(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Then and Now: Move Forward with Your IT Security Initiatives

Then and Now: Move Forward with Your IT Security Initiatives

Mobile devices are great tools that allow for enhanced mobility and convenience, but this increased accessibility is also a major detriment in terms of data security. Mobile devices are notorious for being considerable security threats to businesses that utilize them. Therefore, businesses that use mobile devices on a regular basis should absolutely be aware of how they can influence security policies.

0 Comments
Continue reading

The Unofficial Guide to Comprehensive Google Account Security

The Unofficial Guide to Comprehensive Google Account Security

There is no denying that a Google account is a very valuable thing to have today, and if valuable doesn’t seem like the right word to use, let’s say practical. Business and casual users alike use the wide variety of services for many purposes - but are they doing so safely?

0 Comments
Continue reading

Scammers Can Use Gift Cards to Target Your Company

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year.

0 Comments
Continue reading

How Your Kids Can be Hurt by Devices (and Vice Versa)

How Your Kids Can be Hurt by Devices (and Vice Versa)

As technology advances and improves at an exponential rate, it is little wonder that today’s youth are growing up with a closer relationship to technology than any other generation before them. While this has opened up many beneficial opportunities for them, it can also be the source of many serious issues without the proper supervision.

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Your Network is at Threat from the Inside, Too

Your Network is at Threat from the Inside, Too

It’s no secret that a business’ security is one of its most important considerations. It would seem that there is a daily reminder of this unfortunate fact - but it’s even more unfortunate that many people aren’t aware of where many threats can actually come from. Below, we’ll discuss how some threats start on the inside - as well as what you can do to help stop them.

0 Comments
Continue reading

5 Basic Steps to Building a Better Backup Strategy

5 Basic Steps to Building a Better Backup Strategy

If you subscribe to Murphy’s Law, you understand why it is so crucial for every business to have a backup solution planned, put into place, and prepared for the worst. However, not every business should go about putting their backup strategy together in the same way. After all, their needs will be different, based on their industry, the data they store, and a variety of other factors.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Malware Cybersecurity Network Security User Tips Tech Term Productivity Smartphones Communications Communication Internet Backup Hackers Managed IT Services Email Passwords Browser Microsoft Alert Hardware VoIp Android Ransomware Business Outsourced IT Hosted Solutions Business Management Data Backup Cloud Computing IT Support Google Innovation Data Applications Mobile Device Data Recovery Smartphone Wi-Fi Software Social Media Efficiency Internet of Things IT Services Network Miscellaneous Router Collaboration Small Business Saving Money Users Workers Office Employer-Employee Relationship Twitter Bandwidth Access Control Politics Computer Patch Management Data Management Business Intelligence Networking Company Culture Windows 10 Government Marketing Virtualization Data Breach IT Support Phishing Business Continuity Password Vulnerability Blockchain BDR Mobile Devices Windows 10 Save Money Microsoft Office Apps Battery Holiday Wireless Workplace Tips Medical IT Tip of the week Managed IT Service Artificial Intelligence Settings Gmail Hosted Solution Wireless Charging HIPAA Law Enforcement Website VoIP WiFi Facebook Dark Web Remote Computing Tech Terms Apple Spam Managing Stress Cortana iPhone Information Word Chrome Excel Virus Gadgets Paperless Office Compliance Cybercrime Automation Scam How To Maintenance App VPN Data Protection Computers Virtual Assistant Physical Security Disaster Recovery Operating System CrashOverride Streaming Media Help Desk Education File Sharing Windows Document Management Two-factor Authentication Backup and Disaster Recovery Hybrid Cloud IT budget Paper Outlook Telephone System WannaCry Email Management Office Tips Knowledge Current Events Smart Technology Database Authentication Travel Paste Safety RAM Managed IT Plug-In GDPR Files Remote Monitoring Telephony Cabling Machine Learning Downloads Botnet Upgrade User Security Digital Hard Drives Cables User Tip Hacking IT Management Ink Hard Drive Healthcare SaaS Comparison Managed IT Services Managed Service Provider Tactics Authorization Live Streaming Server Windows XP Microsoft Teams BYOD Storage Voice over IP Telecommute Trends Certification Business Technology Printers Edge SSD Voice over Internet Protocol Cost Management Worker PowerPoint Remote Support Processors Multi-Factor Security Specifications Retail Avoiding Downtime Internet Explorer Quick Tips WhatsApp Telephone Systems Dongle Mobile Device Management Error eCommerce Data loss A.I. Big Data Inventory Printer Telecommuting Network Attached Storage Sports Analytics Spyware G Suite Conferencing Threat Troubleshooting Lead Generation Remote Control Value Touchscreen Licensing Online Shopping Staff Movies Entertainment Sales Laptop Mobile Security Amazon Reporting Recovery Millennials Office 365 Spotify Server Management Connectivity HP Google Drive Technology Tips Bring Your Own Device Cleaning Content Filtering Printing Update Antivirus News Information Technology Spam Blocking Productivity Microsoft Office 365 Tech Support Copy Health Websites Unified Communications Tablet Webcam Google Maps Computer Care The Internet of Things Phone System DDoS Personal Information Credit Cards Staffing Samsung Wearables Environment Printer Server Instagram Gaming Console Managed Service Synergy Biometrics Encryption Thank You e-waste Proactive IT Employer Employee Relationship Video Games Gadget Hacker Profitability Emoji Access Vendor Management Data Security IaaS Budget Yahoo Congratulations disposal Remote Monitoring and Management Automobile Emergency Freedom of Information Autocorrect Mobility Television Shortcut Search Eliminating Downtime Unified Threat Management HaaS Net Neutrality Dark Data Training Wireless Internet Scheduling Regulation Money Security Cameras Leadership Scalability Hiring/Firing