Security Risks Associated with Cryptocurrency

Everyone is talking about Bitcoin these days.  Cryptocurrency is on the minds of potential investors big and small, but more importantly it is on the minds of the engineers and technicians at TechSolutions.  While many people are dreaming of magical computer money and treasure chests, we are thinking of the potential security implications that come […]

Using Home Security as a Model for Protecting Your Business

By: Rich Kenney Picture this. Criminal activity is rising in your neighborhood. Every morning, you leave for work and lock the door behind you to protect your family’s life and livelihood that is contained inside. Would there ever be a day where you choose not to lock that door? Consider now that just locking the […]

Rethinking Cybersecurity

By Rich Kenney Over time, many great ideas are occasionally re-examined and reconsidered by the scientists and businesspeople of the day. Was the world flat or round? Did the other planets revolve around the earth or the sun? Was Michael Jackson the greatest entertainer in history? Additionally, innovators are known for rethinking how we do […]

How to protect your network from watering hole attacks

Cybercriminals are getting more creative in infecting computers with malware, and users must step up in order to protect their devices. To stay one step ahead of cybercriminals, you should learn more about their more insidious tricks such as watering hole attacks. Here’s what you need to know about these attacks and how you can […]

The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won’t be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of […]

Top IT security terms everyone should know

It’s every business user’s responsibility to protect their computers and data from cyberattacks. The good news is that you don’t need to be an IT security expert to keep them safe. You can start increasing your knowledge by learning some of these basic cybersecurity terms. Malware For a long time, the phrase “computer virus” was […]

Protect your Facebook and Twitter from hackers

Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock […]

5 Ways systems can be breached

When it comes to business IT security, many small- and medium-sized businesses like yours often struggle to protect their systems from cyberattacks. One primary step is to be aware of online threats. Here are five common ways your systems can be breached. 1. You are tricked into installing malicious software There are countless ways you […]

Here are some ransomware decryptor sites you should keep handy

Ransomware is on the rise, but falling victim to one is not the end of the world. You can try some of these ransomware decryptors and maybe one of them will work. These are especially useful against automated “zombie” ransomware types. The state of ransomware in 2021 so far Businesses need to deal with ransomware […]