webmailhelpdesk

facebook linkedin twitter youtube

Blog Archives

File Sharing is Risky Business

File Sharing is Risky Business Did you know, Increasingly remote workforce’s are accessing their files via networked drives as well as a wide array of cloud storage solutions; many of which they deployed themselves outside the purview of the IT

Tagged with: , , , , , , , , , , , ,
Posted in Blog, Uncategorized

Security Habits Putting Businesses at Risk

Security breaches are detrimental to any business. In addition to the financial costs involved, a tarnished reputation is difficult to overcome — and customer trust is undoubtedly tough to regain once personal information has been compromised. To prevent breaches, security

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Locky Ransomware -What You Need To Know

Locky Ransomware waht you need to know

Locky Ransomware -What You Need To Know   We are compiling a new post regarding details of a VERY NASTY little piece of Malware / Virus / Ransomware called Locky Ransomware. We first alerted everyone of this malicious program on

Tagged with: , , , , , ,
Posted in Blog, Uncategorized

Alert “Locky” Cute New Ransomware, that’s NOT SO CUTE.

  Another new ransomware has been detected, and though its name is cute, this is no joke. The not so fun part of this new ransomware will encrypt almost every commonly used file type, and targets not only your pc

Tagged with: , , , , , ,
Posted in Blog, Uncategorized

Save Money on Ink? Please tell me more you say…

A recently reported article which has gained some popularity with main stream media, from CNN, FOX NEWS, ABC NEWS (to name a few) is that the costs of printing could be dramatically reduced by something as simply changing some of

Tagged with:
Posted in Blog, Uncategorized

Counting Down The End Of Windows XP and Office 2003

Microsoft has been counting down the days until it is through with the Windows XP operating system for personal computers, and so is Slick Cyber Systems. (See our countdown clock to help send off Windows XP.) Microsoft over two years ago used

Tagged with: ,
Posted in Blog, Uncategorized

The Impending ‘Windows XP Disaster’

Many have warned about the impending ‘Windows XP disaster’, driven by hackers and cyber criminals looking to exploit those still using the Windows XP operating system. It looks like the ‘disaster scenario’ might come a little bit sooner than originally

Tagged with: , ,
Posted in Blog, Uncategorized

Why register your domain for multiple years? Well, because…

On almost a daily basis we are asked how can we increase the effectiveness of our website, and what can we do to drive SEO or (search engine optimization)? So what’s the secret you ask? Well, some answers are complex

Tagged with: , ,
Posted in Blog, Uncategorized

Bitcoin mining botnets and Windows XP threats are booming.

Bitcoin mining botnets and Windows XP threats are booming. Dell SonicWALL says there are 10 malware infections for every person on the planet THE AMOUNT OF MALWARE infecting machines in 2013 was equal to around 10 infections for every person

Tagged with: , ,
Posted in Blog, Uncategorized

Do Mobile Devices have a Double Standard for Data Protection?

Do Mobile Devices have a Double Standard for Data Protection? Though an increasing number of professionals rely on personal mobile devices to access company data, that data doesn’t get the same protection on those devices as it does on the

Tagged with: , , ,
Posted in Blog, Uncategorized

We’re On Facebook

FREE Consultation

Slick Cyber Systems knows business computer & networking security is essential to protecting your company from viruses, spyware, hackers, and other threats.