(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Tip of the Week: 4 Useful Tech Tips

Tip of the Week: 4 Useful Tech Tips

Certain technologies out there make you ask questions. For example, have you ever wondered why you need to restart your computer other than “because IT says to?” What about that task manager? What’s that for, anyway? We’re here to help you answer some questions about your business technology and why it’s important to keep them in mind during the workday.

0 Comments
Continue reading

Tip of the Week: NIST Password Guidelines

Tip of the Week: NIST Password Guidelines

Passwords have always been important to businesses, but they are priorities for organizations in certain industries. Government-based organizations in particular need to be concerned about using secure passwords. Of course, not all businesses are government-based, but there’s a thing or two your own can learn about some of their password practices.

0 Comments
Continue reading

Do Browser-Saved Passwords Stay Secure?

Do Browser-Saved Passwords Stay Secure?

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

These Companies Provide A Benchmark For Password Strength

These Companies Provide A Benchmark For Password Strength

We are never shy about insisting that certain standards are met when devising passwords, but many major companies are seemingly far less worried about password security than we are. A recent study conducted by the password manager developer Dashlane paints a troubling picture of the state of password security, providing anecdotal evidence in the form of some very well-known and trusted companies scoring at the low end of the password security spectrum.

0 Comments
Continue reading

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

0 Comments
Continue reading

PINs Distributed By Equifax Increases Risk

PINs Distributed By Equifax Increases Risk

By now, you’ve heard all about the Equifax data breach, which exposed sensitive information of 143 million individuals. To keep this from leading to identity theft and other challenges for these users, many professionals are encouraging them to freeze their credit lines. To do so, a PIN is required, which is something that a hacker can easily take advantage of.

0 Comments
Continue reading

What is your Identity Worth to You?


Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Cloud Network Security Productivity Malware Cybersecurity User Tips Smartphones Microsoft Tech Term Communication Hackers Email Communications Passwords Hardware Internet Google Backup Data Innovation Browser Managed IT Services Android Outsourced IT Business Ransomware Business Management Collaboration Software Mobile Devices Hosted Solutions Smartphone Mobile Device Alert VoIp Efficiency Windows 10 Data Recovery Applications Wi-Fi Network IT Services IT Support Internet of Things Small Business Data Backup Cloud Computing Holiday Users Wireless Social Media Router Password Miscellaneous Access Control Company Culture Twitter Networking Data Breach Facebook Workers Government Vulnerability Virtualization Bandwidth IT Support Computer Data Management BDR Blockchain Microsoft Office Patch Management Paperless Office Windows 10 Office Employer-Employee Relationship Apps Marketing Workplace Tips Battery Phishing Business Continuity Saving Money Politics Business Intelligence Chrome Save Money Word Virus HIPAA App Mobility VPN Scam Law Enforcement Spam Data Protection WiFi How To Virtual Assistant Tech Terms Managing Stress Apple Excel Tip of the week Managed IT Service Automation Settings Gmail Wireless Charging Information Medical IT Maintenance Office 365 G Suite iPhone Disaster Recovery Gadgets Compliance Website Computers Dark Web Remote Computing Physical Security Artificial Intelligence Cortana VoIP Cybercrime Data Security Managed IT Services Hosted Solution Machine Learning Downloads Lead Generation Printers Plug-In Conferencing Current Events Smart Technology Error Recovery Licensing Online Shopping Cabling Antivirus Hard Drives Cables Sales Laptop Cleaning Worker IT Management Ink Hacking Troubleshooting Telephone Systems Microsoft Teams HP E-Commerce Retail Tactics Millennials Telecommute Trends News Windows XP Training Education Content Filtering Managed Service Provider Touchscreen Tech Support Analytics SSD Voice over Internet Protocol Tablet BYOD Reporting Time Management Printer PowerPoint Update Dongle Remote Control File Sharing Document Management Managed IT Payment Personal Information Internet Explorer Data loss A.I. Telephone System WannaCry Botnet Security Cameras Avoiding Downtime Microsoft Office 365 Remote Monitoring Travel Help Desk Inventory Google Drive Knowledge Mobile Device Management Chrome OS Network Attached Storage Sports Files Telephony Outlook Information Technology Spam Blocking User Security Digital instant Messaging SaaS Threat Staff Copy Movies Hard Drive Wearables Value User Tip Authentication Live Streaming Server Upgrade Windows Mobile Security Two-factor Authentication Amazon Comparison GDPR Cost Management Server Management CrashOverride Connectivity Voice over IP Spotify Technology Tips Email Management Bring Your Own Device Business Technology Edge Vulnerabilities Printing Authorization Websites Paste Unified Communications Remote Support Processors Productivity Healthcare Streaming Media WhatsApp Health Certification Operating System Multi-Factor Security Specifications Storage eCommerce Backup and Disaster Recovery Hybrid Cloud Big Data Cryptocurrency IT budget Paper Quick Tips Safety RAM Spyware Office Tips Entertainment Database Telecommuting Environment Eliminating Downtime Access Scheduling Windows 7 Gadget Money Leadership Budget Thank You e-waste Proactive IT DDoS Wireless Internet Computer Care Shortcut Samsung Net Neutrality Congratulations disposal Remote Monitoring and Management Freedom of Information Synergy Instagram Gaming Console Search Encryption Scalability Hiring/Firing Employer Employee Relationship Hacker Emoji Video Games Managed Service Yahoo Vendor Management IaaS The Internet of Things Phone System Automobile Autocorrect Television Credit Cards Staffing Regulation Unified Threat Management Printer Server Emergency Google Maps Dark Data Profitability Biometrics Webcam HaaS