(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

What Counts as Personally Identifiable Information?

What Counts as Personally Identifiable Information?

We frequently discuss the importance of keeping PII—personally identifiable information—secure, but what does this include? What data qualifies as PII?

Here, we’re going to lock down on a definition (and you may be surprised by what this definition covers).

0 Comments
Continue reading

Don’t Give Up on Password Managers, Even Though LastPass was Breached

Don’t Give Up on Password Managers, Even Though LastPass was Breached

In August, LastPass suffered a data breach that allowed hackers to access the LastPass source code. Let’s take a look at this situation and see what you need to do to maintain proper password security moving forward.

0 Comments
Continue reading

Here’s What Happens When You Delete Data

Here’s What Happens When You Delete Data

We bet you’ve gone through your old files at some point to clean things up a bit by deleting files from your computer. What if we told you that deleting those files doesn’t actually delete them—at least not entirely? Let’s go over how you can securely delete your files for good while you go about replacing hardware or upgrading your technology systems.

0 Comments
Continue reading

Beyond Bitcoin: The Function of Blockchain Technology

Beyond Bitcoin: The Function of Blockchain Technology

Since its origins back in 1991, the blockchain has had one core purpose: to securely store data. The methods behind it are exclusive to it as well. Let’s explore the concept of the blockchain a little further to gain a better appreciation of what it has enabled.

0 Comments
Continue reading

Streaming is a Major Part of Modern Life—Here’s How It Works

Streaming is a Major Part of Modern Life—Here’s How It Works

There’s no getting away from streaming nowadays—if you’re not binging something on Netflix/Hulu/HBOmax (etc, etc), you’re listening to your favorite song on your music platform of choice. This is largely due to the rising popularity of the “as-a-service” strategy that cloud services enable nowadays. Let’s take a closer look at streaming, and why it is now so ubiquitous.

0 Comments
Continue reading

Your Network Has Been Breached. Now What?

Your Network Has Been Breached. Now What?

We like to focus our efforts on preventing data breaches and cybersecurity attacks, but it’s important to know what you should do if you do fall victim to such an attack. Let’s go over how you should respond to a data breach and what you must consider to come out on the successful side of it.

0 Comments
Continue reading

Changes to Healthcare Technology Improving Care and Data Privacy

Changes to Healthcare Technology Improving Care and Data Privacy

For years you’ve heard how technology is becoming a bigger part of the healthcare delivery system and how it can help stabilize costs, provide increased access, and further personalize care delivery. As these innovations have been taking hold it has brought up serious questions about data privacy. Today, we’ll take a look at some of the changes IT has brought to healthcare and what it means for patient data privacy. 

0 Comments
Continue reading

Are Passwords an Effective Security Measure? Were They Ever?

Are Passwords an Effective Security Measure? Were They Ever?

Passwords have been front-and-center for data security since 1960, but even their creator–MIT researcher Fernando Corbató–doesn’t think he should take full credit passwords. In fact, if you brought this up to the researchers who did create them, they would tell you that the security concerns for their time were much more limited.

0 Comments
Continue reading

Don’t Miss World Backup Day (But Don’t Wait For It, Either)

Don’t Miss World Backup Day (But Don’t Wait For It, Either)

World Backup Day is March 31st, each and every year. However, while there is value to having a dedicated holiday to raise awareness of the need for backup, it should not be the only time it is considered. Let’s go over the importance of proper backup practices, just in time for the holiday, so that you can establish the backup that your business needs if it's not already in place.

0 Comments
Continue reading

Unfortunately, Ransomware is Just Getting Worse

Unfortunately, Ransomware is Just Getting Worse

Ransomware is a top threat, and it’s definitely not going anywhere anytime soon. To help you best combat it, let’s take a look at what you can do to keep ransomware from disrupting your organization and its operations. We’ll provide a brief overview of what ransomware is and what you can do to take the fight to it.

0 Comments
Continue reading

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Privacy Engineering Holds the Key to Future Data Privacy Decisions

Data privacy is central to most conversations in the business environment, and in a time when ransomware and hacks of all kinds are constantly receiving media presence, it’s no surprise that it is sensationalized to a certain extent. That said, it’s critical for businesses to understand what needs to be done to future-proof their data privacy infrastructures.

0 Comments
Continue reading

Helping You Understand What Informatics Are

Helping You Understand What Informatics Are

In the business world, the term “informatics” is generally used synonymously with computer science. While they are certainly quite similar, they are also quite different. What exactly does the field of informatics pertain to, and how can knowing this help your business prosper in the years to come?

0 Comments
Continue reading

Tip of the Week: Three Essential Data Backup Practices

Tip of the Week: Three Essential Data Backup Practices

A good data backup protects your business’ information (and because of this, the business itself) from a wide variety of threats. Of course, to accomplish this effectively, a data backup needs to itself be secure and reliable. Let’s take a few moments and go over a few practices and policies you would likely find it beneficial to adopt.

0 Comments
Continue reading

Could Your Business Soon Be Threatened By Freelance Hackers?

Could Your Business Soon Be Threatened By Freelance Hackers?

We’ve all seen advertisements for the websites that offer to connect you with the professionals ready to help you with a specialized task around your home, from repair work to childcare to cleaning services. Unfortunately, cybercriminals have adopted a similar tactic to help market their services, leading to the creation of a sort of hackers’ gig economy on the Dark Web.

0 Comments
Continue reading

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

It’s a bit of a nightmare scenario for a business, born of watching too many crime thrillers: a criminal syndicate hacks into their systems, wreaking havoc and stealing all their data, while also destroying that company’s reputation. Is this scenario a fantasy? To a point, yes—but not so much as you might think.

0 Comments
Continue reading

Data Backup Protects Everything You’ve Built

Data Backup Protects Everything You’ve Built

When you have a thorough and powerful data backup strategy in place at your business, you are protecting your operations, your employees, and your customers from an array of terrible scenarios. Unfortunately, many businesses don’t think of data loss in the terms it should be considered in, a complete travesty. Today, we thought we would briefly describe the long and short of data backup and recovery practices that can put your business in a position to secure and restore your data should it be corrupted, destroyed, or stolen.

0 Comments
Continue reading

The Right Practices Will Get Employees Thinking About Their Own Security

The Right Practices Will Get Employees Thinking About Their Own Security

People look at their work differently, just as they view their lives differently. The many different perspectives of your staff brings a bit of variance of how they view data security. This isn’t so good for your business as you need to trust them to prioritize the security of your data and infrastructure. Let’s take a look at some of the best practices that you should be training your staff in, which will allow them to protect your data better, and theirs. 

0 Comments
Continue reading

How to Count Down to Beneficial Data Redundancy

How to Count Down to Beneficial Data Redundancy

A business’ data needs to be considered a priority, which means that its protection should be prioritized accordingly. One facet of doing so is maintaining a backup with a strategy in compliance to best practices. To accomplish this, your backup should feature something that isn’t often considered a benefit: redundancy.

0 Comments
Continue reading

Solid State is a Solid Choice for Your PC’s Main Hard Drive

Solid State is a Solid Choice for Your PC’s Main Hard Drive

If you are buying a new desktop or laptop, one of the specifications you might care about is how much data it can store. After all, your family computer needs plenty of storage for your photos and documents, and if you have kids, they’ll want to install games and other applications on it that fill up a hard drive. These days, however, it’s less about how much space your hard drive has and more about how fast it can run. Let’s explain this, and then talk about something you should almost always look for when picking a hard drive for your PC.

0 Comments
Continue reading

Tip of the Week: Six Smart Practices for Data Security

Tip of the Week: Six Smart Practices for Data Security

If asked to list its most valuable assets, every modern business currently in existence should include its data on that list. This is part of the reason that data security should be treated as a priority. We know—this isn’t exactly a small ask, so to help, we’ve put together a few tips to get you started off on the right foot. If you’re already working on your data security preparedness, consider this a refresher.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite