(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

It’s Cybersecurity Awareness Month! Educate Yourself on These Threats

It’s Cybersecurity Awareness Month! Educate Yourself on These Threats

October is Cybersecurity Awareness Month! To prepare for this incredibly important month, you’ll want to focus your efforts on ensuring your business is protected against the myriad of online threats that can pose a danger for your business. Thankfully, you don’t have to do it alone. With our trusted IT professionals by your side, you’ll be able to take the fight to hackers and other entities that threaten your data.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

The Right Analogy Makes Hacking Make More Sense

The Right Analogy Makes Hacking Make More Sense

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

0 Comments
Continue reading

What Does a SMiShing Attempt Look Like?

What Does a SMiShing Attempt Look Like?

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading
Featured

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

b2ap3_large_Alert_59619335

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Looking back over the events of 2016, one thing was made very clear by cybercriminals: ransomware is a rising star in their arsenal. In order to continue to remain protected against these threats, it is critical to have a clear understanding of them.

0 Comments
Continue reading

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.

0 Comments
Continue reading

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

It’s an unfortunate fact that cyber security threats are everywhere, and it doesn’t help that there are multiple kinds of threats to contend with out there. Here’s a quick runthrough of the different malwares and threats you may encounter, and the sort of damage they can cause.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Cloud Network Security Malware Cybersecurity Tech Term User Tips Productivity Smartphones Communication Backup Hackers Communications Internet Passwords Browser Managed IT Services Microsoft Email Business VoIp Outsourced IT Hosted Solutions Ransomware Alert Hardware Android Data Backup Google Mobile Device Cloud Computing IT Support Innovation Applications Smartphone Business Management Data Recovery Software Wi-Fi Data Internet of Things Network Router Social Media Small Business Collaboration Efficiency IT Services Miscellaneous Government Phishing Business Continuity Access Control Virtualization Patch Management Politics Business Intelligence IT Support Save Money Company Culture Windows 10 Password Windows 10 Holiday Marketing Mobile Devices Data Breach Users Workers Apps Networking Vulnerability Battery Saving Money Bandwidth Computer Data Management Microsoft Office Twitter Wireless BDR Blockchain Office Employer-Employee Relationship Wireless Charging Apple Computers Website VoIP Artificial Intelligence Cybercrime Workplace Tips Scam Medical IT iPhone App VPN Dark Web Remote Computing Gadgets Paperless Office Spam Cortana Word Chrome Virus Excel Physical Security Automation Tech Terms Hosted Solution How To Managing Stress Data Protection Maintenance HIPAA Virtual Assistant Disaster Recovery Information Law Enforcement Tip of the week Managed IT Service WiFi Gmail Compliance Facebook Settings Server Management Connectivity Paste Travel Touchscreen Mobile Security Amazon BYOD Knowledge Files Reporting Telephony Technology Tips Bring Your Own Device User Security Digital Printing User Tip Websites Unified Communications Update Hard Drive Avoiding Downtime Streaming Media Live Streaming Microsoft Office 365 Server Operating System Managed IT Services Mobile Device Management Entertainment Comparison Recovery Voice over IP Backup and Disaster Recovery Hybrid Cloud Printers Business Technology Help Desk Edge IT budget Paper Cleaning Safety RAM Antivirus Remote Support Outlook Processors Database Worker Machine Learning Downloads Telephone Systems WhatsApp Authentication Plug-In Retail Multi-Factor Security Specifications Spotify GDPR eCommerce Hard Drives Cables Education Upgrade Big Data IT Management Ink Telecommuting Microsoft Teams Analytics Productivity Spyware Tactics Printer Telecommute Trends Remote Control Health Authorization Lead Generation Managed IT Conferencing Healthcare PowerPoint Remote Monitoring Licensing Storage Online Shopping SSD Voice over Internet Protocol Botnet Sales Certification Laptop Millennials Dongle Google Drive Office Tips HP Internet Explorer Office 365 Data loss A.I. Information Technology Spam Blocking News Quick Tips Current Events Smart Technology SaaS Content Filtering Network Attached Storage Sports Copy Cabling Tech Support Error Inventory Tablet CrashOverride Hacking Cost Management G Suite Windows Two-factor Authentication File Sharing Document Management Threat Staff Movies Email Management Windows XP Telephone System Troubleshooting WannaCry Value Managed Service Provider Automobile Credit Cards Staffing Autocorrect Television Training Printer Server Unified Threat Management Wireless Internet Biometrics Congratulations Dark Data Regulation HaaS Freedom of Information Security Cameras Search Scheduling Access Gadget Environment Budget Money Leadership Wearables Emergency Computer Care DDoS Managed Service Shortcut Samsung e-waste Proactive IT Net Neutrality Personal Information Google Maps Webcam Instagram Gaming Console Synergy Profitability disposal Remote Monitoring and Management Encryption Data Security Employer Employee Relationship Scalability Hiring/Firing Mobility Video Games Hacker Emoji Eliminating Downtime Thank You Yahoo The Internet of Things Phone System Vendor Management IaaS