fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

0 Comments
Continue reading

Tip of the Week: Improve Your Business’ Wi-Fi

Tip of the Week: Improve Your Business’ Wi-Fi

For many businesses, a wireless network connection plays a large role in what they do. The people who make your organization work require access to a continuous Internet connection to ensure collaboration can happen with minimal trouble, but it also means that more productivity can happen throughout the workday on your employees’ terms. Therefore, the problems that come from a poor wireless connection can present a considerable hurdle for your business to overcome.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

0 Comments
Continue reading

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

While many may want their Internet to be faster, not many realize that their router may be contributing to the problem. For this week’s tip, we’ll discuss how to configure your router for a faster Internet connection.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

User Tips Managing Stress HaaS Botnet Spam Blocking Quick Tips Mobile Device Management Productivity Internet Managed IT Upgrade Windows 10s Sports Online Saving Money Managed Service Knowledge Operating System Voice over Internet Protocol Cybersecurity Tools Data Breach Data Storage Update Infrastructure Flash Communications Spam Router Computer Managed IT Services Efficiency Security Fraud Cleaning Holiday IT Services Alert Facebook Innovation Google Docs Data Recovery VPN Windows 7 Company Culture Encryption How To Hybrid Cloud Telephone Systems Android Cryptocurrency Nanotechnology Malware Microsoft Office Proactive IT Hosted Solutions Bandwidth Title II Phishing Net Neutrality Miscellaneous Social Engineering Connectivity Network Technology Vulnerability Network Security Virtualization Disaster Recovery Remote Monitoring Windows 10 Password Private Cloud Conferencing Mobile Devices Windows Gadgets Public Cloud Cloud Computing Criminal Physical Security Settings End of Support Avoiding Downtime Best Practices Server Telephone System Networking Excel Wi-Fi Collaboration Microsoft Smart Tech Employer-Employee Relationship Browser Smartphone Hardware Augmented Reality Chrome Business Management Managed IT Services Unsupported Software Two-factor Authentication Practices Google Hackers ISP CES Password Manager Health Network Congestion Meetings Government Software as a Service File Sharing Passwords Tip of the Week Apps Redundancy OneNote Business Intelligence Security Cameras Artificial Intelligence IT Plan Patch Management Files Addiction Windows 10 Apple Paperless Office BDR IT Support BYOD Law Enforcement Data Google Drive Tech Term Internet Exlporer Small Business Save Money Business Computing Outsourced IT Scam Money Content Management Smart Office Access Control Identity Theft Telephony Comparison Cloud Computers Virtual Assistant Document Management Keyboard Human Resources Office 365 Workplace Tips Credit Cards App Shortcuts Word Backup Remote Worker Hiring/Firing Cybercrime Data Security Privacy Information Servers Automation Machine Learning Business Continuity Data Backup IT Management Microchip Applications Social Relocation Website Internet of Things Flexibility Smartphones Data Protection Social Media Email Blockchain Mobile Device Software VoIP NIST Business Ransomware Hosted Computing Work/Life Balance Business Mangement Communication Charger Search Engine Bring Your Own Device

Newsletter Sign Up