fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

0 Comments
Continue reading

Tip of the Week: Improve Your Business’ Wi-Fi

Tip of the Week: Improve Your Business’ Wi-Fi

For many businesses, a wireless network connection plays a large role in what they do. The people who make your organization work require access to a continuous Internet connection to ensure collaboration can happen with minimal trouble, but it also means that more productivity can happen throughout the workday on your employees’ terms. Therefore, the problems that come from a poor wireless connection can present a considerable hurdle for your business to overcome.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

0 Comments
Continue reading

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

While many may want their Internet to be faster, not many realize that their router may be contributing to the problem. For this week’s tip, we’ll discuss how to configure your router for a faster Internet connection.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Information Disaster Recovery VoIP webinar Windows 10 Software Mobile Device Skype Blockchain HaaS Online Shopping Keyboard Remote Monitoring Firewall Windows 10 Internet Hardware Malware Servers Addiction Microsoft Office Computer Smart Office Backup Botnet Phishing Windows Server 2008 Telephone Systems Wi-Fi Technology Company Culture Nanotechnology Bring Your Own Device Google Humor Microsoft Network Congestion BDR Voice over Internet Protocol Windows 10s Business Computing Virtual Assistant Software as a Service Data Backup OneNote Collaboration Small Business Business Management Passwords Cloud Computing NIST Business Continuity Router Two-factor Authentication Computers Workplace Tips Paperless Office Work/Life Balance Google Docs Managed Service Physical Security Charger Cybercrime iPhone Operating System Network Security Server Hybrid Cloud Mobile Device Management Hackers Alert Facebook Apps Connectivity Managed IT Services Camera Chrome VPN Cloud Website Settings File Sharing Password Management Encryption Comparison Smartphone Android Managed IT Services Knowledge Networking Mobile Devices Private Cloud Social Media Cleaning Data Recovery Meetings Amazon Web Services Miscellaneous Managed IT Security IT Plan Gadgets Ransomware Data Storage Tip of the Week Redundancy Update Data Breach Upgrade Save Money Avoiding Downtime Excel Windows Communication Sports Business Password Communications Identity Theft Net Neutrality Data Applications Twitter Practices Best Practices Word Data Security Trending Law Enforcement Privacy Browser Content Management Recycling Google Apps Efficiency Smartphones PDF Telephony Microchip Business Intelligence Data Management Virtualization Holiday History Administrator BYOD Spam Vulnerability Government Human Resources IT Services Access Control Internet of Things Cybersecurity Productivity Apple CES IT Management Scam Office 365 Remote Work Tech Term Relocation Shortcuts Telephone System Machine Learning Public Cloud Infrastructure Legal App Windows 7 Workforce Automation Files Innovation Data Protection Saving Money Outsourced IT Spam Blocking Workers IT Support Conferencing End of Support Unsupported Software Google Drive Digital Signature USB Artificial Intelligence Social Engineering Patch Management FENG Fraud Hosted Solutions Employer-Employee Relationship Bandwidth Money How To Network User Tips Email

Newsletter Sign Up