Security

#
If your organization’s network and NTFS shares aren’t properly structured, you may be leaving open a gaping hole for cyberattacks. Share permissions allow you to access specific folders and files on your computer network. NTFS permissions control your ability to interact with those files (e.g.,…
Read More >
#
Last week, tens of thousands of organizations worldwide were brought to their knees by a large-scale ransomware cyberattack called WANNACRY. River Run clients were unaffected, thanks to our advanced network monitoring and support services.
Read More >
#
If you allow your traveling and remote workers to access your network via the internet, you may also be inviting attacks by hackers, who can easily encrypt all of your data and hold it for ransom. According to a recent study issued by Navigant Global Technology Solutions, there has been a…
Read More >
#
Much of modern business today is conducted on cell phones, tablets and laptops - in places such as public cafes, fast food restaurants and hotels as well as at home and remote offices. Effective mobile work requires reliable access to a broadband internet connection to connect, download, upload…
Read More >
#
“Cybersecurity threats to Milwaukee-area businesses have never been bigger or more dangerous,” warns Paul T. Riedl, Jr., CEO of River Run Computers, Inc. “Malware has been monetized. It is now a business, an economy that is run on Bitcoins. As a result, there are 400,000 new pieces of…
Read More >