with those files (e.g.,…
Read More >
#
Are you tired of searching for the right project folder or document? You’re not alone. According to technology analyst IDC, the typical knowledge worker spends an average of 8.8 hours per week searching for information. That’s roughly 10 weeks searching for information every year, per employee!
Read More >
#
Summer. It’s prime time for baseball, beaches, picnics and vacations. But while fun in the sun is usually good for you, it’s not so good for your laptop. Heat is the enemy of today’s sophisticated electronics – it can drastically shorten component life and can cause irreparable damage to your…
Read More >
#
Malware is defined as software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. This includes viruses, Trojan horses, rootkits, spyware, worms, adware and more. Avoiding Malware involves avoiding bringing it upon yourself, as well as…
Read More >
#
As of May 25, 2018, the European Union has standardized regulations for protection of its resident’s personally identifiable information (PII) NO MATTER WHERE IT RESIDES. This regulation is called the GDPR.
Read More >
#
An email virus can spread quickly. But knowing some quick tips can help you prevent your computer from becoming infected.
Read More >
#
Last week, tens of thousands of organizations worldwide were brought to their knees by a large-scale ransomware cyberattack called WANNACRY. River Run clients were unaffected, thanks to our advanced network monitoring and support services.
Read More >
#
If you allow your traveling and remote workers to access your network via the internet, you may also be inviting attacks by hackers, who can easily encrypt all of your data and hold it for ransom. According to a recent study issued by Navigant Global Technology Solutions, there has been a…
Read More >
#
Much of modern business today is conducted on cell phones, tablets and laptops - in places such as public cafes, fast food restaurants and hotels as well as at home and remote offices. Effective mobile work requires reliable access to a broadband internet connection to connect, download, upload…
Read More >