Call Us at 866-526-9750

PC Works Plus

Blog

  1. 57 Million Records Stolen but not reported for a year.

    Categories: Security

    A year ago Uber suffered a breach that resulted in the theft of 57 million records containing customer data.  Uber kept it quiet until now. KnowBe4 post about Uber Breach Why does it matter?  The more information that hackers can collect on potential targets, the easier it is for them to trick you or steal your… Read more »

  2. The Importance of Security Awareness Training for Employees

    Categories: Security

    The Importance of Security Awareness Training for Employees October 27, 2017 One of the most important parts of a good security policy includes Security Awareness Training (SAT) for all employees.  Your security policy may even require the need to have vendors or other outsiders to obtain SAT in some form. Why is SAT so important?… Read more »

  3. Reaper: Massive IoT BotNet poised for what…

    Categories: Security

    Reaper: Massive IoT BotNet poised for what… October 25, 2017 Just over a year ago some of the world’s largest websites were taken down for almost a day by “Mirai”.  Mirai is a malware strain that infected the “Internet of Things” (IoT) such as wireless routers, digital video recorders and other smart-devices for use in… Read more »

  4. 9 Tips to Strengthen Password Security

    Categories: Security

    9 Tips to Strengthen Password Security October 24, 2017 Passwords have long been a challenge for users and system administrators.  Users generally dislike all the rules that system admins require, but they are still necessary.  Here are 9 tips to help strengthen your passwords. Change passwords at least every three months for non-administrative users and… Read more »

  5. “KRACK” Attack: WiFi Security flaw

    Categories: Security

    “KRACK” Attack: WiFi Security flaw October 19, 2017 On Monday, a serious weakness was discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. The flaw allows potential attackers to leverage this vulnerability to break into the WPA2 security model and steal data flowing between wireless devices and the targeted Wi-Fi network. What’s… Read more »

  6. Unique Infostealer uses phony Pennsylvania Department of Welfare

    Categories: Security

    Unique Infostealer uses phony Pennsylvania Department of Welfare October 13, 2017 A recent phishing attack uses a fake Pennsylvania Department of Welfare document to install malware on victims systems. The decoy appears to be a “public service” message from the Pennsylvania Department of Public Welfare that includes spam mitigation instructions. The malware loads up a document that… Read more »

  7. You May Be the Biggest Security Risk

    Categories: Security

    What is the biggest risk to your network security? October 5, 2017 Unfortunately, many times it is the user behind the keyboard. Social engineering is one of the most frequently used (and successful) tactics to compromise a system. Social engineering is the art of manipulating people into giving up confidential information. Motives can vary, but… Read more »

Educate Yourself!

Checkout free reports and newsletters to educate yourself on Network Security, Data Protection and Tips and Tricks.

Let's Go!