fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

Are you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Update Paperless Office Microsoft Office Law Enforcement Telephone System Access Control Staff File Sharing Two-factor Authentication Business Management Content Management Small Business Cloud Sports Apps Gadgets IT Plan Applications Office 365 CES Social Engineering Communication Malware Technology Innovation Workplace Tips Budget Windows 10 Efficiency ISP Networking Practices Quick Tips Amazon Web Services Server Human Resources Saving Money Users Comparison Data Storage Avoiding Downtime Keyboard Security Productivity Holiday Internet of Things Bandwidth Scam App Investment Hosted Solutions Operating System Encryption Chrome Virtual Assistant Identity Theft Microchip Company Culture Fraud Education Voice over Internet Protocol Managed IT Services VPN Public Cloud Google Password Cybersecurity OneNote Business Continuity Cybercrime Windows 7 Employee Upgrade Augmented Reality Website IT Management Managed Service Collaboration Software as a Service Ransomware IT Support Data Protection Disaster Recovery Miscellaneous Cryptomining Private Cloud Information Smartphone Android Addiction Screen Mirroring Machine Learning Blockchain Router Workers NIST Audit Data Breach Infrastructure Google Drive Data Settings Spam Blocking Smart Office Word Cloud Computing Employer-Employee Relationship Vulnerability Smartwatch VoIP User Tips Leadership Network Security Display Managed IT Services Bring Your Own Device Supercomputer Windows 10 Net Neutrality Spam HBO Hardware Samsung Business Telephony Money Facebook Google Docs Nanotechnology Remote Monitoring Connectivity Alert Botnet BDR Training Privacy Virtualization Passwords Flexibility Best Practices Tip of the Week Mobile Device Management Big Data Managed IT Wi-Fi Windows Server 2008 Data Recovery Backup Government Cortana Outsourced IT Computers Trending Telephone Systems Shortcuts Automation IT Services Servers BYOD Mobile Devices Cryptocurrency Computer Online Shopping Unsupported Software Data Security Hackers Phishing Digital Signature Browser Meetings Save Money Recycling Communications Microsoft Manufacturing Business Intelligence Data loss Internet Redundancy Email User Error Business Computing Twitter Skype Network Health Mobile Device Virtual Reality Tech Term Windows Camera Password Management How To Social Media Artificial Intelligence Remote Work Advertising Software Data Backup Smartphones

Newsletter Sign Up