(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Mobile Malware is a Guaranteed Bad Time

Mobile Malware is a Guaranteed Bad Time

More often than not, the malware you encounter will target a desktop computer. Despite this, there are indeed some threats that target mobile devices, including one which Google had to remove from the Play Store for infecting smartphones with malware and adware. We recommend that you take immediate action to uninstall these apps if you were one of the unfortunate folks who accidentally installed them.

0 Comments
Continue reading

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft generally takes security very seriously, and for the most part, if you keep your Windows and Server operating systems updated, you can generally depend on some base-level security and stability. Unfortunately, it was recently discovered that, for almost two years, a very critical defense mechanism within Windows wasn’t being properly secured.

0 Comments
Continue reading

Dealing with Bloatware Can be a Giant Pain in the Neck

Dealing with Bloatware Can be a Giant Pain in the Neck

Purchasing new technology sure is exciting… until you realize that it comes preloaded with loads of software that not only slows your device down but could also be harmful or irritating to deal with. What can you do about this unneeded and unwanted software? We recommend that you read this blog to find out.

0 Comments
Continue reading

All You Need to Know About the Raspberry Robin Worm

All You Need to Know About the Raspberry Robin Worm

Using USB drives to spread threats is certainly not a novel concept, and you should always be wary of potential threats using USB drives to make their rounds. In particular, a new and emerging threat called the Raspberry Robin worm could shake things up in the world of cybersecurity. What is this threat, and how can you keep yourself and your business safe from its attacks?

0 Comments
Continue reading

Greedy New Android Malware Can Empty Your Wallet

Greedy New Android Malware Can Empty Your Wallet

A new type of Android malware called “toll fraud malware” has been discovered, leading many individuals to question why they are being signed up for services that they do not want. In other words, there is malware out there that is spending users’ money without their permission. How rude!

0 Comments
Continue reading

The Threat Landscape and What You Can Do to Navigate It

The Threat Landscape and What You Can Do to Navigate It

Cybercrime is up, way up. This is problematic for businesses in general, but can be a really serious issue for those companies that don’t have security measures in place that can thwart potential attacks. Today, we’ll talk briefly about how big of a problem cybercrime is and some steps your business can take to keep from becoming a statistic. 

0 Comments
Continue reading

What Data is Stolen During a Ransomware Attack?

What Data is Stolen During a Ransomware Attack?

You can’t check the news without seeing the word “ransomware” plastered across the screen. It’s a major threat for businesses in just about any industry and of any size. In order to keep your business safe both now and into the future, you’ll have to implement adequate security measures that can put a stop to these types of threats. Of course, it’s easier said than done, especially when certain data is more likely to be targeted than others.

0 Comments
Continue reading

Just Because You’re Sick of Ransomware Doesn’t Mean It’s Gone Away

Just Because You’re Sick of Ransomware Doesn’t Mean It’s Gone Away

Ransomware is perhaps one of the most difficult types of malware to handle, and it has enabled cyber-extortion to flourish over the past several years. As a business owner, you need to know what ransomware is, how it should be addressed, and how to protect against it.

0 Comments
Continue reading

Ads Can Carry Malicious Code

Ads Can Carry Malicious Code

Sometimes you might be browsing the Internet and come across an advertisement for free downloads of Windows applications. Obviously, this is too good to be true, and hackers tend to exploit advertisements to spread their influence across devices. Malvertising is used to deliver various types of threats, all of which can cause considerable harm to unprepared businesses.

0 Comments
Continue reading

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

If you look at all of the security-related headlines from the past year, what do you think the biggest trend is? Perhaps it was the plethora of large-scale ransomware campaigns that struck both individuals and businesses in spades. Even now, ransomware continues to make headlines by changing its tactics, with one of the more recent ones being in regards to fake ransomware.

0 Comments
Continue reading

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered.

The new updates were pushed out on Monday, September 13th, 2021, and include a major security fix for the Apple iPhone, Apple iPad, Apple Watch, and Apple Mac computers and laptops.

0 Comments
Continue reading

Zero-Day Vulnerability Causes Major Problems for IT Providers

Zero-Day Vulnerability Causes Major Problems for IT Providers

A new ransomware attack has surfaced, this time mostly targeting IT companies and their clients. The attack is specifically targeting the Kaseya platform. Kaseya is management software that many IT companies use to remotely manage and support technology. The attack in question attacked Kaseya’s supply chain through a vulnerability in its VSA software; this attack is notable because of how it targeted the supply chain, not only striking at the vendor’s clients—notably IT companies—but also their customers. Basically, this attack had a trickle-down effect that is causing widespread chaos for a massive number of businesses.

0 Comments
Continue reading

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

Major cyberattacks seem a dime a dozen these days, especially with businesses that might not seem like possible targets. For example, McDonald’s restaurants recently suffered a data breach. Let’s take a look at the situation, how it played out, and what we can learn from it.

0 Comments
Continue reading

What Threat is a Small Business Really Under?

What Threat is a Small Business Really Under?

Small businesses face a lot of risks, one obvious one being the threat of potential cybercrime and how its influence can impact their businesses. Let’s consider how these influences have taken shape, and the challenges that small and medium-sized businesses must now face as a result.

0 Comments
Continue reading

Tip of the Week: Mobile Malware’s Warning Signs

Tip of the Week: Mobile Malware’s Warning Signs

Chances are, you own a smartphone, and that device helps you to manage quite a bit, both personally and professionally. As smartphones have risen in importance, they have also drawn the attention of hackers who attack via malicious applications. Here, we wanted to offer some tips that can help you spot these malicious apps before falling victim.

0 Comments
Continue reading

Watch Out for All Different Kinds of Ransomware

Watch Out for All Different Kinds of Ransomware

Ransomware has become infamous in the past few years, largely due to its involvement in a growing number of cyberattacks during this time. Of course, not all ransomware works in the same way, and recognizing the difference could prove to be useful. Therefore, we’ve taken a few moments and assembled a brief description of the four most common ransomware varieties.

0 Comments
Continue reading

Coronavirus Anxiety Causing Expanded Phishing Threats

Coronavirus Anxiety Causing Expanded Phishing Threats

The COVID-19 pandemic has certainly changed the way we do things in a very short period of time. Unfortunately, in times of absolute crisis and anxiety, cybercriminals use it as camouflage to steal data and infiltrate normally-secure networks. Let’s take a look at some of the ways hackers are able to exploit your employees and how you can work to protect your business. 

0 Comments
Continue reading

A Guide to Help You Understand All the Digital Threats You Face

A Guide to Help You Understand All the Digital Threats You Face

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

0 Comments
Continue reading

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

Is it Wrong to Purchase Access to Your Own Data?

Is it Wrong to Purchase Access to Your Own Data?

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite