Mon-Thurs. 9AM-6PM
(541) 223-7745
50219 US-101 Suite C, Bandon, OR 97411

The University That Was Hit by a Cybersecurity Attack (and the 6 Cybersecurity Vulnerabilities You Need to Ensure Your Business Doesn’t Have)

Cybercriminals can take advantage of various vulnerabilities in your company. Patching them up is crucial to protecting your reputation. Taking your cybersecurity seriously is essential regardless of your organization. Otherwise, criminals can easily halt your operations.  Take the University of Sunderland as an example.  At first, it seemed like they had a standard IT issue […]
Read More

Card Compromised

Today we are going to look at a few of the more common ways your credit or debit card number can be compromised. Skimmer – this is a device that card thieves insert into a normal looking “swipe” location. It could be at the gas station, your ATM, or any retail store you go to.  […]
Read More

Hacktivists Say Hello

October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect   Last Friday you may have noticed something was afoot with the internet. The largest, full scale cyber attack ever launched was underway and the main target was the United States, affecting millions of users across the continent, then spreading beyond to Europe and Australia. […]
Read More

Be watchful for identity theft, fraud, phishing

  October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect Identity Theft Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit. Identity theft can happen to anyone in any location across the country. Take simple steps to protect your online identity by: Locking and password […]
Read More

Stop. Think. Connect.

Every Day Steps Towards Online Safety with Stop.Think.Connect. October is Cybersecurity Awareness Month – learn more from https://www.dhs.gov/stopthinkconnect This month is all about security and we are starting off with the basics of Stop, Think, and Connect. Stop hackers from accessing your accounts – set secure passwords and do not use the same password more […]
Read More

2FA – Do it and sleep better

  2FA.  It sounds like either some gaming group or military acronym however it is not. It stands for 2 Factor Authentication, and it’s what may save you from being hacked. Recently MySpace and not too long before that LinkedIn were hacked; the hackers obtained the usernames, email addresses and passwords of millions of users.  […]
Read More

QuickBooks users – update now

A common mantra we have is “update, backup, update, backup”.  If you are a QuickBooks user, today is your day. Intuit has identified and is implementing an update to address a security vulnerability in QuickBooks desktop software.  This does not impact QuickBooks desktop for Mac or QuickBooks Online. Below is an outline of the steps required […]
Read More

QuickTime joins the legacy software list

  A few days ago Apple announced it was officially abandoning support for QuickTime. This affects Windows and Apple users as the software is cross-platform (works on both types of computers). If you have QuickTime installed on your computer, you need to uninstall it. The reason it needs to be removed – there are currently […]
Read More

Tip # 10 – Run anti-virus scans regularly

Check your security programs and make sure they are actually working.  If a third-party handles your computer and network security, have them show you that they are working.  The programs should be doing live scanning along with scheduled quick and full scans. It’s Cyber Security Month! 31 security tips in 31 days brought to you […]
Read More

Tip # 9 – Do not open unexpected email

Have you received this email?  You were not expecting any packages? Someone else in the office must have ordered this, so I should click on the attachment to ‘print’ my label to pick it up, right? No! Fake email.  The spoofed (to be made to look real) sender address @fedex.com helps the legitimacy of the […]
Read More

Tip # 8 – Identify Fake Updates

One of these two update notifications is real.  The other is fake, leading the user down a long a dark demon filled road full of malicious software.  Can you correctly pick out the fake? If you chose the first image as the fake you are correct.  At first glance it may seem legitimate however on […]
Read More

Tip # 4 – Stop using Yahoo. Just stop it. Now.

I bring this security tip to bear due to continued mounting issues we see when our clients use Yahoo.  There are three separate pitfalls that users of other web portals and email services have not had yet to encounter to the degree of Yahoo users. Email hacks from the back-end.  Think you have the strongest […]
Read More

Tip # 2 – Stop using Internet Explorer

  CERT (United States Computer Readiness Team) has on more than one occasion released the following information to system administrators and the general public:  Stop using Internet Explorer. Why? What’s wrong with the big blue E?  Security issues.  While IE is down to 23% of market share, it still leads in vulnerabilities.  Reports of bugs, […]
Read More

Tip # 1 – Don’t click on ads

While browsing the internet we all occasionally see flashy ads on the web pages we are looking at.  Some are harmless.  Others are trying to trick you into clicking on them to download software you did not need, or want. Clicking on these ads may install ‘junkware’ aka adware, or worse some derivative of malware. […]
Read More

Jimmy Johns Data Security Breach

Have you eaten at Jimmy Johns in Reno between June 16th and September 5th and used a credit card to pay for it? If so, go to the front of the line and get a new credit card. Jimmy John’s says it’s the latest business hit by hackers.  There are 216 stores involved in the credit […]
Read More

Study: 43% of companies had data breaches in past year

An annual study of on data breach preparedness by the Ponemon Institute has found that 43% of companies have experienced a data breach within the last year, up 10% from the year before. Despite the rise in breaches in 2014, 27% of companies did not have a data breach response plan in place. The survey was conducted […]
Read More