Best Ways to Avoid and Remove Scareware

One of the methods black hat Internet marketers and hackers have of “tricking you into clicking” on their shady ads or pop-ups is scareware. It actually first cropped-up almost ten years ago, but more sophisticated scareware is making the rounds on the ‘Net, threatening computer networks that are outfitted with the best antivirus and malware detection tools, simply because it relies on human gullibility, not having to bypass normal cybersecurity measures.

Network Monitoring & Network Efficiency

Network monitoring and its role in network efficiency.

One can tell how well a network monitoring system operates by simply investigating how mature the monitoring program is. This can be discovered when looking at the single pane of glass view, as an immature system’s method of performance tracking is nearly impossible to see.

Exchange Sync App Now Available in Android with Gmail Add-On

The announcement about the Android Gmail app add-on that expands the Exchange Active Sync features came last spring, but is worth reiterating: You can download the Gmail app in Galaxy Nexus and Motorola phones running Android and implement Exchange Sync via Google Play, which gives you many more (work-oriented) Gmail features right at your mobile fingertips.

New Strain of Ransomware Masquerades as Windows Update

A new bit of ransomware known as 'Fantom' has been discovered by Jakub Kroustek of AVG Technologies. Fantom tricks users by dropping an executable file onto infected devices named a.exe. The file poses as a "critical update" for Windows, with a 2016 copyright from Microsoft included for an added appearance of legitimacy.

Dropbox Hacked: Yet Another Argument for Better Encryption

You may have heard that 68 million Dropbox users were recently told by the company that they needed to change their passwords due to a general hack of their database. The hack occurred in 2012, but it was only after years of persistent rumors by Netizens and cybersecurity mavens that Dropbox finally came clean about the hack.

An IT Support Company You Can Count On

Are you in search of quality IT support in Vancouver and Portland from a company you can rely on? Maybe you’re looking for responsive, managed services provided by IT professionals that cover the full spectrum of network infrastructure and security? Well, you’re in luck, because in this Age of Connectivity you can have the same trusted IT pros providing service in both cities! You don’t have to search for one IT company in Vancouver and another IT company in Portland OR. Phoenix Technology makes information technology connectivity and security easy, getting small, medium, and large businesses in the Portland area hooked up and, with a monthly managed services package, monitored for any and all security or data breach threats.

FTC Chief Technologist’s Mobile Phone Number and Account Hijacked

And How You Can Learn from This Mishap

How is it that the Federal Trade Commission’s Chief Technology Officer – a woman by the name of Lorrie Cranor – had her mobile phone account hijacked? Apparently, it was all too easy: Someone posing as Cranor walked into a mobile phone store posing as her, said she wanted two phone upgrades, and walked away with new iPhones, all on Cranor’s tab.

All Your Microsoft Office 365 Needs Covered with 24/7 IT Support

Microsoft’s Office 365 program represents a great data management opportunity and database. It also represents a somewhat complex and hard-to-figure-out labyrinth of user experience for some. As well, it presents a certain data breach vulnerability that requires dedicated, managed IT support.