fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Plan History IT Services Applications Smartphones Addiction Humor Automation Website Microchip Wi-Fi PDF How To Tip of the Week Connectivity Managed IT Services Data Recovery Apps Servers Bandwidth Outsourced IT Identity Theft Operating System Relocation Spam Miscellaneous Trending Encryption Ransomware Shortcuts Data Backup Facebook Network Gadgets IT Management Business Management Amazon Web Services CES Firewall Physical Security Google Drive Workers End of Support Managed Service App Recycling BDR Router Password Business Intelligence Smart Office VPN Server Government Virtual Assistant Skype Windows 10 Infrastructure Bring Your Own Device Disaster Recovery Data Protection Virtualization Managed IT Cybersecurity Excel Cloud Computing Efficiency Windows Voice over Internet Protocol HaaS Software Employer-Employee Relationship Data Storage Data Breach Telephone System Software as a Service Windows Server 2008 Business Windows 7 Apple Legal Saving Money Tech Term Conferencing Innovation FENG Knowledge Avoiding Downtime Comparison Artificial Intelligence Private Cloud Company Culture Human Resources Botnet Public Cloud iPhone Content Management Settings Chrome Microsoft Office Best Practices Backup Telephony Mobile Device Access Control Upgrade Alert Network Congestion IT Support Net Neutrality Google Apps Money VoIP Google Password Management webinar Administrator Unsupported Software Computers Meetings Phishing Passwords Fraud OneNote Workplace Tips Social Engineering User Tips Networking Remote Work Word Holiday Productivity Data Hardware Workforce Keyboard Scam Practices Data Management Android Privacy Blockchain Cybercrime Files Network Security BYOD Cleaning Communication Smartphone Security Machine Learning Office 365 Malware Managed IT Services Internet of Things Vulnerability Email Communications Telephone Systems Mobile Device Management Paperless Office Hybrid Cloud Save Money Internet Mobile Devices File Sharing Spam Blocking Small Business NIST Cloud Camera Computer Browser Sports Update Technology USB Online Shopping Microsoft Data Security Information Collaboration Windows 10 Charger Hackers Nanotechnology Business Continuity Hosted Solutions Work/Life Balance Digital Signature Remote Monitoring Social Media Twitter Two-factor Authentication Law Enforcement Windows 10s Redundancy Patch Management Google Docs Business Computing

Newsletter Sign Up