(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

0 Comments
Continue reading

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

0 Comments
Continue reading

Misconfigured Database Almost Suplexes the WWE

Misconfigured Database Almost Suplexes the WWE

If you’re a fan of the spectacle put on by World Wrestling Entertainment, Inc., you may find yourself pinned thanks to an error made in some of their databases. This error allowed personal information from three million users to be accessed by anyone who knew where to look.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Cloud Network Security Malware Cybersecurity Tech Term User Tips Productivity Smartphones Communication Backup Hackers Communications Internet Passwords Managed IT Services Browser Microsoft Email Business VoIp Outsourced IT Hosted Solutions Ransomware Alert Hardware Android Data Google Mobile Device Data Backup Cloud Computing IT Support Smartphone Innovation Applications Data Recovery Business Management Wi-Fi Software Network Router Internet of Things Small Business Social Media Efficiency Collaboration IT Services Miscellaneous Office Government Employer-Employee Relationship Phishing Business Continuity Virtualization Patch Management Access Control IT Support Save Money Password Politics Business Intelligence Company Culture Windows 10 Mobile Devices Windows 10 Marketing Holiday Apps Users Workers Networking Data Breach Battery Saving Money Vulnerability Bandwidth Computer Twitter Data Management Wireless Microsoft Office BDR Blockchain Compliance Settings Gmail Wireless Charging Apple Computers Website iPhone Workplace Tips Cybercrime Artificial Intelligence VoIP App VPN Scam Gadgets Paperless Office Dark Web Remote Computing Spam Cortana Physical Security Chrome Word Virus Medical IT Hosted Solution Tech Terms Excel Managing Stress Data Protection Automation HIPAA How To Maintenance Law Enforcement Virtual Assistant Information WiFi Disaster Recovery Facebook Tip of the week Managed IT Service Movies CrashOverride BYOD Certification Telephone System WannaCry Value Windows Two-factor Authentication Storage Staff Travel Mobile Security Amazon Email Management Knowledge Server Management Connectivity Technology Tips Bring Your Own Device Paste Avoiding Downtime User Security Digital Printing Quick Tips Files Telephony Websites Unified Communications Mobile Device Management Hard Drive Error User Tip Live Streaming Server Entertainment Operating System Comparison Streaming Media Voice over IP Backup and Disaster Recovery Hybrid Cloud Business Technology Edge Recovery IT budget Paper Managed IT Services Troubleshooting Safety RAM Remote Support Processors Cleaning Database Printers Touchscreen Antivirus WhatsApp Plug-In Spotify Reporting Multi-Factor Security Specifications Machine Learning Downloads Worker eCommerce Education Hard Drives Cables Telephone Systems Big Data IT Management Ink Retail Productivity Update Microsoft Teams Spyware Tactics Health Microsoft Office 365 Telecommuting Help Desk Lead Generation Managed IT Analytics Conferencing Telecommute Trends Printer Licensing Online Shopping Botnet SSD Voice over Internet Protocol Remote Control Sales Laptop Remote Monitoring PowerPoint Office Tips Outlook Dongle Current Events Smart Technology HP Internet Explorer Authentication Millennials Office 365 Upgrade News SaaS Google Drive Cabling GDPR Content Filtering Data loss A.I. Tech Support Inventory Information Technology Spam Blocking Hacking Tablet Network Attached Storage Sports G Suite Copy Managed Service Provider Healthcare File Sharing Document Management Cost Management Threat Windows XP Authorization Vendor Management IaaS Yahoo Profitability Autocorrect Television Automobile The Internet of Things Phone System Unified Threat Management Credit Cards Staffing Congratulations Mobility HaaS Regulation Printer Server Freedom of Information Dark Data Eliminating Downtime Biometrics Search Training Scheduling Wireless Internet Money Leadership Environment Access Gadget Emergency Budget Security Cameras Computer Care DDoS Shortcut Webcam Personal Information e-waste Proactive IT Google Maps Samsung Net Neutrality Wearables Instagram Gaming Console Synergy Encryption disposal Remote Monitoring and Management Managed Service Employer Employee Relationship Hacker Emoji Video Games Scalability Hiring/Firing Thank You