Your Portland & Vancouver IT Information Source

Speak With Your Vancouver/Portland IT Specialists

Mobile Threat Alert! New Trojan Malware Targets Android Devices Connected To Your PC

January 28th, 2014

Symantec is warning businesses and consumers about a new computer Trojan program that can install mobile banking malware on Android devices connected to infected PCs. This is an unusual method, as in the past, mobile attackers infected devices using social engineering and fake applications hosted on third-party app stores.

Retail POS Security: Four Ways To Prevent Cybercriminals From Attacking Your Point-of-Sales Systems.

January 28th, 2014

The Target and Neiman Marcus (and now Michaels) data breaches generated a lot of concern for retail businesses. The data breaches were caused by memory-scraping malware that’s designed to steal customer names, credit cards numbers, and other personal information.

Security Software Extension For XP Won’t Protect Your Business.

January 27th, 2014

Microsoft will continue to update security software for its 12-year old Windows XP operating system until July 14th, 2015. Previously, they were planning to end support by April 8th, 2014.  But they decided to extend the deadline because so many organizations were behind on the migration process.

Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

January 26th, 2014

The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target stores over the 2013 holiday shopping season.  Now Michael’s Craft Store, the largest arts and crafts dealer in the U.S. suspects it has been affected by a POS security breach as well.

Using Cloud Backup: It’s Essential To Test Your Cloud Backups On A Regular Basis.

January 24th, 2014

Cloud backup offers a secure and encrypted method of protection for your critical business data. But unless you test it regularly, you won’t know if it is truly backing up all your data, or if you can access your data in a timely fashion.

You can rest assured knowing your data is secure as long as you perform regular tests to ensure your data is recoverable.

How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?

January 23rd, 2014

Cybercriminals are always looking for weak points in a network system to hack the security system of your business and get confidential information. Some hackers do it for the pleasure of wreaking havoc on security systems, while others do it for financial reasons; regardless of the reason, malicious attacks are an awful experience for businesses.

Useful iPad Apps For Your Law Practice

January 22nd, 2014

If you’re like other attorneys today, you use your iPad during trials, depositions and when on the go. In fact, an iPad can be an extremely useful tool as long as proper security measures are in place to ensure sensitive data remains protected. There are thousands of apps available to increase your productivity wherever you are.

“Smart” Appliances Now Pose a Global Malicious IT Threat!

January 21st, 2014

You’re probably aware of the malicious activity waiting to attack your computer and smartphone. But have you ever worried about the security of your home appliances? An Internet security firm recently discovered a global cyber-attack involving more than 100,000 consumer gadgets, including home-networking routers, televisions, and a “smart” refrigerator.