Blog – Masonry Full Width

Comments on the Computer Business

Usually suggestions and recommendations on computer security for small and home based businesses

How can you avoid becoming the next Ransomware victim?

How can you avoid becoming the next Ransomware victim? Ransomware attacks are in the news constantly nowadays. The Colonial Pipeline attack cost all of us money at the gas pumps. The Colonial Pipeline attack was the 2nd largest ransom paid … Read More

Featured Post

Old fashion, reliable computer support

I often feel that people and companies over think things. I was watching a video that Tyler Garnes was doing for his InfusionSoft Success Lab and he mentioned his $10, $100, $1,000, $10,000 “rule”. You can spend your business day … Read More

Featured Post
CAP-IT Security - Comprehensive computer security monitoring program

Have you ever done what Mike did?

Today, advancements in technology are moving at an incredible rate. In many cases, it is great. Better technology often means better technological solutions. However, in some cases, we simply cannot keep up with the fast-paced, digital technology, especially when it … Read More

Featured Post
The WannaCry Virus Explained

The WannaCry Virus Explained

Technology plays a huge role in our everyday lives, but along with it come big security problems too. What is Ransomware? The “WannaCry” virus is an example of “ransomware.” It’s a really complex piece of software that generally falls into … Read More

Featured Post

Is your email a BellSouth.net address?

I had a customer call me today and said that BellSouth.net called her and said that she had viruses on her computer and that they needed to log into her computer to take care of it. She told them that … Read More

Featured Post
Security Best Practice

Security Best Practice – lawyers and business people, pay attention!

Security Best Practice – here is a listing of what you should do and know. Do you, or any of your staff, ever type the following into a computer, web based program, email, document, Smart Phone, tablet, iPad, etc.? Social … Read More

Featured Post

I am done with all this computer security stuff!

As a business owner you can’t just stick your head in the sand and pretend that this security stuff is not important. Security is very important and should not be left up to your employees to manage. This day and … Read More

Featured Post

Don't plug in that Thumb Drive!

USB Sticks, Thumb Drives, Flash Drives, Memory Sticks, Flash Stick, USB Flash Drive, Key Drive, Pen Drive, Jump Drive. Do you know what is on yours? Do you know where it came from? These portable drives have become very popular … Read More

Featured Post
Computer backup

5 backup options to choose from

There are many backup options available to you as a small business owner. Many more than were available even a few years ago. I will list the most popular ones below – this is by no means and exhaustive list … Read More

Featured Post

Who is using your computer? You really do not know!

There is nothing on my computer worth stealing so why should I be concerned about security? Typical criminal computer uses. The following information was provided by Brian Krebs – A noted security expert. So let’s say there really is not … Read More

Featured Post

You want to know about "Locky"

Mary called me yesterday. She received an email from a financial services firm relayed to her from a trusted friend. She thought it was strange to get an email for September but she opened the email attachment. Immediately, icons on … Read More

Featured Post

So you think you are safer than a 5th grader?

My 5th grade granddaughter was staying with us this past weekend while her parents went to Charleston SC. We are having a great time and all of a sudden she announces that she got a phone call from her mother … Read More

Featured Post
Backup

Never backup your computer again

We have all been taught that we must backup our computer or else we run the risk of losing everything. That is just not true anymore because of Business Continuity. Let me explain. There are many ways to protect the … Read More

Featured Post

It will never happen to me – no I mean that

I just shipped off a hard drive to have the data recovered. It will cost the customer $400 – $2,000 to recover their data and they have no backups at all Last weekend a company I have been talking to … Read More

Featured Post

DO IT YOURSELF SECURITY

DO IT YOURSELF SECURITY If I were to be forced to only select two forms of security they would be Unique Passwords and Updates. You want a unique password for every program, email, website that you use. Also you do … Read More

Featured Post

RAM Scraping – we are not talking about sheep

RAM scraping is a system where malware grabs your credit card information and writes it to a text file before it is encrypted by your POS system. This happens in a millisecond and is undetectable. Anyone that has a POS … Read More

Featured Post

Computers are your window to the world – you can travel anywhere without leaving home

Have you ever wanted to go to Paris, Rome, Nebraska and just did not have the money, ability or the time? If you have a computer, smartphone or tablet with Internet access, you are almost there. Pick a place like … Read More

Featured Post

Computer security report for the year 2014

Below is a security report based on the Verizon Data Breach Investigations Report – 2015 that is the most comprehensive report available with over 70 worldwide reporting agencies. This applies to business large and small as well as individuals. For … Read More

Featured Post

Who cares about this crap? – Nobody!

I had a meeting with a customer today, and the discussion came to Battery Back-ups. They do not have Battery Backups, and they said that they saw no reason to have them since they would not be able to work … Read More

Featured Post

Phishing, what your parents or Grandparents need to know

When you talk about fishing, the goal is to go to the lake and catch some fish. When you talk about phishing, the goal is to send emails and catch someone’s information. In either case, something or someone is in … Read More

Featured Post

What do Identity Theft and the latest Anthem Data Breach have in common?

If your identity is stolen and the perpetrator uses your information when they go to the doctor, your medical records could be compromised. That could mean that in the event of an accident, and you were unable to respond to … Read More

Featured Post

Stop updating Java, Windows, Flash, Reader and others

There is now a service available that will make sure your computer is always up to date with all the latest software updates – and you do not need to do anything. That is right, no more Windows updates, updating … Read More

Featured Post

What does a secure, reliable and backed-up computer look like?

In today’s world, everyone has computers. We have Desktops, notebooks, laptops, tablets, iPads, iPhones, Androids and anything else that may be invented or used. Wouldn’t it be nice if you knew that all this “technology” was secure, reliable and backed-up? … Read More

Featured Post

5 Ways to protect from identity theft in 2015?

2015 promises to be a banner year in Identity Theft. With the successes the Bad Guys had in 2014, they will certainly step it up in 2015. Identity Theft is subject to supply and demand just like anything else. For … Read More

Featured Post
Computer Security

Time, we all have the same amount. What are you doing with yours?

I am reading a new book called “Procrastinate on Purpose” by Roy Vaden that talks about multiplying your time, not just reorganizing it. I will not go into the details here, but the focus of the book is to do … Read More

Featured Post
"Rob has provided us with many years of quick and honest service. I’d recommend him to anyone for their office hardware and software needs."
Jeff Salmon
Owner - Birmingham Roofing & Sheet Metal