Published October 05, 2015
Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software. Read more
Published July 24, 2015
If you are a "covered entity" under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but needed in order to conduct business. What business? Information that insurance companies need to process claims and health care professionals need for continuity of care. Due to more recent mandates, healthcare entities…Read more
Published March 05, 2015
Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible. This particular one from AVNET's Behind the Firewall deals with Phishing Attacks. And offers the following five recommendations Determine who the real sender is. Check the salutation. Use you mouse hover to check links before clicking. Examine the footer. When in doubt, delete. Read more
Published February 27, 2015
Reports of "Craigslist résumé" viruses have skyrocketed in recent months. Some of our clients here at New River Computing have unfortunately fallen victim to this recent outbreak. Thankfully, we've been successful at cleaning up the aftermath, but often the remediation process is long and arduous due to the sophistication of the malware. This particular malware campaign has been enjoying a fair bit of success because the attacks are specifically aimed at businesses that use…Read more
Published November 10, 2014
Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched Jerome Segura, a senior security researcher at Malwarebytes—catch some of these over-the-phone tactics on video. Unfortunately it seems scammers still use the telephone to cold call folks…Read more