(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

What to Expect of Ransomware this Year

What to Expect of Ransomware this Year

Ransomware exploded in 2017, and after a year with as much success as these attacks saw, it is no wonder that 2018 is expected to see more. However, in order to remain successful, ransomware will have to change and improve. In today’s blog, we explore a few predictions as to how this threat will do so.

0 Comments
Continue reading

Ransomware Increasingly Targets Android Devices

Ransomware Increasingly Targets Android Devices

In recent years, how-to guides and YouTube videos have brought renewed enthusiasm for the phrase ‘Do It Yourself’. From services that will ship all the ingredients needed for a home-cooked meal right to your front door to a kit that contains all of the building materials one needs to make a fully functioning ‘tiny house’, DIY kits have made it easier for someone who is less than an expert to successfully complete a project or learn a skill. The Dark Web has taken this infatuation with ‘DIY’ to a whole new level with a rising increase in the sale of Ransomware kits.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Looking back over the events of 2016, one thing was made very clear by cybercriminals: ransomware is a rising star in their arsenal. In order to continue to remain protected against these threats, it is critical to have a clear understanding of them.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity User Tips Malware Cybersecurity Smartphones Communication Microsoft Tech Term Hackers Communications Email Passwords Hardware Internet Google Data Backup Business Outsourced IT Innovation Managed IT Services Browser Android VoIp Mobile Devices Smartphone Hosted Solutions Ransomware Alert Efficiency Business Management Collaboration Software IT Support Mobile Device Data Backup Cloud Computing Data Recovery Windows 10 Small Business Wi-Fi Applications IT Services Network Internet of Things Access Control Password Holiday Users Social Media Wireless Miscellaneous Router Paperless Office Save Money Chrome Word Politics Networking Business Intelligence Windows 10 Company Culture Apps Battery Workers Data Breach Saving Money Vulnerability Blockchain BDR Bandwidth Twitter Computer Data Management Patch Management Facebook Microsoft Office Workplace Tips Government Office Employer-Employee Relationship Virtualization Marketing Phishing Business Continuity IT Support iPhone Cortana Gadgets Cybercrime VoIP VPN Virus Medical IT Scam Managed IT Services App Tech Terms Data Protection How To Managing Stress Virtual Assistant Spam Physical Security Information G Suite Hosted Solution Tip of the week Managed IT Service Compliance Settings Gmail Excel HIPAA Law Enforcement Automation Wireless Charging WiFi Data Security Computers Maintenance Office 365 Mobility Website Disaster Recovery Artificial Intelligence Apple Dark Web Remote Computing Hard Drives Cables Payment Big Data IT Management Ink Update eCommerce Security Cameras Entertainment Spyware Tactics Microsoft Office 365 Telecommuting Microsoft Teams Lead Generation Chrome OS Recovery Conferencing Telecommute Trends Help Desk SSD Voice over Internet Protocol instant Messaging Cleaning Sales Laptop Printers PowerPoint Spotify Outlook Antivirus Licensing Online Shopping Productivity Wearables HP Internet Explorer Authentication Millennials Worker Dongle Upgrade Education News Telephone Systems GDPR Content Filtering Retail Data loss A.I. Health Inventory Vulnerabilities Tablet Network Attached Storage Sports Tech Support Office Tips Managed IT Healthcare Personal Information File Sharing Document Management Analytics Threat Authorization Printer Botnet Certification Telephone System WannaCry Remote Control Value Current Events Smart Technology Storage Remote Monitoring Staff Movies Mobile Security Amazon Cryptocurrency Knowledge Server Management Connectivity Cabling Travel Technology Tips Bring Your Own Device SaaS User Security Digital Google Drive Printing Hacking Quick Tips Files Telephony Hard Drive Information Technology Spam Blocking Managed Service Provider Error User Tip Websites Unified Communications Windows XP Server Copy Operating System BYOD Cost Management Comparison Streaming Media Live Streaming Backup and Disaster Recovery Hybrid Cloud E-Commerce Business Technology Edge Windows Two-factor Authentication IT budget Paper Troubleshooting Voice over IP CrashOverride Training Remote Support Processors Email Management Database Avoiding Downtime Touchscreen Safety RAM WhatsApp Paste Plug-In Mobile Device Management Reporting Time Management Multi-Factor Security Specifications Machine Learning Downloads HaaS Printer Server Search Dark Data Emergency Biometrics e-waste Proactive IT Scheduling Money Leadership Access Gadget disposal Remote Monitoring and Management Budget Webcam Computer Care Google Maps DDoS Managed Service Samsung Shortcut Net Neutrality Instagram Gaming Console Profitability Synergy Encryption Regulation Employer Employee Relationship Thank You Windows 7 Video Games Scalability Hiring/Firing Hacker Eliminating Downtime Emoji Vendor Management IaaS Yahoo Autocorrect Television Automobile The Internet of Things Phone System Congratulations Environment Credit Cards Staffing Freedom of Information Wireless Internet Unified Threat Management