(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

The Wild Ride That Is Data Privacy, Part II

The Wild Ride That Is Data Privacy, Part II

Earlier this week, we published the first part of our blog, “The Wild Ride That Is Data Privacy” where we went over the systems in place in society that are designed to put your privacy at risk. We continue the article today. Please visit our blog to re.

0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part I

The Wild Ride That Is Data Privacy, Part I

Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes to protecting your privacy online. This post is going to be a bit of a deep rabbit hole, but I really want to shine some light on the subject for my readers.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

0 Comments
Continue reading

How Your Kids Can be Hurt by Devices (and Vice Versa)

How Your Kids Can be Hurt by Devices (and Vice Versa)

As technology advances and improves at an exponential rate, it is little wonder that today’s youth are growing up with a closer relationship to technology than any other generation before them. While this has opened up many beneficial opportunities for them, it can also be the source of many serious issues without the proper supervision.

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

These Companies Provide A Benchmark For Password Strength

These Companies Provide A Benchmark For Password Strength

We are never shy about insisting that certain standards are met when devising passwords, but many major companies are seemingly far less worried about password security than we are. A recent study conducted by the password manager developer Dashlane paints a troubling picture of the state of password security, providing anecdotal evidence in the form of some very well-known and trusted companies scoring at the low end of the password security spectrum.

0 Comments
Continue reading

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

When it comes to hacking and cybercrime, it can literally be a few seconds that will ruin your business. One single chink in your network’s armor is all it takes for your data to be compromised. Modern SMBs need to take every opportunity to ensure they’re using best practices to help keep their network safe and secure. Here’s a look at four network security bad habits that you and your team can fix today.

0 Comments
Continue reading

Tip of the Week: Improving Your Online Privacy

Tip of the Week: Improving Your Online Privacy

Most users are aware that their browsers offer a “secure” browsing experience. Google Chrome has Incognito mode, Microsoft’s Edge browser allows you to surf the Internet “InPrivate,” and Apple’s Safari offers Private Browsing as well. The trouble is, these “secure” browsing options aren’t actually all that secure. For today’s tip, we’ll discuss ways to actually keep your Internet browsing private.

0 Comments
Continue reading

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

0 Comments
Continue reading

Are You Doing Enough to Protect Your Data this Data Privacy Day?

Are You Doing Enough to Protect Your Data this Data Privacy Day?

January 28th marks Data Privacy Day, a day intended to raise awareness of the importance of data privacy and educate users and business owners of its benefits. Spearheaded by the National Cyber Security Alliance, there are plenty of lessons the NCSA has to share with businesses as this day puts their, and their clients’, privacy in the spotlight.

0 Comments
Continue reading

Your Computer Might Be Sharing Data with its Manufacturer

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

0 Comments
Continue reading

Are You Guilty of These Careless Security Flaws?

Are You Guilty of These Careless Security Flaws?

Did you know that a surprising number of data breaches are the result of insider threats? Insider threats are defined as data exposure, either malicious by nature or unintentional, that results from the actions of an employee in your workforce. With so many threats out there, it’s easy to forget that some of the most dangerous are right within your walls. How can you keep insider threats from becoming a major problem for your organization?

0 Comments
Continue reading

Cortana Toy Pulled Among Security Concerns

Cortana Toy Pulled Among Security Concerns

Smart technologies are becoming more and more prevalent in everyday life. As such, it may not be a bad idea to prepare today’s children for their technology-filled tomorrow. However, as Mattel discovered with their kid-targeted smarthome hub, Aristotle, it is important to make sure that these devices are secure enough to ensure the safety of their youthful users.

0 Comments
Continue reading

Why Boarding Pass Selfies Are A Really Bad Idea

Why Boarding Pass Selfies Are A Really Bad Idea

Too often, the desire to share an exciting travel destination with the world overrides any security or safety concerns one might have. Even people who are traveling for business will use social media to document their trip as a method of promoting their attendance at the event over social media. This includes photographing and sharing proprietary documents, like boarding passes and passports.

0 Comments
Continue reading

Keep Your Guard Up Against VoIP Fraud

Keep Your Guard Up Against VoIP Fraud

As with all innovative technology, there is only a certain amount of time you’ll have until someone inevitably finds ways to exploit it. One such exploitation of a common technology that has flown under the radar and avoided widespread knowledge by users is VoIP fraud. VoIP fraud is no different than other cybercrime - the exploitation of a network or data to procure ill-gotten gains.

0 Comments
Continue reading

Tip of the Week: How to Check and See What Websites and Apps are Tracking You

Tip of the Week: How to Check and See What Websites and Apps are Tracking You

You may be surprised to learn that your PC is connected to Internet services that go beyond the webpage displayed before you and the apps you have open. In some cases, these connections can be rather sketchy. Here’s how to check these hidden Internet connections, and turn off the ones you don’t need.

0 Comments
Continue reading

Room Service, You Want Malware?

Room Service, You Want Malware?

In a recent finding, assorted large hotels owned and operated by HEI Hotel & Resorts have been victims of malware since 2015. 20 of the company’s hotels were affected, with customer financial data being exposed in a real-time, point-of-sale malware attack. Have you recently stayed at one of these hotels?

0 Comments
Continue reading

What You Can Learn From Recent Hacking Attacks Against Celebrities

What You Can Learn From Recent Hacking Attacks Against Celebrities

It appears that the Department of Homeland Security is stepping in after one of the Ghostbusters had her personal information leaked online after falling victim to a cyber attack. Leslie Jones, who played Patty Tolan in the recent reboot, had not only photos of her passport and driver’s license but also nude images of herself--allegedly taken from the comedian’s iCloud account--posted on her website by hackers. Less than a day after her website was taken down, Homeland Security began an investigation into the hack.

0 Comments
Continue reading

What is your Identity Worth to You?


Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity User Tips Malware Cybersecurity Smartphones Communication Tech Term Microsoft Email Passwords Hackers Communications Data Hardware Internet Google Backup Android Business Innovation Managed IT Services Outsourced IT Browser Software Alert Efficiency Mobile Device VoIp Ransomware Business Management Mobile Devices Collaboration Smartphone Hosted Solutions Small Business Data Recovery Internet of Things Wi-Fi Data Backup Cloud Computing Windows 10 Network Applications IT Support IT Services Miscellaneous Access Control Wireless Holiday Router Users Social Media Password Microsoft Office Apps Chrome Battery Word Networking Saving Money Office Employer-Employee Relationship Phishing Business Continuity Twitter Politics Save Money Blockchain Facebook Business Intelligence BDR Company Culture Government Virtualization Workers Patch Management Data Breach IT Support Vulnerability Workplace Tips Paperless Office Bandwidth Computer Windows 10 Data Management Marketing Cortana Physical Security Disaster Recovery Virus Medical IT Tech Terms Hosted Solution HIPAA Data Protection How To Managing Stress Virtual Assistant Law Enforcement Information WiFi Cybercrime VoIP Scam Managed IT Services App VPN Tip of the week Managed IT Service G Suite Compliance Settings Gmail Apple Wireless Charging Data Security Computers Spam Mobility Website iPhone Artificial Intelligence Gadgets Excel Automation Dark Web Remote Computing Maintenance Office 365 Hard Drives Cables Productivity Payment Big Data IT Management Ink Update eCommerce Information Technology Spam Blocking Health Cost Management Security Cameras Spyware Tactics Microsoft Office 365 Telecommuting Copy Microsoft Teams Lead Generation Windows Two-factor Authentication Chrome OS Conferencing CrashOverride Telecommute Trends Help Desk SSD Voice over Internet Protocol Office Tips instant Messaging Sales Laptop PowerPoint Outlook Licensing Online Shopping Email Management Wearables HP Internet Explorer Current Events Smart Technology Authentication Millennials Paste Dongle News GDPR Content Filtering Data loss A.I. Cabling Upgrade Inventory Vulnerabilities Tablet Network Attached Storage Sports Hacking Entertainment Tech Support Windows XP Recovery Healthcare File Sharing Document Management Threat Managed Service Provider Authorization Telephone System WannaCry Printers Value BYOD Antivirus Storage Staff Movies Cleaning Certification Mobile Security Amazon Cryptocurrency Knowledge Worker Server Management Connectivity Travel User Security Digital Retail Printing Avoiding Downtime Education Quick Tips Files Telephony Telephone Systems Technology Tips Bring Your Own Device Hard Drive Mobile Device Management Error User Tip Websites Unified Communications Analytics Operating System Comparison Printer Streaming Media Managed IT Personal Information Live Streaming Server Hybrid Cloud Remote Monitoring E-Commerce Business Technology Edge IT budget Paper Botnet Troubleshooting Voice over IP Remote Control Backup and Disaster Recovery Training Remote Support Processors Database Touchscreen Safety RAM Google Drive Plug-In Reporting Time Management Multi-Factor Security Specifications Machine Learning Downloads Spotify SaaS WhatsApp Employer Employee Relationship Emergency Video Games Scalability Hiring/Firing Hacker Emoji e-waste Proactive IT Webcam Yahoo Google Maps Vendor Management IaaS Automobile The Internet of Things Phone System Autocorrect Television Credit Cards Staffing Unified Threat Management Printer Server disposal Remote Monitoring and Management Dark Data HaaS Managed Service Biometrics Thank You Scheduling Access Gadget Money Leadership Profitability Congratulations Budget Computer Care Regulation DDoS Freedom of Information Samsung Windows 7 Shortcut Search Eliminating Downtime Net Neutrality Instagram Gaming Console Synergy Environment Encryption Wireless Internet