IT Alerts Articles
The articles below bring you alerts on a wide range of technology. Browse below to become better informed about IT.
Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the […]
Earlier this week, researchers published information about a newly discovered weakness in the security standard that protects all modern Wi-Fi networks we use at home, work, restaurants, etc. We want to inform you what is at stake here, who is most at-risk, and what organizations and individuals can do about it. What is the ‘KRACK’ Wi-Fi […]
You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.
When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your […]
The Equifax breach is yet again the latest example of a massive corporation getting hacked and exposing millions of sensitive information. Unfortunately, hacks like this are becoming too frequent for our own safety, and will likely happen again. We are forever at the mercy of the security systems of the companies we trust to hold […]
The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.
Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this […]
The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the […]
Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, […]
How did your last major IT initiative turn out? Were you able to get what you wanted implemented in an orderly fashion, or did it fail to provide a return on investment? You might be surprised to hear that half of the IT projects implemented by businesses ultimately wind up as a failure, and these […]
In light of a recent zero-day vulnerability discovered with Adobe Flash, along with the wide adoption of the alternative rich media player HTML5, Google has put into motion plans to stop supporting Flash for its popular web browser, Google Chrome. By all accounts, this move may be the final nail in the coffin for the […]
By design, Microsoft’s operating systems aren’t built to last forever. Due to the fact that technology is always changing, new operating systems with better security and improved capabilities are routinely needed. Microsoft gets users to transition from an older OS to a newer one by ending support for the older one. This begs the question, […]
If you’ve reached this post, it likely means there is a massive snowstorm heading your way. Some of you may want to work from home to avoid shoveling your car out of the driveway. But is your company ready to have you work from home during a heavy snowstorm? We’ve gathered a checklist for your […]
With many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.
Per New Report Citing Spike in Ransomware Attacks, New Jersey Computer Tech Support Leader Quikteks Urges Small Businesses to Strengthen Cyber Security
FAIRFIELD, NEW JERSEY (PRWEB) OCTOBER 07, 2015 In light of a new report by Panda Security in which the world’s leading provider of cloud-based security solutions cites a dramatic increase in ransomware in the second quarter of 2015, New Jersey computer tech support leader Quikteks is urging small businesses to be proactive and strengthen their […]
Microsoft’s latest PC operating system arrived with fanfare yesterday, and has received overwhelmingly positive reviews so far, but is it ready for your business? Let’s take it for a spin and find out.
One common characteristic about small-to-medium sized businesses is that they’re often stretched thin. When your company is pulled every which way, certain aspects of it begin to suffer. One area that should never suffer is customer service. Managed IT service can make things easier on your staff so they can focus on what’s important, like […]
When you purchase a new computer it comes with pre installed software. You assume that your new PC is secure and has been properly vetted by the manufacturer. This is the case 99 percent of the time. Unfortunately, an exception has recently been discovered with the Superfish app. This app came installed on new […]
In 2014, Microsoft pulled the plug on Windows XP’s support. Now, in 2015, Windows Server 2003 is scheduled to meet the same fate. If your business is still using Windows Server 2003 as your operating system, it’s important to upgrade before July 14th, which is the day that support for this product ends. If you […]
You have a system in place to remind yourself of when to pay your bills. Otherwise, bills would go unpaid, essential services would be cut off, and your credit rating would plunge. However, not everyone has a system in place to renew their software licenses, which could lead to consequences that are just as dire. […]
What’s so special about a physical signature created with pen and paper? If it’s an autograph from your favorite celebrity, then you’ve got something special. Other than that, there’s no reason why an electronic signature can’t get the job done in today’s hi-tech business world. It’s 2015, and the outdated need for physical signatures appears […]
The latest cyber threats will put your business plan and your company at risk. It has become imperative to protect yourself from them. This new threat designated Cryptowall 2.0, has the potential to do plenty of serious damage to your business’s network. Do not give it the opportunity.
Does your company have dedicated antivirus software to protect it against the annoying threats on the Internet? Sometimes, a computer virus can slip its way past your software, but there’s no greater frustration than realizing that the reason you contracted a virus is because an employee disabled your antivirus software. Don’t let this happen to […]
On April 7th, a new bug was discovered on the internet that’s putting millions of users’ personal data at risk. Given the name “Heartbleed bug,” it’s capable of allowing hackers to collect information while you believe you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it’s very probable that your personal […]
The entire business world has been made aware that Microsoft is ending support for its popular operating system Windows XP on April 8.The problem that arises on this date is that 29% of the world’s computers are still running Windows XP. It seems that the world has been slow to act upon Microsoft’s expiration date. […]
The rapid growth of the mobile device market has cast doubt about the future of the PC market. Will the PC evolve or will it become obsolete technology? How does the uncertain future of the PC impact your business? It’s in the DesignLet’s dispel this rumor right off the bat; we don’t believe the PC […]
In September, a new kind ransomware burst onto the It security scene and it has been wreaking havoc on computer networks all over the world ever since. The virus has been named CryptoLocker, it’s capable of completely taking over your system, encrypting your files, and holds your data ransom until you pay them the money […]
If your business still has computers running Windows XP, then it’s absolutely critical that you upgrade to a newer OS. Windows XP systems may be working just fine, and therefore, you may not feel the need to upgrade, but you will feel the heat next year when Microsoft ends critial software support for XP. […]
On September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting company’s sensitive data at risk. If your computer gets infected, then it could mean real problems for you and your company’s computer users. Here are the details on what this […]
For those who use Mozilla Firefox as our web browser of choice, you may have noticed that there have been a large number of updates over the past year, leaping from version 4 to the now current Firefox 13. Mozilla has been following an aggressive roadmap to improve performance and features. Mozilla’s rapid release plan […]