COMPUTER BUYING TIPS It’s that time of year, seniors everywhere are preparing for graduation. Congratulations to the Class of 2019! Along with celebrations, many Moms and Dads (and seniors) are starting to look at what kind of computer is needed for college. The answer is not simple as there is no “one size fits […]
MICROSOFT ENDING SUPPORT FOR WINDOWS 7 by Juanita Nester, IT Support Specialist Someone once said, “All good things must come to an end,” and that applies to technology too. After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7. But you can keep the good times rolling […]
CYBER SECURITY: HOW DO I PROTECT MY BUSINESS FROM A DATA BREACH By Patrick Logan, President and Certified Computer Examiner What is Cyber Security? Cyber Security (or Data Security) concerns the protection of data from accidental or intentional, but unauthorized modification, destruction or disclosure through the use of physical security, administrative controls, logical controls, and […]
WHAT IS DIGITAL FORENSICS? Digital Forensics can be defined as the investigation, recovery and analysis of data and evidence within digital devices (computers, smartphones, etc.). Digital forensic investigations should only be performed by trained and certified examiners who can ensure that the recovery and analysis of any and all evidence is not altered and will […]
Anyone can be a victim of a cyber fraud attack, including senior executives. A “whaling” attack is where cyber criminals attempt to “harpoon” an executive, often CEOs and CFOs, and steal log-in credentials. In the event their attack proves successful, fraudsters can then impersonate the executive and abuse email to authorize fraudulent wire transfers. Whaling […]
What are the Top Cybersecurity Threats For the Near Future? Social Engineering Attacks are how hackers and data thieves cleverly access your secure information through phishing, impersonating other companies and people, and other common tactics. It is estimated that phishing attacks cost U.S. businesses more than five million dollars each year. Ransomware is a relatively […]
We are often asked to examine a smartphone that the user believes has software on it that allows activity, such as calls and texts, to be monitored remotely. Our first question to the user is, “has anyone had physical access to the phone other than you?” There are very few apps that will actually remotely […]
Seltek receives many emails each week from clients asking if a received call or email is real. Recently, we have noticed an increase in two specific types of computer fraud. The first is a call from a fake computer technician to fix a supposed problem on your PC. The caller identifies himself as a […]
The Internet of Things (IoT) is a system of interrelated computing devices and digital objects that are provided with unique identifiers and the ability to transfer data over a network without requiring direct communication between a person and computer. The growing implementation of the IoT will result in the connection of tens of billions of wireless […]