(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

In November of 2014, the Federal Trade Commission announced that “two massive telemarketing operations” had been temporarily shut down after collecting over $120 million by “deceptively marketing computer software and tech support services.” It wasn’t long before these companies lost significant court judgements to the FTC, but by then, the money was gone.

0 Comments
Continue reading

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

0 Comments
Continue reading
Featured

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

b2ap3_large_Alert_59619335

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

A sizable cache of personal information has been made public, with 33.7 million records being exposed. While not technically dangerous in its own right, this data could potentially be used to enable those with less-than-noble intentions.

0 Comments
Continue reading

How Using the Wrong USB Cable Can Explode Your Device

How Using the Wrong USB Cable Can Explode Your Device

Anker has recalled their Powerline 3.1 Gen2 USB-C cable after it was discovered that a flaw within the cable caused it to potentially destroy any phone incapable of processing any more than five volts.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Cloud Network Security Productivity User Tips Malware Cybersecurity Smartphones Communication Microsoft Tech Term Email Hackers Passwords Communications Internet Google Backup Data Hardware Innovation Outsourced IT Managed IT Services Browser Android Business VoIp Business Management Ransomware Mobile Devices Collaboration Hosted Solutions Smartphone Software Alert Efficiency Mobile Device Data Backup Cloud Computing Network Windows 10 IT Support Applications IT Services Data Recovery Small Business Wi-Fi Internet of Things Access Control Holiday Router Users Social Media Password Miscellaneous Wireless Save Money Facebook Politics Networking Business Intelligence Government Patch Management Company Culture Virtualization Workers IT Support Data Breach BDR Vulnerability Bandwidth Blockchain Marketing Paperless Office Computer Windows 10 Data Management Word Chrome Apps Battery Microsoft Office Workplace Tips Saving Money Office Employer-Employee Relationship Phishing Business Continuity Twitter Cybercrime Settings Gmail Medical IT WiFi App VPN Wireless Charging VoIP Scam Managed IT Services Website Tech Terms Apple Managing Stress Spam Dark Web Information Remote Computing iPhone G Suite Gadgets Data Security Compliance Excel Cortana Mobility Automation Computers Virus Maintenance Office 365 Physical Security Disaster Recovery How To Artificial Intelligence Data Protection Hosted Solution Virtual Assistant HIPAA Tip of the week Managed IT Service Law Enforcement Help Desk Hard Drives Cables Hacking Chrome OS Entertainment IT Management Ink Telephone System WannaCry Microsoft Teams Knowledge Managed Service Provider instant Messaging Tactics Travel Windows XP Outlook Recovery Wearables Antivirus Files Telephony Authentication Cleaning Telecommute Trends User Security Digital BYOD Upgrade SSD Voice over Internet Protocol User Tip Printers GDPR PowerPoint Hard Drive Dongle Comparison Avoiding Downtime Vulnerabilities Education Internet Explorer Live Streaming Server Worker Mobile Device Management Telephone Systems Healthcare Voice over IP Retail Authorization Data loss A.I. Business Technology Edge Certification Inventory Storage Managed IT Personal Information Network Attached Storage Sports Remote Support Processors Remote Monitoring Multi-Factor Security Specifications Analytics Cryptocurrency Botnet Threat WhatsApp Printer Remote Control Value eCommerce Quick Tips Staff Movies Big Data Mobile Security Amazon Telecommuting Spotify Error SaaS Server Management Connectivity Spyware Technology Tips Bring Your Own Device Conferencing Google Drive Printing Lead Generation Productivity Information Technology Spam Blocking E-Commerce Licensing Online Shopping Health Troubleshooting Cost Management Websites Unified Communications Sales Laptop Copy Training Operating System Millennials Touchscreen Streaming Media HP Backup and Disaster Recovery Hybrid Cloud Content Filtering Windows Two-factor Authentication Reporting Time Management IT budget Paper News Office Tips CrashOverride Current Events Smart Technology Email Management Payment Database Tech Support Update Safety RAM Tablet Paste Security Cameras Plug-In Cabling Microsoft Office 365 Machine Learning Downloads File Sharing Document Management Printer Server Biometrics Thank You e-waste Proactive IT Scheduling Money Leadership Access Congratulations Gadget Managed Service DDoS disposal Remote Monitoring and Management Freedom of Information Budget Computer Care Samsung Search Shortcut Profitability Synergy Emergency Net Neutrality Instagram Gaming Console Encryption Employer Employee Relationship Windows 7 Eliminating Downtime Hacker Emoji Regulation Video Games Yahoo Google Maps Scalability Hiring/Firing Vendor Management IaaS Webcam Wireless Internet Automobile Autocorrect Television Unified Threat Management The Internet of Things Phone System Dark Data Environment Credit Cards Staffing HaaS