As 2010 draws to a close, I have been looking back over the service that Homeland Secure IT has performed and talking with other computer service techs about the work that has come through our doors and not at all surprising is the fact that malware / virus removal & cleanup was one of the most common types of issues …
Secure IT Alert: December Firefox Update Fixes 13 Critical Vulnerabilities (Mac, Windows & Linux)
Homeland Secure IT Alert for Tuesday, December 14, 2010 In an effort to keep the Firefox browser secure, updates have been released that address multiple vulnerabilities. If you are using the 3.5.x or 3.6.x versions of the popular browser on Microsoft Windows, Linux or Apple Mac, you should insure your browser is up to date immediately to 3.5.16 or 3.6.13 …
Password security is a necessary inconvenience these days due to various sites being hacked…
It sure has been an event filled weekend regarding security! Several high profile sites have been hacked… The largest is the Gawker controlled sites, Gawker, Gizmodo, Lifehacker and a slew of others where it is estimated that as many as 1.5 million usernames and passwords may have been compromised. Supposedly, the Gawker passwords also allowed Facebook to be used for …
Trend Micro 3 | 4 | 2 deal coming to end soon, but it’s not too late to be Worry-Free, yet…
December 31st is the last day to take advantage of the Trend Micro “3 | 4 | 2” deal, where you buy two years of Trend Micro anti-virus protection and get the third year for free for new purchases! The products that this offer applies to is Trend Worry-Free Business Security (Both Standard and Advanced), Worry-Free Business Security Services, Hosted …
Secure IT Alert: Apple QuickTime for Mac & Windows Vulnerable – Time to Update!
Secure IT Alert for Thursday, December 09, 2010 Apple has released a security update that addresses 15 media handling vulnerabilities in Apple QuickTime player on both the Mac and Windows operating systems. These vulnerabilities are similar in nature… If attacker can coax a user to open a malicious media file, such as an image or a video, the holes can …
Cloud computing: Is Microsoft Aurora / BPOS right for your small business?
Today you can hardly have a conversation with IT professionals without the buzz words, “cloud computing”, “in the cloud”, “cloud solutions”, etc popping up. What do these terms mean? To over-simplify the definition, it means that something is not stored at your location. It is stored “in the cloud”, or on a remote server, and accessed via the internet. The …
Upstate storms underscore need for computer backup solutions and UPS
Last night was scary for some people here in the Upstate of SC. Easley was hit hard in the business area of Main Street and Pendleton Street and residences along 135 by the passing storms. As I watched the news and saw the video footage of damage, I felt horrible for the business and home owners affected. We turned on …
Emergency Computer or Server Repair in Greenville / Upstate SC
Nobody expects an emergency to happen to them, but it is nice to know that when you do need assistance, you can pick up your phone and dial 9-1-1 and a dispatcher will arrange for the appropriate response. What do you do for your IT network when an emergency arises and you do not have in-house IT support? If you …
SECURE IT ALERT: Adobe addresses vulnerabilities in Reader, Acrobat & Flash Player
Homeland Secure IT Alert for Friday, November 19, 2010 This week, Adobe released additional updates that cover Adobe Reader, Acrobat and Flash Player… The existing bulletin published on October 28th was updated to cover the changes… I have attached the updated security bulletin below, but in short, if you are using Adobe products, it is important that you apply these …
Stuxnet virus possibly biggest threat to industry ever
An article from the Associated Press published on news.yahoo.com on Wednesday outlines the threat that the Stuxnet virus poses to industry around the world. The malicious computer attack appears to primarily target the Iranian nuclear plants, but according to the article, it can be modified to interfere with industrial control systems around the world, and “represents the most dire cyberthreat …