fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Holiday BDR Bring Your Own Device Productivity Smartphone Server IT Services Virtual Assistant Two-factor Authentication Net Neutrality Miscellaneous Employer-Employee Relationship Windows Remote Worker How To Government Google Drive Data Security Internet Private Cloud Social Windows 10 Cybersecurity Tip of the Week Business Computing Access Control Android Save Money Servers Computer Remote Monitoring Augmented Reality Security Collaboration Marketing Data Backup Avoiding Downtime Voice over Internet Protocol Internet of Things Efficiency WiFi Skype Facebook Display Information Infrastructure Saving Money Data Protection Hiring/Firing Cryptocurrency eWaste Passwords Social Media Training Help Desk Public Cloud Health Bandwidth App Windows 10 Hosted Solutions Upgrade Business Applications Unsupported Software Content Management Chrome Social Engineering Addiction Online Shopping IT Management Word Privacy Network Security Managed IT Services Managing Stress Mobile Devices Spam Practices Human Resources Data Breach Redundancy Cybercrime History Update Communication Processor Ransomware Browser Software as a Service Workers Microchip Apps Staff Automation Office 365 Hosted Computing Smart Tech Samsung Quick Tips Money Productivity IT Plan Outlook Law Enforcement Alert Mobile Device Management Sports Technology Comparison CES Password NIST Blockchain Disaster Recovery Mobile Device VoIP Hackers Small Business IT Support Tech Term Digital Signature Botnet Computers Website Smart Office Microsoft Office Malware Keyboard Innovation Spam Blocking Communications Cloud Wi-Fi Business Management Hardware Phishing The Internet of Things Telephone Systems Microsoft Encryption Education VPN Cables Paperless Office User Tips Electronic Medical Records Office Big Data Artificial Intelligence Managed IT Scam Managed IT Services Workplace Tips Connectivity Fraud Screen Mirroring Vulnerability Hacker Digital Signage Router Network Data Storage Business Continuity Telephone System Managed Service Managed Service Provider Data Leadership Users Database Identity Theft Best Practices Business Intelligence Email Downtime GDPR Smartphones Telephony Meetings Gadgets Budget Backup Google Machine Learning Data Recovery Software Windows 7 Networking Virtualization Cloud Computing OneNote Business Technology Operating System Settings BYOD Audit Entertainment Outsourced IT Google Docs

Newsletter Sign Up