(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

In November of 2014, the Federal Trade Commission announced that “two massive telemarketing operations” had been temporarily shut down after collecting over $120 million by “deceptively marketing computer software and tech support services.” It wasn’t long before these companies lost significant court judgements to the FTC, but by then, the money was gone.

0 Comments
Continue reading

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

0 Comments
Continue reading
Featured

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

b2ap3_large_Alert_59619335

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

A sizable cache of personal information has been made public, with 33.7 million records being exposed. While not technically dangerous in its own right, this data could potentially be used to enable those with less-than-noble intentions.

0 Comments
Continue reading

How Using the Wrong USB Cable Can Explode Your Device

How Using the Wrong USB Cable Can Explode Your Device

Anker has recalled their Powerline 3.1 Gen2 USB-C cable after it was discovered that a flaw within the cable caused it to potentially destroy any phone incapable of processing any more than five volts.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Malware Cybersecurity Network Security Tech Term User Tips Productivity Smartphones Communications Internet Backup Communication Hackers Managed IT Services Browser Email Microsoft Passwords Alert Ransomware Hardware Android Outsourced IT Business VoIp Hosted Solutions Applications Data Recovery Business Management Wi-Fi Software Google Data Mobile Device Data Backup Cloud Computing Smartphone IT Support Innovation Efficiency Social Media Collaboration IT Services Miscellaneous Network Router Internet of Things Small Business Users Workers Saving Money Networking Data Breach Vulnerability Bandwidth Twitter Computer Data Management Wireless Government Microsoft Office BDR Blockchain Office Virtualization Employer-Employee Relationship IT Support Password Phishing Business Continuity Patch Management Access Control Mobile Devices Save Money Windows 10 Politics Business Intelligence Company Culture Windows 10 Apps Battery Marketing Holiday Spam Cortana Hosted Solution Chrome Word Virus Medical IT HIPAA Tech Terms Excel Law Enforcement Managing Stress Data Protection Automation WiFi How To Facebook Virtual Assistant Maintenance Information Disaster Recovery Apple Tip of the week Managed IT Service Compliance Settings Gmail Wireless Charging Computers iPhone Gadgets Paperless Office Website Workplace Tips Cybercrime Artificial Intelligence VoIP App VPN Scam Dark Web Remote Computing Physical Security Education Hard Drives Cables Telephone Systems Big Data IT Management Ink Retail Update eCommerce Microsoft Teams Spyware Tactics Microsoft Office 365 Office Tips Telecommuting Help Desk Current Events Smart Technology Lead Generation Managed IT Analytics Conferencing Telecommute Trends Printer Licensing Online Shopping Botnet SSD Voice over Internet Protocol Remote Control Cabling Sales Laptop Remote Monitoring PowerPoint Outlook Dongle Hacking HP Internet Explorer Authentication Millennials Upgrade Managed Service Provider News SaaS Google Drive GDPR Windows XP Content Filtering Data loss A.I. Office 365 Tech Support Inventory Information Technology Spam Blocking Tablet Network Attached Storage Sports BYOD G Suite Copy Healthcare File Sharing Document Management Cost Management Threat Authorization CrashOverride Certification Avoiding Downtime Telephone System WannaCry Value Windows Two-factor Authentication Storage Staff Movies Mobile Device Management Travel Mobile Security Amazon Email Management Knowledge Server Management Connectivity Technology Tips Bring Your Own Device Paste User Security Digital Printing Quick Tips Files Telephony Hard Drive Error User Tip Websites Unified Communications Live Streaming Server Entertainment Operating System Comparison Streaming Media Backup and Disaster Recovery Hybrid Cloud Spotify Business Technology Edge Recovery IT budget Paper Managed IT Services Troubleshooting Voice over IP Safety RAM Remote Support Processors Cleaning Database Printers Touchscreen Productivity Antivirus WhatsApp Plug-In Reporting Health Multi-Factor Security Specifications Machine Learning Downloads Worker Google Maps Budget Webcam Emergency Security Cameras Computer Care DDoS Personal Information e-waste Proactive IT Samsung Shortcut Net Neutrality Wearables Instagram Gaming Console Synergy Encryption disposal Remote Monitoring and Management Thank You Employer Employee Relationship Managed Service Video Games Scalability Hiring/Firing Hacker Emoji Vendor Management IaaS Congratulations Yahoo Profitability Autocorrect Television Freedom of Information Automobile The Internet of Things Phone System Unified Threat Management Data Security Search Credit Cards Staffing Mobility HaaS Regulation Printer Server Dark Data Eliminating Downtime Biometrics Training Scheduling Wireless Internet Money Leadership Environment Access Gadget