fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

Are you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

BDR IT Management Hackers Physical Security Nanotechnology Tip of the Week Update Data Breach Communications Malware Data Protection Network Government Millennials Facebook Technology Managed Service Bandwidth Business Computing Innovation Telephony Machine Learning Mobile Devices Cleaning Content Management Amazon Applications Windows 10 Operating System Authentication Cybersecurity Staff Spam Blocking OneNote Hosted Solutions Gmail IT Support Google Docs Office 365 Human Resources Keyboard Social Engineering Communication Wi-Fi Public Cloud Password Management Emails Windows 10 Smartphones IT Plan Scam Addiction Meetings Virtualization Spam User Error Software as a Service Entertainment Sports Bring Your Own Device Private Cloud Telephone System Encryption Alert Smart Tech Practices Fraud Connectivity Identity Theft Backup Managed IT Voice over Internet Protocol Microchip Data Storage Paperless Office Internet exploMicrosoft Business Unsupported Software Redundancy Gadgets Windows Computers Multi-Factor Security Company Culture Wireless Charging Online IT Services Blockchain Recovery Data Backup Upgrade Business Continuity Emergency Network Security Servers Conferencing Legal Internet of Things Collaboration Security Cameras Firewall Best Practices Networking Apps How To Chrome Avoiding Downtime Business Mangement Save Money Website Law Enforcement NIST Cortana Automation Sync Software Google Drive Twitter Data Management Holiday Mobile Device Email YouTube Ransomware Workforce Computer Care Tip of the week Outsourced IT Saving Money Android BYOD IT Consultant Google Apps Mobile Device Management Data Security Information Telecommuting Infrastructure Cloud Password Telephone Systems Windows 7 Efficiency Microsoft Office Managed IT Services Remote Monitoring Social Media Router Excel MSP Workplace Tips Server Privacy User Tips Data VPN Google Solid State Drive Internet Microsoft Smart Office Employer-Employee Relationship Computer Cybercrime Word Two-factor Authentication Access Control Business Management Data Recovery Phishing Camera Virtual Assistant USB Money Business Intelligence Disaster Recovery Security Shortcuts Vulnerability Smartphone Passwords VoIP Browser Tech Term App Comparison Productivity Miscellaneous Cloud Computing CES Network Congestion Settings Managed IT Services Artificial Intelligence File Sharing Hardware Advertising Botnet Small Business Administrator

Newsletter Sign Up