fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Connectivity Small Business Windows 7 Proactive IT Privacy Gadgets Miscellaneous Windows 10 Mobile Device Multi-Factor Security Display Holiday Productivity Twitter Network Net Neutrality Thought Leadership Technology Android Authentication Artificial Intelligence Administrator Innovation Microsoft Office Biometric Security Workplace Tips Social Engineering Solid State Drive Machine Learning Bring Your Own Device Office 365 YouTube Telephony Government Managed IT Social Media Scam Data Security Amazon Update Managed Service Communications Data Protection Apps Cybersecurity Wi-Fi IT Infrastructure Upgrade MSP Data Breach Networking Virtual Reality Blockchain Business Intelligence Best Practices Access Control Encryption Collaboration Data Storage Applications Disaster Recovery Mouse Telephone System Comparison IT Services Data Backup Augmented Reality Hosted Solutions Paperless Office Mobile Device Management Google Google Docs Settings CES Accountants Business Computing Voice over Internet Protocol Bandwidth Private Cloud Browser Windows 10 Google Apps Fraud Information Password IT Consultant Software Telephone Systems Router Backup Malware Tip of the Week Meetings Staff Cloud Patch Management Computers Cybercrime Training Keyboard Windows Facebook Botnet Workforce Telecommuting Hackers Human Resources Sports Google Drive Security Mobile Computing Data Recovery Security Cameras Wireless Cloud Computing Mobile Devices Outsourced IT Hardware Spam Alert Computer Care OLED Servers Cleaning Cryptocurrency Two-factor Authentication Saving Money Microsoft Server User Tips Wire Tech Term Flexibility Passwords IT Management VPN Wireless Charging Public Cloud Managed IT Services BYOD Ransomware Efficiency Smartphone Emails IT Support Enterprise Content Management Unsupported Software Managed IT Services Virtual Assistant Business Management Computer Remote Monitoring Chrome Employer-Employee Relationship Software as a Service Amazon Web Services Content Management App Gmail Spam Blocking Users Smartphones Vulnerability Business Millennials Internet of Things Work/Life Balance Website Word Internet Avoiding Downtime Money How To Sync Network Congestion User Error Redundancy Identity Theft Law Enforcement Quick Tips Phishing Communication Email Save Money Infrastructure IT Plan Advertising Network Security Tip of the week Automation Data Operating System OneNote Virtualization Business Continuity Health VoIP Recovery Education BDR

Newsletter Sign Up