Exploits blog posts

Solarwinds, security, New River Computing, and you

Published February 05, 2021

Many recent news reports have come out regarding a massive hack of the Solarwinds Orion IT asset management system. This compromise is unprecedented in scale and reach, and the fallout from it will reverberate throughout the IT industry for years. Solarwinds Orion is one of many IT asset management systems (New River Computing uses one called Connectwise Automate). This software is great for managing a large number of IT systems, with the ability to provide security updates, monitoring, and many…Read more


The cost of "free" software

Published April 11, 2016

Have you ever been tempted to try to acquire expensive software without paying for it? It turns out that "free" software can be more expensive than one might think! Take Photoshop for example: Subscribers can sign up and start using Photoshop for as little as $10, a far cry from the high upfront cost that it used to be, in the range of $600+. Adobe’s move to this subscription model makes it easy for aspiring artists or even amateur photographers to use the professional software at a…Read more


Top 5 risks of outdated technology

Published February 16, 2016

Microsoft infographic about risks of using outdated technology.

Click on the image below to view Microsoft’s infographic of The Risky Business of Outdated Technology! We can help - contact us for a free network review.Read more


The dangers of peer-to-peer-file sharing

Published April 25, 2014

Graphic illustrating peer to peer connections

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on and on. How P2P Works The P2P application takes a piece of allotted data or sometimes whole directories from your hard drive and allows other users to freely download this content, and vice versa. P2P…Read more


How cyber-criminals steal money from bank accounts.

Published December 17, 2012

Here’s a great info-graphic from the security researchers at F-Secure that explains how cyber-criminals steal money from bank accounts. The original post can be found here.Read more


Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.