fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cisco Bug Ranks as One of the Worst

Cisco Bug Ranks as One of the Worst

A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so, your organization could be subject to remote code exploitation as a result of this vulnerability.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Government Google Two-factor Authentication Scam Servers Malware Twitter Paperless Office Telephone Systems Emails Big Data Mobile Device User Error Business Continuity Ransomware Augmented Reality IT Support Trending Outsourced IT Virtualization Money Small Business Virtual Reality Internet VoIP Business Computing Microsoft Alert Recycling Office 365 IT Infrastructure Social Engineering Access Control Word Data Backup Unsupported Software Cortana Display Internet of Things Productivity Technology User Tips Microsoft Office Router Avoiding Downtime Vulnerability VPN Tech Term Holiday Computer MSP Data Breach Managed IT Services Gmail Telephone System Saving Money Sports Telephony Flexibility Voice over Internet Protocol Camera Enterprise Content Management Update Apps IT Management Cloud Thought Leadership Information Hardware Website Windows 10 Telecommuting IT Consultant Encryption Identity Theft Windows Applications Health OneNote Communications Cryptocurrency Gadgets Collaboration Public Cloud Google Apps Computer Care Education Redundancy Wi-Fi Server BDR Private Cloud Blockchain Smartphones Password Upgrade Advertising Botnet Law Enforcement Chrome YouTube How To Data loss Cloud Computing Patch Management Software as a Service Phishing Virtual Assistant Google Drive Mobile Device Management Meetings ISP Hackers OLED Work/Life Balance Passwords Operating System Net Neutrality Spam Blocking Users BYOD Security Cameras Proactive IT Best Practices Connectivity IT Services Recovery Software Mobile Devices Data Protection Solid State Drive Business Backup Networking Business Intelligence Windows 7 Social Media Data Recovery Settings Authentication Automation Training Cybercrime Smartphone Workforce Staff Miscellaneous Spam Fraud Business Management Bandwidth Browser Hosted Solutions Artificial Intelligence Workplace Tips Privacy Sync Tip of the Week Machine Learning Security Administrator Managed IT Network Security Password Management Multi-Factor Security Employer-Employee Relationship Data Security Amazon Android Google Docs Remote Monitoring Mobile Computing Human Resources Data Windows 10 Keyboard Comparison Content Management Managed IT Services Communication Tip of the week Email Amazon Web Services Bring Your Own Device Innovation Quick Tips Cybersecurity Efficiency IT Plan Save Money Disaster Recovery Network CES Supercomputer Infrastructure Data Storage Computers Facebook Managed Service App

Newsletter Sign Up