(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

What to Expect of Ransomware this Year

What to Expect of Ransomware this Year

Ransomware exploded in 2017, and after a year with as much success as these attacks saw, it is no wonder that 2018 is expected to see more. However, in order to remain successful, ransomware will have to change and improve. In today’s blog, we explore a few predictions as to how this threat will do so.

0 Comments
Continue reading

Ransomware Increasingly Targets Android Devices

Ransomware Increasingly Targets Android Devices

In recent years, how-to guides and YouTube videos have brought renewed enthusiasm for the phrase ‘Do It Yourself’. From services that will ship all the ingredients needed for a home-cooked meal right to your front door to a kit that contains all of the building materials one needs to make a fully functioning ‘tiny house’, DIY kits have made it easier for someone who is less than an expert to successfully complete a project or learn a skill. The Dark Web has taken this infatuation with ‘DIY’ to a whole new level with a rising increase in the sale of Ransomware kits.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Looking back over the events of 2016, one thing was made very clear by cybercriminals: ransomware is a rising star in their arsenal. In order to continue to remain protected against these threats, it is critical to have a clear understanding of them.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Cloud Network Security Malware Cybersecurity Tech Term User Tips Productivity Smartphones Communications Internet Communication Backup Hackers Managed IT Services Browser Microsoft Email Passwords Hosted Solutions Ransomware Alert Hardware Android Business VoIp Outsourced IT Innovation Smartphone Applications Data Recovery Business Management Wi-Fi Software Data Google Mobile Device Data Backup Cloud Computing IT Support Small Business Social Media Efficiency Collaboration IT Services Miscellaneous Network Router Internet of Things Marketing Holiday Apps Users Workers Battery Networking Data Breach Vulnerability Saving Money Bandwidth Computer Twitter Data Management Microsoft Office Wireless Blockchain BDR Government Office Employer-Employee Relationship Phishing Business Continuity Virtualization Patch Management Access Control IT Support Save Money Password Politics Business Intelligence Mobile Devices Windows 10 Company Culture Windows 10 Spam Cortana Physical Security Chrome Word Virus Medical IT Hosted Solution Tech Terms Excel Data Protection Automation HIPAA How To Managing Stress Virtual Assistant Maintenance Law Enforcement Information WiFi Disaster Recovery Facebook Tip of the week Managed IT Service Compliance Settings Gmail Apple Wireless Charging Computers Website Workplace Tips Cybercrime Artificial Intelligence VoIP iPhone Scam Gadgets Paperless Office App VPN Dark Web Remote Computing Plug-In Spotify Reporting Multi-Factor Security Specifications Machine Learning Downloads Worker WhatsApp Hard Drives Cables Telephone Systems Big Data IT Management Ink Retail Productivity Update eCommerce Education Spyware Tactics Health Microsoft Office 365 Telecommuting Microsoft Teams Lead Generation Managed IT Analytics Conferencing Telecommute Trends Printer Help Desk SSD Voice over Internet Protocol Remote Control Sales Laptop Remote Monitoring PowerPoint Office Tips Outlook Licensing Online Shopping Botnet Current Events Smart Technology HP Internet Explorer Authentication Millennials Dongle News SaaS Google Drive Cabling GDPR Content Filtering Data loss A.I. Office 365 Upgrade Inventory Information Technology Spam Blocking Hacking Tablet Network Attached Storage Sports Tech Support Copy Managed Service Provider Healthcare File Sharing Document Management Cost Management Threat Windows XP Authorization G Suite Certification Telephone System WannaCry Value Windows Two-factor Authentication Storage Staff Movies CrashOverride BYOD Mobile Security Amazon Email Management Knowledge Server Management Connectivity Travel Bring Your Own Device Paste Avoiding Downtime User Security Digital Printing Quick Tips Files Telephony Technology Tips Mobile Device Management Hard Drive Error User Tip Websites Unified Communications Entertainment Operating System Comparison Streaming Media Live Streaming Server Backup and Disaster Recovery Hybrid Cloud Business Technology Edge Recovery IT budget Paper Managed IT Services Troubleshooting Voice over IP Remote Support Processors Cleaning Database Printers Touchscreen Antivirus Safety RAM Money Leadership Environment Access Gadget Wireless Internet Budget Emergency Security Cameras Computer Care DDoS Personal Information e-waste Proactive IT Google Maps Samsung Shortcut Webcam Net Neutrality Wearables Instagram Gaming Console Synergy Encryption disposal Remote Monitoring and Management Employer Employee Relationship Managed Service Video Games Scalability Hiring/Firing Thank You Hacker Emoji Vendor Management IaaS Yahoo Autocorrect Television Automobile The Internet of Things Phone System Profitability Data Security Credit Cards Staffing Congratulations Unified Threat Management Mobility HaaS Regulation Printer Server Freedom of Information Dark Data Biometrics Search Eliminating Downtime Training Scheduling