Cybersecurity blog posts

The most destructive computer viruses – infographic

Published October 05, 2015

Infographic of the most destructive computer viruses

Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software. Read more


HIPAA security – keeping data secure

Published July 24, 2015

If you are a "covered entity" under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but needed in order to conduct business. What business? Information that insurance companies need to process claims and health care professionals need for continuity of care. Due to more recent mandates, healthcare entities…Read more


5 Ways to Avoid a Phishing Attack

Published March 05, 2015

Five ways to avoid a phishing attack infographic

Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible. This particular one from AVNET's Behind the Firewall deals with Phishing Attacks. And offers the following five recommendations Determine who the real sender is. Check the salutation. Use you mouse hover to check links before clicking. Examine the footer. When in doubt, delete. Read more


Craigslist resume scam spreads Trojan virus

Published February 27, 2015

Reports of "Craigslist résumé" viruses have skyrocketed in recent months. Some of our clients here at New River Computing have unfortunately fallen victim to this recent outbreak. Thankfully, we've been successful at cleaning up the aftermath, but often the remediation process is long and arduous due to the sophistication of the malware. This particular malware campaign has been enjoying a fair bit of success because the attacks are specifically aimed at businesses that use…Read more


Battling fake Microsoft Support scammers

Published November 10, 2014

Microsoft scam graphic
Screenshot of Netstat
Screenshot of CPU monitor
Screenshot of Event Viewer
Screenshot of fake warning

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched Jerome Segura, a senior security researcher at Malwarebytes—catch some of these over-the-phone tactics on video. Unfortunately it seems scammers still use the telephone to cold call folks…Read more


Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.