March 19, 2018 No comments exist

Virtual Time is a subject I studied in my early days right out of college.  It’s a concept we explored while thinking about the biggest problem computer processing would eventually experience: the speed of the electron. No matter how short the distance you make between two elements that process data, you will find the bottleneck…

March 19, 2018 No comments exist

This story about a cyber attack in Saudi Arabia was taken from the latest issue of Cyber Heist News. Cyber attacks are now being engaged with even more malevolent intent.  It has become all the more important for us to secure our networks in every industry where technology is used. A Cyber Attack in Saudi…

February 14, 2018 No comments exist

There is a new technique Cyber-thugs are using to attack Internet users that allows Malware to get past your Anti-Virus Scanner. This article was e-mailed to me on Wednesday, February 14, 2018. It comes from CyberHeist News, a research firm in cyber security. According to researchers at McAfee, a new malware campaign is targeting organizations…

August 17, 2017 No comments exist

Scammers are looking at every avenue, it now appears, to defraud businesses of their hard earned money, using a technique called “spear phishing” via company web forms. Normally spear phishing takes place when scammers send e-mails to potential victims “ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential…

July 20, 2017 No comments exist

Tesseract 3 Upgrade Complete, including the new Page Builder! I performed the Tesseract 3 Upgrade today, after putting it off for as long as possible. It wasn’t that I didn’t want to migrate from one set of tools to the recommended set, I just knew it was going to take a lot more work than…

June 27, 2017 No comments exist

Petrwap Ransomware Attack Underway In Europe The Verge just reported that a new Cyber Attack is underway in Eastern Europe. Kaspersky Laboratories has identified it as Petrwap, a strain of the Petya ransomware it identified back in March. The company suspects that it has been in the wild for a while now, although tests show…

June 6, 2017 No comments exist

Yet another troubling reminder that breaches are inevitable. OneLogin is a service, developed by the company, OneLogin, Inc., that provides single sign-on and identity management for cloud-based applications, whereby all of your passwords and other secure credentials can be stored and used to unlock applications and access to secure storage areas in your digital environment….

June 2, 2017 No comments exist

Here is an alarming article to which Small Businesses should very pay close attention! I recently spoke about Information Security to the Liberty Hill Chamber of Commerce, and mentioned e-mail as one of the gateways through which attackers are trying to get in, but I didn’t realize that the percentage had reached this level of…

February 1, 2017 No comments exist

Are you looking for IT support for your business? With over 20 years of experience in IT, there isn’t much we haven’t seen. From network outages and computer viruses to infrastructure migrations and application updates, we can help you meet your IT challenges and accomplish your goals, and ultimately keep your business running smoothly on…