fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Employee BYOD Technology Settings Microsoft Office Managed IT Net Neutrality Efficiency Leadership Best Practices eWaste Meetings Cloud Computing Tip of the Week Google Drive Small Business Save Money Social Media Telephony Data Recovery Travel Health IT Services Collaboration Tech Term Scam Network Infrastructure IT Plan Unsupported Software Money Machine Learning Mobile Devices Social Apps Disaster Recovery Gadgets Practices Internet of Things Managing Stress Social Engineering Miscellaneous Employer-Employee Relationship Start Menu Productivity Computers Specifications Software Artificial Intelligence Google Automation Data Addiction Smart Office Voice over Internet Protocol Microchip Email Access Control Outlook FCC Website Managed IT Services Internet Exlporer Cybercrime Connectivity Electronic Medical Records Chrome Bring Your Own Device Upgrade Data Storage Operating System Applications OneNote Hardware Online Shopping Database Fraud Communication Business Continuity Cloud Search Engine Virtualization Content Management Business Botnet How To Data Breach Augmented Reality Screen Mirroring Phishing Managed IT Services Business Intelligence VoIP Comparison Remote Worker Spam Blocking Windows Password Spam Servers Outsourced IT Private Cloud Hosted Solutions Human Resources Smartphones Emergency Malware Computer Fan Sports WiFi Samsung Security Downtime Internet Networking Hosted Computing Workplace Tips Telephone Systems Office Skype Passwords Hackers Network Security Document Management Cybersecurity Bandwidth Innovation Browser CES VPN Virtual Assistant Wi-Fi Entertainment IT Management BDR Office 365 Training HIPAA Keyboard Digital Signature Android Data Protection Audit Law Enforcement Data Security Router Blockchain NIST App Facebook Evernote Windows 10 Managed Service Provider IT Support Backup User Tips Windows 7 Holiday Cryptomining Public Cloud Smartphone Server Google Docs Workers Value Privacy Software Tips Mobile Device Paperless Office Update Managed Service Smart Tech Quick Tips Redundancy Encryption Alert Word Two-factor Authentication Government Windows 10 Cryptocurrency Microsoft Computer Saving Money Data Backup Business Management Business Computing Remote Monitoring Cache Ransomware Software as a Service Avoiding Downtime Telephone System Files Vulnerability Hiring/Firing Identity Theft Mobile Device Management Communications Information

Newsletter Sign Up