fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Office 365 Encryption Malware Voice over Internet Protocol CES Business Management Knowledge Gadgets Practices Business Android Money Productivity Managed IT Business Continuity Company Culture Computers Redundancy Bandwidth VPN Camera Managed IT Services Workplace Tips Tip of the Week Online Shopping Windows 10s Spam File Sharing Facebook Patch Management Innovation Outsourced IT Browser Phishing IT Services Data Protection Paperless Office Files IT Management Cloud Computing Data Breach Workforce Twitter Data Recovery Software as a Service Unsupported Software Physical Security Router Virtualization How To Internet Identity Theft Microsoft Office Government Cloud Nanotechnology Ransomware Update IT Plan Private Cloud Word Automation Communications HaaS Windows Microsoft Data Security Relocation Business Computing Cybersecurity Telephone System Applications App Recycling Hybrid Cloud Data Google Apps Scam webinar User Tips Trending Smart Office Business Intelligence Software Data Management Fraud Botnet Tech Term VoIP Save Money NIST Wi-Fi Employer-Employee Relationship Password Management Machine Learning Privacy Remote Work Infrastructure Managed IT Services Network Congestion USB Public Cloud Mobile Device Avoiding Downtime Connectivity Network Security Addiction OneNote Small Business Best Practices Managed Service Server Smartphone Meetings Sports Data Storage Password Google Docs Net Neutrality Networking Vulnerability Humor Spam Blocking Windows 10 Excel Passwords Google Drive Content Management Mobile Device Management Work/Life Balance Holiday Administrator BDR FENG Email Collaboration PDF Operating System iPhone Bring Your Own Device Access Control Internet of Things Cleaning Apps Artificial Intelligence BYOD Social Engineering Computer Virtual Assistant Two-factor Authentication Communication Apple Information Network Hardware Telephony Alert Cybercrime End of Support Disaster Recovery Windows Server 2008 Settings Blockchain Security Skype Mobile Devices Microchip Charger Firewall Hackers Conferencing Chrome Shortcuts Miscellaneous Windows 10 Workers Keyboard Human Resources Efficiency Digital Signature Windows 7 Amazon Web Services Smartphones Hosted Solutions Comparison Servers Remote Monitoring Social Media Legal Technology Upgrade Saving Money Backup Website Data Backup Google History IT Support Law Enforcement Telephone Systems

Newsletter Sign Up