fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

0 Comments
Continue reading

Tip of the Week: Improve Your Business’ Wi-Fi

Tip of the Week: Improve Your Business’ Wi-Fi

For many businesses, a wireless network connection plays a large role in what they do. The people who make your organization work require access to a continuous Internet connection to ensure collaboration can happen with minimal trouble, but it also means that more productivity can happen throughout the workday on your employees’ terms. Therefore, the problems that come from a poor wireless connection can present a considerable hurdle for your business to overcome.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

0 Comments
Continue reading

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

While many may want their Internet to be faster, not many realize that their router may be contributing to the problem. For this week’s tip, we’ll discuss how to configure your router for a faster Internet connection.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Cameras Enterprise Content Management Applications CES Mobile Device Management Staff App Wi-Fi Facebook Mobile Computing Paperless Office Data Protection Software as a Service Thought Leadership Workplace Tips Content Management Trending Word Keyboard Supercomputer Automation Managed IT MSP Smartphone Password Management Avoiding Downtime Business Intelligence Cybercrime Managed IT Services Botnet Private Cloud Cryptocurrency Upgrade Artificial Intelligence Chrome IT Infrastructure Save Money IT Management OLED Android Mobile Device Windows 10 Education Recovery Virtualization Security Innovation Efficiency Communication Router Work/Life Balance Windows 7 Alert Encryption Passwords ISP Google Voice over Internet Protocol Business Computing Tip of the week Fraud Windows User Tips Software Data Telephone System Malware Machine Learning Net Neutrality Phishing Infrastructure Vulnerability Authentication Big Data Cybersecurity Amazon Web Services Advertising Computers Server Privacy Hardware Data Recovery Connectivity BYOD Managed Service Internet Communications Password Unsupported Software YouTube Camera Holiday Augmented Reality Flexibility Google Drive Windows 10 Workforce IT Plan Browser Tech Term Ransomware Spam Patch Management Public Cloud Website Hosted Solutions Google Apps Scam Data Security Data Breach Social Engineering Smartphones Cloud Computing Two-factor Authentication Multi-Factor Security Computer Network Security Quick Tips Training How To Miscellaneous Outsourced IT Virtual Assistant Government Human Resources Small Business Business Management Tip of the Week Data loss Remote Monitoring Meetings Money Amazon Sync Users Information Saving Money Bring Your Own Device OneNote Disaster Recovery Data Backup Google Docs Business Continuity Collaboration Social Media Best Practices Managed IT Services Employer-Employee Relationship Operating System Display Cloud Gmail Business Virtual Reality Identity Theft IT Consultant Microsoft Hackers Technology Health Apps Recycling Settings Office 365 VPN Update Productivity Gadgets Sports IT Support Computer Care Blockchain IT Services User Error Spam Blocking Comparison Solid State Drive Data Storage Servers Mobile Devices Access Control Telephony VoIP Redundancy Emails Telephone Systems Telecommuting Proactive IT Bandwidth Backup Network BDR Microsoft Office Law Enforcement Administrator Twitter Email Internet of Things Cortana Networking

Newsletter Sign Up