fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cisco Bug Ranks as One of the Worst

Cisco Bug Ranks as One of the Worst

A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so, your organization could be subject to remote code exploitation as a result of this vulnerability.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Search Engine VPN Android Vendor Management Cabling Productivity Password Tech Term Wi-Fi Identity Theft Windows 10 Encryption Automation Vulnerability Voice over Internet Protocol Downtime VoIP Artificial Intelligence Communications Scam Users Cryptomining Paperless Office Relocation Data Breach Connectivity Malware Social Media Internet of Things Bring Your Own Device Content Management Cybersecurity Employee Augmented Reality Windows 7 Data Security Communication FCC CES Spam Collaboration Word Spam Blocking Microsoft Office Disaster Recovery Hiring/Firing Display Machine Learning Net Neutrality Ransomware Outlook Addiction NIST Cast Miscellaneous Data Public Cloud OneNote Gadgets Skype Security Avoiding Downtime Tip of the Week Business Intelligence Chrome Managed Service Business HIPAA Innovation Passwords Office 365 Smart Tech Website Comparison Blockchain User Tips Privacy Specifications Bandwidth Value Computers Update Electronic Medical Records Private Cloud Networking Social Engineering Smartphone BDR Email Quick Tips IT Management Money IT Services Workplace Tips Network Security Save Money Mobile Device Management Backup Mobile Device Small Business Entertainment Business Management Efficiency 5G Best Practices IBM Telephony Google Docs Hosted Computing Phishing App Cryptocurrency Apps Document Management Data Protection Settings Digital Signage Cloud Computing Computer Cybercrime Health Business Continuity Facebook Holiday Virtualization Sports Saving Money ROI Remote Monitoring Mobile Devices Law Enforcement Human Resources Cloud Remote Worker IT Support Files Managed IT Botnet Screen Mirroring Operating System Data Backup Fraud Software Hardware Travel Office Applications Network Online Shopping Alert Internet Meetings Windows Telephone Systems IT Plan Help Desk Access Control Upgrade Two-factor Authentication Information Windows 10 Google Drive Business Computing Smartphones Telephone System Unsupported Software Redundancy Google Software Tips Managed IT Services Infrastructure Computer Fan Social Server BYOD Training Government Employer-Employee Relationship Managed IT Services Keyboard Virtual Assistant Data Storage Data Recovery Outsourced IT Internet Exlporer Browser Managing Stress Education Microsoft Staff Hackers How To Hosted Solutions eWaste Processor Servers WiFi Technology Router Software as a Service

Newsletter Sign Up