Your Portland & Vancouver IT Information Source

Speak With Your Vancouver/Portland IT Specialists

The Pebble Steel Smartwatch Will Be Available on January 28th!

January 15th, 2014

Consumers have looked forward to wearable technology for years, and this year’s CES has labeled 2014 as the year of wearable tech. The Consumer Electronics Show (CES) 2014 featured the biggest names in wearable tech, many making announcements to prepare consumers for wearable technology to come.

Always Use Private Browsing Mode To Conduct Online Financial Transactions.

January 15th, 2014

Every major browser offers some type of private browsing mode:

On Safari and Firefox, it’s called Private Browsing.
On Google Chrome, it’s called Incognito Mode.
On Internet Explorer, it’s called InPrivate.

These modes are designed to keep your online activity safe from prying eyes.

Obsolete Technologies Your Law Firm Should Replace In 2014

January 15th, 2014

With technology advancements, older types of technology are fast becoming obsolete for today’s law firms. When ringing in the New Year consider replacing older technologies with new ones.

Traditional Fax Machines

While some employees still insist on using fax machines, virtual fax services are the preferred choice for law firms today.

Neiman Marcus Confirms Security Breach Over The Holiday Shopping Season.

January 14th, 2014

After Target Corp. revealed its data breach, — Neiman Marcus confirmed that cybercriminals also stole their customers’ payment card information over the holiday season. This is the second retailer that suffered a cyber-security attack during this time period!   
Neiman Marcus was notified by its credit card processor about the unauthorized payment activity in mid-December.

IMPORTANT! A Swiftly Morphing Virus Is Infecting Even The Most Protected IT Systems.

January 14th, 2014

A fast-moving, mutating computer virus is infecting even the most effectively protected IT systems. This swiftly morphing virus is getting past anti-virus protections and firewalls. — Reliance on them alone isn’t enough.

Each new mutated form of the virus is like a zero-day attack (such as the Cryptolocker virus). This means each strain of the virus has never been seen before by any organization.

PowerLocker: A Newer, Smarter Ransomware Inspired Cryptolocker’s Success.

January 13th, 2014

Criminal malware developers have created a new ransomware program called PowerLocker.  PowerLocker is used to encrypt files on infected computers so cybercriminals can demand ransom fees from victims to recover the files. The new ransomware appears to be inspired by the success of Cryptolocker, a program that’s infected more than 250,000 computers since September 2013.

Similar to Cryptolocker, PowerLocker uses strong encryption to prevent the user from recovering stolen files.

Yahoo Improves User Security With Automatic Encryption

January 13th, 2014

Yahoo is improving their security for Yahoo Mail users with automatic encryption. On January 7th, Yahoo enabled automatic HTTPS as the default for all users on their network. Plus they now use 2,048-bit encryption keys to secure certificates for encrypted communications between Web browsers and servers.

Healthcare Provider Neglects to Erase ePHI on a Photocopier Hard Drive and Is Fined $1.2 Million!

January 12th, 2014

Are you erasing ePHI (electronic protected health information) from your photocopier hard drives prior to disposing of them? If not, you could be assessed huge fines. On August 14th 2013, the U.S. Department of Health and Human Services (HHS) and Office for Civil Rights (OCR) announced that Affinity Health Plan, Inc.

At Least 70 Million “Targeted!”

January 11th, 2014

Holiday shoppers who shopped at Target stores between November 27th and December 15th should beware.  Target has now revealed that hackers stole the personal information of at least 70 million customers—30 million more than was previously estimated. Yet, it appears that 40 percent of people who shopped at Target during this period of time have not been notified about the data breach.

Did You Know? Desktop Virtualization Can Improve Your Information Security!

January 10th, 2014

Information security is a huge concern for organizations of all kinds. While information security is critical to achieve, it’s increasingly challenging to maintain. Firewalls, antivirus, access control and perimeter monitoring are important security measures, but today’s sophisticated cybercriminals are finding ways to bypass them and directly target data, applications and devices.