Blog

Cyber Security Training

Both knowledge and proper training in cyber security are critical skills for those in IT Services, especially given the recent increase in foreign attacks.  It seems that just about everyday the tech news is filled with stories of hackers from China and Russia infiltrating American companies.

Who Knows Technology?

[Image from http://www.solarfeeds.com]

 

Keeping up with the latest technology can be a daunting task.  There's always some new and improved phone...or app...or computer program out there.  With the demands of work and home life, who has time to read up on it all?  As I wrote in an earlier piece on this website, when one of E-N Computers' customers asked me to connect their video camera feed to their smart devices, as a writer and not a technician, I didn't have any idea how to accomplish this task.

A New Way to Contact Us

[Image from dvcac.org]

As your IT solutions provider, we strive to be as accessible as possible to meet your support needs.  Today, we are pleased to announce a new, convenient way to create a support ticket for your issue.

Any of the computers we manage should have the E-N Computers tray icon near the clock.

Picking the Right Password

[Image from http://www.gizmodo.co.uk]

Yesterday, E-N Computers sent out a service alert regarding brute-force attacks to your security.  If you are unfamiliar with the term brute-force attacks, (and don't feel like clicking on the links provided) brute-force hacking involves trying a multitude of passwords again and again until the right combination of letters, numbers, and symbols is discovered.

Brute-Force Attack Warning!

[Image from josic.com]

Dear Customer,

 

Over the last 48 hours, we have had several customers who have experienced a brute-force attack succeed in gaining access to their network remotely.  An attack of this nature consists of systematically checking all passwords until the correct one is found.

What Happens if Your Business Falls Victim to Cyber Fraud?

[Image from http://blog.wvco.com]

Cyber fraud is one of those areas of security which can often be overlooked...until it happens to us.  Fortunately, when we are personally victims of cyber fraud often our banks will pick up the tab.  But what about when it affects our business?

According to an article published on the NPR website today, fraud protection for businesses can vary wildly.

Viewing Your Security on Your Smart Devices

[Image from http://videos.cctvcamerapros.com]

Recently, I met with Ted, a technician with the E-N Computers team, at a business in the central Shenandoah Valley. Several months ago, E-N Computers installed a variety of new Avigilon security cameras at this company’s various locations throughout the region.

Are Two Monitors Your Solution?

[Image from dell.com]

We all know that every office space is different.  Sometimes, when we go to our doctor's office or pay a utility bill we find a receptionist behind a single computer monitor while at others they have two.  Why the difference?  Does it matter how much visible space a person has on his or her computer screen(s)?  Is there any advantage to using a two monitor configuration as compared to the traditional one?  Well, according to a study by Dell Computers, the answer is yes.

Beware CryptoLocker Ransomware

[Image from lifehacker.com]

This is not to ALARM, but to inform:

We have had two clients with the Crypto Locker Ransomware this morning.

We have sent out an alert via “One Call Now” to inform all the clients that the common file has been a document titled “Resume”.

Please speak with your clients, if you are onsite, about this alert, as well as about safe browsing/e-mail practices.

Using Best Practices & Avoiding PUMs

[Image from fortevss.com]

 

Internet surfers BEWARE!

As part of our ever-growing desire for modern IT security, we’ve come across a rather nasty bit of malware. Typically there are countless amounts of PUPs (Potentially Unwanted Programs) around the internet.