Security Tip (ST19-003) by CISA What are the risks associated with mobile device apps? Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an […]
Read MoreWhat is a rootkit? And how to stop them
used with permission from Norton by Symantecby Dan Rafter Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits are a type of malware that are designed so that they can […]
Read MoreAre you prepared for the end of Windows 7?
Posted by Taylor Wall -
-
Cybersecurity, Information Technology, IT, Managed Services, MS Windows, Software
Windows 7 and Windows Server 2008 are popular and well-loved — and they’re completely unsupported after January 2020. Have you prepared to upgrade yet? When Windows 7 reaches end of life and end of support in 6 months, it will no longer be a secure, compliant operating system. Microsoft will no longer releases updates or […]
Read More