Your Portland & Vancouver IT Information Source

Speak With Your Vancouver/Portland IT Specialists

Warning: Microsoft Support Scam on the Rise! Don’t Become an Unsuspecting Victim!

July 24th, 2014

In early 2010, many individuals fell victim to a common scam, wherein hackers disguised themselves as Microsoft support technicians to trick unsuspecting victims into paying a fee to remove malware from their computers. And in the past few weeks, this fake support scam has reappeared with a vengeance!

According to Kristen Kliphouse, Microsoft’s Executive of the Customer Service and Support Department, “this type of scam shows no signs of slowing down.

Look Out Avid Thrift Shoppers – Goodwill: The Next Possible Victim of Credit Card Data Theft?

July 23rd, 2014

Are you an avid-thrift shopper? If so, you must know your way up and down the aisles of your local Goodwill thrift shop! The organization sells donated clothing and household items, then uses the proceeds to fund:

Job training programs
Employment placement services
Various community based initiatives

But unfortunately, there’s some bad news for shoppers: Goodwill is investigating a security breach in order to determine what led to the theft of customers’ credit card data.

Important Notice: Microsoft to Eliminate 18,000 Jobs! What Does This Mean for Your Business?

July 22nd, 2014

Each year, around this time, Microsoft tends to announce some sort of restructuring and changes to the way they do business. Last week, many of our peers attended the Microsoft Worldwide Partner Conference in Washington, DC. Microsoft and their partners leverage this event to showcase the technology solutions that they’re developing and bringing to businesses like yours!

At the moment, Microsoft employs over 130,000 people globally, however, they’ve announced that 18,000 people will be laid off, including 12,500 associated with the Nokia Devices and Services team acquired earlier in 2014. Ultimately, this is a small sliver of their total workforce.

Would Your Business Be a Target for Hackers? Let’s Find Out – A Look at a Hacking Attempt from a Hacker’s Point of View!

July 18th, 2014

Why would an average, run of the mill computer hacker want to attack your business or website? A hacker would want to wreak havoc on your business or company website for a wide range of reasons, such as stealing viral company secrets or simply having some fun.

Small Business IT Support Your Business Can Depend On.

July 17th, 2014

As a small business owner or manager, you’re no stranger to challenges. And, unfortunately, there are more to come. — After three months of gains, the National Federation of Independent Business’s Small Business Optimism Index dropped by 1.6 points in June 2014.  Six of the index’s 10 components fell, with the largest being in business owners’ expectations for the economy.

There are many benefits to cloud computing that your business is missing out on. Here’s a list on why cloud is much more progressive and timely.

July 16th, 2014

Unlike large organizations which operate on large amount of resources, small businesses are reluctant when it comes to adopting new IT systems. Moving files to the cloud takes a lot of time, effort, and a bit of expertise that small businesses may find extraneous.

Cyber-Ransom An Increasing  Cyber Threat: Forces Code Spaces To Close Their Doors Forever!

July 15th, 2014

Cyber-ransom is increasing globally. How would you deal with a potential threat that will affect companies, and  millions of people's cyber data and assets?

Cyber-extortionists have been around since 1989. Miscreants hold your data hostage compelling individuals or organizations to pay some kind of ransom to retrieve data or suffer the consequences.

Here are some tools to help your Windows experience become easier and more enjoyable.

July 10th, 2014

If you haven’t had the time to explore your Windows, then you’re missing tons of obscured features that may just make your life easier. Windows is deep and flexible, that you can stretch it farther than your Internet browser. Your “Start” button is just one that hides a great potential.

If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen.

July 10th, 2014

Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data.