fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cisco Bug Ranks as One of the Worst

Cisco Bug Ranks as One of the Worst

A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so, your organization could be subject to remote code exploitation as a result of this vulnerability.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Saving Money Business Computing Productivity Relocation Files Efficiency Website App Virtualization Email Data Breach Voice over Internet Protocol PDF Amazon Web Services Artificial Intelligence Windows 10 Botnet Patch Management webinar Managed IT Google File Sharing Infrastructure Hosted Solutions History CES Apple Nanotechnology Managed IT Services Android Spam Wi-Fi Data Recovery Hardware Networking Data Storage Managed Service Addiction Windows Managed IT Services Data Machine Learning Holiday Trending Alert Avoiding Downtime Sports How To Communication HaaS Identity Theft Microsoft Office NIST Software as a Service Google Drive User Tips Law Enforcement Public Cloud Communications Collaboration Data Protection Social Media Word Firewall Privacy Business Intelligence Mobile Device Upgrade Workplace Tips Private Cloud Business Management Meetings Applications USB End of Support Network Security Cybersecurity Legal Computer Backup Hackers Bring Your Own Device Business Continuity Miscellaneous Windows 10s Virtual Assistant Telephone System Money Remote Monitoring Phishing Physical Security Cloud Computing Windows Server 2008 Data Backup IT Support Small Business Shortcuts Scam Spam Blocking Network Mobile Device Management VPN Operating System Conferencing Gadgets Cleaning Comparison Unsupported Software Password Recycling Update Smartphone Vulnerability Information OneNote VoIP Tech Term Browser Outsourced IT Technology Human Resources Best Practices Data Management Keyboard Innovation Employer-Employee Relationship iPhone Skype Network Congestion Automation Net Neutrality Internet Servers Router Cybercrime Mobile Devices Office 365 Content Management IT Plan Passwords Microsoft Chrome Encryption Settings Telephony Smart Office Apps Save Money Tip of the Week Work/Life Balance Workers Security Workforce Connectivity Password Management Social Engineering Company Culture Practices Microchip Government Redundancy Windows 7 Server Digital Signature Humor Online Shopping IT Management Access Control Smartphones BYOD Internet of Things Twitter Cloud Facebook FENG Paperless Office Knowledge Google Docs Data Security Disaster Recovery Charger Bandwidth Business Remote Work Two-factor Authentication Software Blockchain Computers BDR Google Apps IT Services Excel Hybrid Cloud Windows 10 Malware Administrator Fraud Ransomware Telephone Systems Camera

Newsletter Sign Up