(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Printers, along with every other piece of equipment that is on your network, require careful configuration and regular upkeep to ensure that they aren’t putting your data and users at risk. Security researchers recently discovered two massive vulnerabilities in HP Officejet All-in-One printers that make it incredibly easy for hackers to spread malware and gain access to a company’s network.

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

This Botnet Proves That There’s No Honor Among Thieves

This Botnet Proves That There’s No Honor Among Thieves

Cybercriminals and hackers aren’t exactly examples of the most trustworthy people online, so it should come as no surprise that they are willing to exploit each other for their own benefit. We recently saw an example of this phenomenon with the Cobain botnet.

0 Comments
Continue reading

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.

0 Comments
Continue reading

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

It’s an unfortunate fact that cyber security threats are everywhere, and it doesn’t help that there are multiple kinds of threats to contend with out there. Here’s a quick runthrough of the different malwares and threats you may encounter, and the sort of damage they can cause.

0 Comments
Continue reading

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

A sizable cache of personal information has been made public, with 33.7 million records being exposed. While not technically dangerous in its own right, this data could potentially be used to enable those with less-than-noble intentions.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Network Security Malware User Tips Tech Term Productivity Smartphones Internet Backup Hackers Communication Communications Email Browser Passwords Microsoft Managed IT Services Android Ransomware Hardware Business Outsourced IT Hosted Solutions VoIp Alert Innovation Applications Data Recovery Data Google Mobile Device Wi-Fi Software Data Backup Smartphone Cloud Computing IT Support Business Management Efficiency IT Services Miscellaneous Collaboration Network Router Internet of Things Small Business Social Media Marketing Computer Data Management Data Breach Twitter Vulnerability Networking Government Phishing Business Continuity Wireless Virtualization Microsoft Office IT Support Save Money Office Password Employer-Employee Relationship BDR Blockchain Windows 10 Mobile Devices Holiday Patch Management Access Control Users Workers Apps Politics Business Intelligence Battery Company Culture Windows 10 Bandwidth Saving Money Hosted Solution Spam HIPAA Cortana Chrome Law Enforcement Word Virus WiFi Excel Facebook Data Protection Automation How To Medical IT Tech Terms Virtual Assistant Apple Maintenance Managing Stress Disaster Recovery Tip of the week Managed IT Service Cybercrime App VPN Information iPhone Settings Gmail Scam Wireless Charging Gadgets Paperless Office Compliance Website VoIP Computers Physical Security Artificial Intelligence Workplace Tips Dark Web Remote Computing WhatsApp Troubleshooting Backup and Disaster Recovery Hybrid Cloud Office Tips Multi-Factor Security Specifications Worker IT budget Paper Touchscreen Telephone Systems Safety RAM Big Data SaaS Retail Database Current Events Smart Technology eCommerce Machine Learning Downloads Cabling Spyware Plug-In Telecommuting Reporting Ink Hacking Lead Generation Update Analytics Hard Drives Cables Conferencing Cost Management Printer IT Management Licensing Online Shopping Microsoft Office 365 Remote Control Microsoft Teams Windows XP Sales Laptop Tactics Managed Service Provider Telecommute Trends HP Help Desk BYOD Millennials PowerPoint News Outlook Google Drive SSD Voice over Internet Protocol Content Filtering Office 365 Tech Support Authentication Information Technology Spam Blocking Dongle Tablet Internet Explorer Avoiding Downtime Copy Data loss A.I. File Sharing Document Management Upgrade Entertainment Mobile Device Management GDPR CrashOverride Network Attached Storage Sports Telephone System WannaCry Windows Two-factor Authentication Inventory Recovery Travel Authorization Antivirus Email Management G Suite Knowledge Healthcare Cleaning Threat Paste Staff Movies User Security Digital Certification Value Files Telephony Storage Server Management Connectivity Spotify Hard Drive Education Mobile Security Amazon User Tip Live Streaming Server Quick Tips Technology Tips Bring Your Own Device Productivity Comparison Printing Websites Unified Communications Health Business Technology Edge Managed IT Managed IT Services Voice over IP Error Streaming Media Remote Support Processors Botnet Printers Operating System Remote Monitoring Synergy Access Instagram Gaming Console Gadget Training Encryption Budget Emergency Wireless Internet Environment Employer Employee Relationship Hacker Emoji Video Games Shortcut Yahoo Thank You Security Cameras Vendor Management IaaS Net Neutrality Autocorrect Television e-waste Proactive IT Automobile Unified Threat Management Dark Data Congratulations Wearables HaaS Freedom of Information Scalability Hiring/Firing disposal Remote Monitoring and Management Search Managed Service Scheduling The Internet of Things Phone System Money Leadership Credit Cards Staffing Profitability Printer Server DDoS Biometrics Data Security Computer Care Samsung Mobility Personal Information Regulation Google Maps Eliminating Downtime Webcam