IT Consulting and Tech Support Blog

Category Archives: Web Security

Information regarding security on the web.

Solarwinds, Security, New River Computing, and You

Many recent news reports have come out regarding a massive hack of the Solarwinds Orion IT asset management system. This compromise is unprecedented in scale and reach, and the fallout from it will reverberate throughout the IT industry for years. Solarwinds Orion is one of…

Also posted in Exploits, Security, Vulnerabilities | Leave a comment

The Equifax breach

I’m sure everyone is painfully aware of the recent data breach at Equifax. Industry experts are suggesting that this breach was a state-sponsored hack, and I believe them. Chances are everyone reading this newsletter has had their personal financial information compromised. You must take action….

Leave a comment

The Cost of “Free” Software

Have you ever been tempted to try to acquire expensive software without paying for it? It turns out that “free” software can be more expensive than one might think! Take Photoshop for example: Subscribers can sign up and start using Photoshop for as little as…

Also posted in Backups, Exploits, New River Computing News, Security Products, Vulnerabilities | Leave a comment

The most destructive computer viruses – infographic

Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software.

Also posted in Vulnerabilities | Leave a comment

HIPAA security – keeping data secure

If you are a “covered entity” under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but…

Also posted in Exploits, Mobile Security, Technology Trends, Uncategorized, Vulnerabilities | Leave a comment

5 Ways to Avoid a Phishing Attack

Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible. This particular one deals with Phishing Attacks. We…

Also posted in Exploits, Vulnerabilities | Tagged , , , , , , , | Leave a comment

Craigslist Resume Scam Spreads Trojan Virus

Reports of “Craigslist résumé” viruses have skyrocketed in recent months. Some of our clients here at New River Computing have unfortunately fallen victim to this recent outbreak. Thankfully, we’ve been successful at cleaning up the aftermath, but often the remediation process is long and arduous…

Also posted in Exploits, Microsoft Office, Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities | Tagged , , , , , , | Leave a comment

Matt Stuart featured on WDBJ7 cyber security report

video platformvideo managementvideo solutionsvideo player NRC’s Matt Stuart was recently interviewed for a feature on Ronaoke’s WDBJ7 about cyber-security and how you can protect yourself this Cyber Monday. Matt discussed some of the recent trends in security vulnerabilities include cold-calls from scammers falsely claiming to…

Tagged , , , , , | Leave a comment

Battling Fake Microsoft Support Scammers

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched…

Also posted in Exploits, Microsoft Windows, Security Products, Technology Trends, Virus Outbreak Alerts, Vulnerabilities | Tagged , , , , , , | Leave a comment

The Dangers of Peer-to-Peer File Sharing

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on…

Also posted in Exploits, Technology Trends, Vulnerabilities | Tagged , , , , , , , , , , | Leave a comment