Is your business in a high-crime area? Many business owners eventually face the choice of locating (or relocating) a business, and one of the key features they consider is the criminal reputation of the prospective commercial office neighborhood. This is for good reason. Making a poor choice could result in frequent business disruptions, the inability […]
Tag Archives: vulnerability
I recently had a chat with a colleague who recounted his recent experience with a computer he recovered from a local electronics recycling center. His story was a bit shocking and I thought it really deserved a write-up. Electronics waste is a huge burden to local governments around the world. The pace of advancement in […]
More information has been trickling out regarding the massive Target PCI breach that took place during the 2013 Christmas shopping season. Forensic researchers first learned that hackers penetrated Target’s network by means of a business transaction portal. It appears that Fazio Mechanical Services was the source. Fazio is a Pittsburgh-area nationwide mechanical contractor that services […]
The “CryptoLocker” virus has been making a great deal of noise lately. Though we at Thom Infotech have not personally encountered it, we know others who have. We’ve written this post to help you to understand and defend against the CryptoLocker virus. What is it? CryptoLocker is an insidious twist on the all-too-familiar virus or […]
As of this writing there are roughly four useble business weeks left in the current year. As 2013 winds down, businesses should consider performing needed upgrades sooner rather than later. At the risk of creating a lengthy blog post I’m planning to provide 179 reasons to upgrade before January 2014. First, we should discuss the […]
There is welcome news for web developers this week as WordPress now offers automatic updates to the uber-popular web development platform. Starting out as a blogging tool, WordPress has morphed into a full website development ecosystem. Like many, this author has embraced WordPress due to its simplicity, flexibility, and easy search engine optimization. The importance […]
It’s the second Tuesday of the month, so that means it’s Patch Tuesday. Microsoft will begin rolling out patches as the day progresses. This means your computer will likely reboot overnight. Here’s a rundown of the patches you can expect. Three updates classified as “Critical”: Internet Explorer – all versions from 6 to 10 Microsoft […]
I’m sure you’ve seen this, and I hope you haven’t fallen for it. Nevertheless, it must work because the bad guys keep doing it. The term is “Trendjacking”, and it refers to spammers and malware authors using current trends to trick you into opening malicious email messages. Trendjacking threats are a growing concern for computer […]
Skipped HIPAA Security Risk Analysis costs ISU $400,000 IT consultants and Managed IT service providers have been warning their clients that the HIPAA Security Risk Analysis is a very necessary component in their efforts to comply with the HIPAA rule. Some of our medical clients and prospects agree, while others are skeptical about the need […]
It’s nearly time to say goodbye Windows XP. This past April marked the one year count-down to the eventual discontinuation of support for the venerable operating system (technically on April 8, 2014). What does this mean to you? In short, it’s high time you moved on and adopted Windows 7 or Windows 8. Windows XP […]