fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

Are you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Scam Backup Social Media Passwords Google Alert Smartphones Samsung Bring Your Own Device Hosted Solutions Paperless Office Keyboard Privacy Comparison Outlook Business Intelligence Word Meetings Supercomputer Best Practices Human Resources Managed Service Mobile Devices Apple Communications Spam Blocking Ransomware Printer Proactive IT Gadgets Chrome Data Protection Save Money Quick Tips Servers Windows 7 Google Docs Data Storage Mobile Device BDR Software as a Service Employer-Employee Relationship Law Enforcement Internet Business Computing Telephone System Managed IT Services Wireless Internet Saving Money Emergency Windows 10 Efficiency Encryption Information Password Display HaaS Private Cloud Hardware Cybercrime Managed IT Artificial Intelligence Entertainment BYOD Communication Windows Computers IT Management Machine Learning Collaboration Operating System Android Malware Telephone Systems Data Backup Virtual Assistant Money Augmented Reality Avoiding Downtime Microsoft Microsoft Office Server Virtualization Network Security Downtime Staff Email Internet of Things Hackers Holiday Router Technology Google Drive Cryptocurrency Data Leadership Content Management Blockchain Infrastructure Sync Office CES Voice over Internet Protocol Tech Term Security Cameras Help Desk Tools Hiring/Firing Botnet Spam Data Security Cloud Software Unified Threat Management Wireless Charging Data Recovery Computer Social Engineering Audit Redundancy Innovation Security Multi-Factor Security Connectivity Network Unsupported Software HBO Bandwidth Amazon Telephony Screen Mirroring Online Windows 10 VoIP Browser Facebook Identity Theft Data Breach Update Business Mangement Business Management Business Continuity Productivity Government Smartphone Automation IT Support Mobile Device Management Disaster Recovery HVAC Public Cloud Website Data Management Remote Monitoring Workplace Tips Firewall Applications Relocation Cybersecurity App IT Services Miscellaneous Devices Two-factor Authentication User Tips Vulnerability Internet Exlporer Fraud Safe Mode Net Neutrality Tip of the Week Cloud Computing Health Office 365 Bing Sports VPN Apps Files Small Business Phishing IT Plan Access Control Inventory Settings Data loss Business Outsourced IT OneNote Hybrid Cloud Google Search Wiring Upgrade Business Technology Managed IT Services How To Wi-Fi Networking Vendor Millennials

Newsletter Sign Up