fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

0 Comments
Continue reading

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

0 Comments
Continue reading

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database

In recent news, millions of records containing personal information were made available to the public in a sizable data leak, providing potential scammers with plenty of information to utilize in their schemes. These records were all part of a 53 GB database that was available for purchase from Dun & Bradstreet, a business service firm.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Intelligence IT Plan Millennials Word Windows 10 Business Computing Chrome Efficiency Help Desk Managed IT Services Paperless Office Google Docs Safe Mode Cloud Computing Mobile Devices Access Control IT Support Sports Ransomware Tip of the Week Remote Monitoring How To Scam Passwords Fraud Smartphone Staff Identity Theft Vulnerability Telephony Voice over Internet Protocol Hosted Solutions Tip of the week Employer-Employee Relationship Business Continuity Warranty Facebook Telecommuting BDR Social Engineering Information Website Unified Threat Management Virtualization Computers Operating System Flexibility Cybercrime Two-factor Authentication Amazon Workforce Technology Server Botnet Content Management Small Business Excel Cache Windows 10s Online Outsourced IT Cast Password Devices Netflix Backup Gadgets Mobile Device HVAC Hardware Data Breach Communications Email Managed IT Services Windows 7 Cryptocurrency IT Management Data Backup Office 365 Microsoft Office Value Printer Knowledge Network Security Cloud Best Practices Multi-Factor Security Virtual Assistant Data Storage Internet Google Drive BYOD Internet of Things Save Money Frequently Asked Questions Malware Business Business Mangement Data Security Law Enforcement Sync Software Cortana VPN Patch Management Cybersecurity Unsupported Software Router Money Settings Windows Network Mobility Recovery Holiday Upgrade Comparison Privacy Business Management Meetings Apps Charger Government Data Protection IT Services App Redundancy Telephone Systems Social Media Wiring Data Recovery Update Encryption Collaboration Security Applications Human Resources Bandwidth Mobile Device Management Microsoft Software Tips Tech Term Spam Saving Money Wi-Fi Disaster Recovery Windows 10 Internet exploMicrosoft Telephone System Connectivity OneNote Data Workplace Tips Managed IT Automation Bring Your Own Device Current Events Wireless Charging Tools Servers Public Cloud Avoiding Downtime Machine Learning Miscellaneous Bing Alert Browser Google Innovation Keyboard webinar Inventory Computer Managed Service Android Software as a Service Phishing Display FENG Hackers Productivity Artificial Intelligence Vendor Spam Blocking Wireless Internet Gmail Private Cloud Work/Life Balance CES VoIP Computer Fan Advertising User Tips Networking Blockchain User Error Communication Smartphones Infrastructure Root Cause Analysis

Newsletter Sign Up