webmailhelpdesk

facebook linkedin twitter youtube

Blog Archives

What is a data breach?

What is a data breach? So what is a data breach?  Simply put, a data breach is when an individual’s name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is exposed because of a

Posted in Uncategorized

Don’t Be A Victim of Spear Phishing

Most of us have heard of email phishing (pronounced fishing), but have you heard of spear phishing?  Maybe not, but this is the latest twist on a phishing scam. Spear phishing starts out as an email that appears to be from

Tagged with: , , , , , , , ,
Posted in Uncategorized

Shellshock BASH flaw leaves Mac OS X, Linux, and more open to attack!

Security experts recently discovered a flaw in the widely used Unix Bash shell, leaving Linux machines, Mac OS X machines, firewalls, routers, and many more devices vulnerable to attack.  The vulnerability, “Shellshock”, apparently has been in the BASH (Born Again Shell) code

Tagged with: , , , , , , , , , , ,
Posted in Uncategorized

Why backup to the cloud?

With the ever growing complexity and volume of corporate information that is created every day, corporations face the cold hard truth; without your data, you have no business … data IS the business. This is why it’s critical to have

Tagged with: , , , , , ,
Posted in Uncategorized

Protect Your Business From Being The Next Victim Of Cyber Crime

An alarming trend of high profile security breaches seems to be happening almost daily. So what should you do? Well if you are the Owner, CEO or Executive of a business, you need to pay attention to this trend. You

Tagged with: , , , , , ,
Posted in Uncategorized

In business you need to watch your apps.

So you think you are safe when collecting an ex-employee’s mobile phone or computer? Maybe not… Many businesses leave themselves open to possible vulnerabilities, because they don’t control cloud based accounts, according to new research from Intermedia and Osterman Research.

Tagged with: , , , , , , , ,
Posted in Uncategorized

Software can reduce the stress of small business.

Specialized business software like an ERP or CRM can reduce the stress of small business.  Small businesses, like boutique soap manufactures or candy makers have dreams and goals like any other business, but often those dreams are challenged daily unpredictability. Like how

Tagged with: , , , ,
Posted in Uncategorized

TSA Announces That Uncharged Devices Banned from Some Flights

The U.S. Transportation Security Administration has recently announced a change of a rule regarding electronic devices. The TSA will NO Longer allow uncharged devices such as mobile phones or other electronic devices on U.S. bound airplanes at many overseas airports.

Tagged with: , , , , , , , , , , ,
Posted in Uncategorized

Windows 8 Free + Windows Phones set to drop below $200.00

In a recent report by Reuters it appears that Microsoft is going to drive down prices of Windows devices and offer Windows 8 free this year. Do you have a windows phone yet? Will this make you consider windows for

Tagged with: , , , ,
Posted in Uncategorized

Oleg Pliss stole my iPhone. Who’s Oleg Pliss?

A large number of iPhone users have been reporting recently that their beloved iPhones and iPads have come under attack. The attacks are taking the devices hostage and locking the owners out of them and going so far as to

Tagged with: , , , , , , ,
Posted in Uncategorized

We’re On Facebook

FREE Consultation

Slick Cyber Systems knows business computer & networking security is essential to protecting your company from viruses, spyware, hackers, and other threats.