Protecting small firms from computer disasters
Cart 0

Blog

Foiling Ransomware that Renames Files

ransomware

Foiling Ransomware that Renames Files

Advanced ransomware has a nasty trick: It not only encrypts your files but it also renames them. The new names of your files...

Read more →


Why Do We Under-Prepare for Risks?

risk

Why Do We Under-Prepare for Risks?

"Denial is a critical part of the human coping mechanism." -- Sienna Brooks in Inferno by Dan Brown. We can counteract these self-defeating thought patterns. One approach is to...

Read more →


Don't Get Hacked at a Hotspot

protection vulnerabilities

Don't Get Hacked at a Hotspot

Connecting to the internet using WiFi at a coffee shop or other public place, even with a password, makes you vulnerable. Subscribing to a VPN (virtual private network) service protects you when connecting to hotspots. Each year when April Fools Day comes around, let it serve as a reminder to evaluate your computer security protections. Aprils Fools is a favorite day for releasing computer malware that is no joke. I have researched VPN services and have one to recommend to you. Here's why you need a VPN subscription.Other users of a WiFi hotspot don't have to be computer geniuses to...

Read more →


Do You Have a Security Gap?

backup risk

Do You Have a Security Gap?

Do you have a gap in your defenses against computer disasters? You can protect against a common threat by *creating* a gap!  Not all gaps are bad. A gap...

Read more →


Your Computer Has Holes

vulnerabilities

Your Computer Has Holes

Your computer has holes that viruses can exploit. You can defend against them, but traditional antivirus software won't do the job. In 2016, Microsoft identified and patched over 100 holes each in Windows 10, Microsoft Internet Explorer, and the Microsoft Edge web browser. In addition, over 80 vulnerabilties were found and patched in Microsoft Word and Excel. Some of the holes and vulnerabilities existed for months before Microsoft released fixes. Even if you have automatic Microsoft updates enabled and promptly reboot your computers, you have been exposed.I strongly recommend that you install advanced protection like Webroot Security. You get triple...

Read more →