IT Consulting and Tech Support Blog

Category Archives: Technology Trends

Information regarding the latest trends in technology.

Top 5 Risks of Outdated Technology

Click on the image below to view Microsoft’s infographic of The Risky Business of Outdated Technology! We can help – Contact us for a free network review!

Also posted in Exploits, Microsoft Windows | Comments Off on Top 5 Risks of Outdated Technology

HIPAA security – keeping data secure

If you are a “covered entity” under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but…

Also posted in Exploits, Mobile Security, Uncategorized, Vulnerabilities, Web Security | Comments Off on HIPAA security – keeping data secure

How will users upgrade to Windows 10?

Microsoft seems to be (mostly) following Apple’s OSX strategy by making its own upcoming OS “Windows 10” a free upgrade. According to Thurrott.com, “Microsoft says it will deliver the final version of Windows 10 to 190 countries sometime between June 21 and September 23, 2015.”…

Also posted in Microsoft Windows | Tagged , , , , , , , | Comments Off on How will users upgrade to Windows 10?

Battling Fake Microsoft Support Scammers

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched…

Also posted in Exploits, Microsoft Windows, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , | Comments Off on Battling Fake Microsoft Support Scammers

The Dangers of Peer-to-Peer File Sharing

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on…

Also posted in Exploits, Vulnerabilities, Web Security | Tagged , , , , , , , , , , | Comments Off on The Dangers of Peer-to-Peer File Sharing

Computers Cannot Survive By Anti-Virus Software Alone

Over the past few weeks, several widely knows companies have been competing for top spots in many of the major news headlines but, for all the wrong reasons. Retail giant Target, to offer just one recent example, could be forced to pay millions of dollars…

Also posted in Exploits, New River Computing News, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , , , , | Comments Off on Computers Cannot Survive By Anti-Virus Software Alone

The CryptoLocker Virus is Spreading!!!

***IMPORTANT ANNOUNCEMENT FROM NEW RIVER COMPUTING REGARDING THE “CRYPTOLOCKER” VIRUS*** There’s a new type of malware that has been spreading like wildfire over the past couple of months called CryptoLocker. Most security researchers are claiming that this is one of the nastiest and most successful…

Also posted in Exploits, Microsoft Windows, New River Computing News, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Comments Off on The CryptoLocker Virus is Spreading!!!

Why did Microsoft make the decision to retire the TechNet Subscriptions service?

On July 1, 2013, Microsoft announced the end of the 15 year program, TechNet Subscriptions. Microsoft’s TechNet Subscription Program is a paid program which allows partners to download full copies of most software titles to be used for lab or testing purposes. In an email…

Also posted in Cloud Computing, Microsoft Office, Microsoft Windows, Windows Server | Tagged , , , , , , , , , , , | Comments Off on Why did Microsoft make the decision to retire the TechNet Subscriptions service?

Cyber Crime vs. Cyber Defense

After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking and…

Also posted in Exploits, Security Products, Vulnerabilities, Web Security | Tagged , , , , , , , | Comments Off on Cyber Crime vs. Cyber Defense

Will Microsoft Bring Back The Start Button?

When Microsoft first revealed Windows 8, complaints started rolling in almost immediately. The lack of the traditional Start Menu and the fact that Windows would no longer be booting directly to the Windows desktop were just a couple examples of the many complaints that continue…

Also posted in Microsoft Windows | Tagged , , , , | Comments Off on Will Microsoft Bring Back The Start Button?