(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Do Browser-Saved Passwords Stay Secure?

Do Browser-Saved Passwords Stay Secure?

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

These Companies Provide A Benchmark For Password Strength

These Companies Provide A Benchmark For Password Strength

We are never shy about insisting that certain standards are met when devising passwords, but many major companies are seemingly far less worried about password security than we are. A recent study conducted by the password manager developer Dashlane paints a troubling picture of the state of password security, providing anecdotal evidence in the form of some very well-known and trusted companies scoring at the low end of the password security spectrum.

0 Comments
Continue reading

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

0 Comments
Continue reading

PINs Distributed By Equifax Increases Risk

PINs Distributed By Equifax Increases Risk

By now, you’ve heard all about the Equifax data breach, which exposed sensitive information of 143 million individuals. To keep this from leading to identity theft and other challenges for these users, many professionals are encouraging them to freeze their credit lines. To do so, a PIN is required, which is something that a hacker can easily take advantage of.

0 Comments
Continue reading

What is your Identity Worth to You?


Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Cloud Network Security Malware Cybersecurity User Tips Tech Term Smartphones Productivity Hackers Communications Communication Internet Backup Microsoft Managed IT Services Email Passwords Browser Outsourced IT Hosted Solutions Alert VoIp Hardware Android Ransomware Business Wi-Fi Software Smartphone Business Management Data Backup Cloud Computing IT Support Innovation Data Applications Google Data Recovery Mobile Device Small Business Internet of Things Social Media Efficiency IT Services Miscellaneous Network Router Collaboration Save Money Password Microsoft Office Wireless Mobile Devices Networking Windows 10 Holiday Office Employer-Employee Relationship Apps Users Workers Battery Saving Money Patch Management Access Control Politics Bandwidth Computer Blockchain Business Intelligence BDR Data Management Company Culture Windows 10 Twitter Marketing Data Breach Government Vulnerability Virtualization Phishing Business Continuity IT Support Maintenance iPhone Virtual Assistant Cybercrime Gadgets Paperless Office App VPN Scam Tip of the week Managed IT Service Disaster Recovery Gmail Medical IT Settings Wireless Charging Tech Terms Physical Security Managing Stress Website VoIP Hosted Solution Information HIPAA Dark Web Remote Computing Compliance Law Enforcement WiFi Computers Spam Facebook Cortana Word Chrome Apple Virus Artificial Intelligence Workplace Tips Excel How To Data Protection Automation Plug-In Reporting Office 365 News Machine Learning Entertainment Downloads Google Drive Content Filtering Tech Support IT Management Ink Update Information Technology Spam Blocking Tablet Hard Drives Recovery Cables Antivirus Tactics Microsoft Office 365 Copy File Sharing Document Management Cleaning Microsoft Teams CrashOverride Telephone System WannaCry Telecommute Trends Help Desk Windows Spotify Two-factor Authentication Productivity Travel Education PowerPoint Outlook Email Management Knowledge SSD Voice over Internet Protocol Files Telephony Internet Explorer Authentication Paste User Security Digital Dongle Health User Tip GDPR Managed IT Hard Drive Data loss A.I. Upgrade Office Tips Live Streaming Botnet Server Network Attached Storage Sports Comparison Inventory Remote Monitoring Managed IT Services Voice over IP Threat Authorization Current Events Smart Technology Business Technology Edge G Suite Healthcare Value Storage Remote Support Processors Staff SaaS Movies Certification Printers Cabling Worker WhatsApp Server Management Connectivity Hacking Multi-Factor Security Specifications Mobile Security Amazon Retail Windows XP eCommerce Printing Quick Tips Telephone Systems Managed Service Provider Cost Management Big Data Technology Tips Bring Your Own Device Telecommuting Error BYOD Spyware Websites Unified Communications Printer Lead Generation Streaming Media Analytics Conferencing Operating System Licensing Online Shopping IT budget Paper Troubleshooting Remote Control Avoiding Downtime Sales Laptop Backup and Disaster Recovery Hybrid Cloud Millennials Database Touchscreen Mobile Device Management HP Safety RAM Environment Wireless Internet Search Scheduling Security Cameras Scalability Hiring/Firing e-waste Proactive IT Money Leadership The Internet of Things Phone System DDoS Computer Care Wearables Credit Cards Staffing Samsung disposal Remote Monitoring and Management Webcam Personal Information Printer Server Google Maps Managed Service Biometrics Synergy Instagram Gaming Console Encryption Gadget Profitability Access Employer Employee Relationship Budget Thank You Emergency Hacker Emoji Video Games Yahoo Regulation Vendor Management IaaS Mobility Shortcut Autocorrect Television Eliminating Downtime Automobile Net Neutrality Congratulations Unified Threat Management Dark Data HaaS Training Freedom of Information