TECH TO CATCH AND FLAG PHISHING LINKS IN EMAILS

Posted by Ashley Victoria Cannon on November 15, 2018
Read More

Tags: Software, Security & Virus Protection, tech, IT, anti-virus, iphone, tehcnology, launch, new, smartphone, cyber criminals, security, Security Patches, iPhone Update, News, Tech News, Phishing, Emails, MetaCert, Beta, Link, Paul Walsh

YAHOO'S $50 MILLION SETTLEMENT FOR PAST SECURITY BREACH

Posted by Ashley Victoria Cannon on October 24, 2018

 

Read More

Tags: Security & Virus Protection, Internet, tech, IT, technology, hackers, tehcnology, data, data loss, attackers, Digital, breach, databreach, security, hack, GDPR, Updates, News, Tech News, Oath, Yahoo, Verizon, Verizon Oath, Settlement

GOOGLE+ TO SHUT DOWN IN THE WAKE OF A SECURITY BREACH

Posted by Ashley Victoria Cannon on October 11, 2018

 

Read More

Tags: Software, Security & Virus Protection, Internet, tech, IT, technology, social media, facebook, tehcnology, data, data loss, Digital, breach, databreach, security, GDPR, Data Regulation, Privacy Laws, Security Patches, Updates, Notifications, Google Duplex, Google Launch, Google Cloud, Gmail, Google Search, News, Tech News, Cambridge Analytica, Social Platforms, Google Plus

IOT MAKING HACKERS ATTACK SURFACE GREATER

Posted by Ashley Victoria Cannon on August 1, 2018
Read More

Tags: Insider, Fixes, PC, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, anti-virus, anti-spam, firewall, malware, technology, hackers, passwords, update, tehcnology, launch, new, computer, google, device, smartphone, notebook, blockchain, data, data loss, infrastructure, server, cyber crime, Digital, transform, two-factor authentication, breach, databreach, security, hack, creditcard, crime, CPU, alert, bitcoin, cryptocurrencies, Routers, Data Regulation, Home Router, router, Security Patches, Updates, Internet of Things, IoT, Siri, AI, Continuous Integration, Continuous Delivery, Source Code, Google Cloud, Test, Deploy, App Engine, Cloud Functions

MICROSOFT ANNOUNCES NEW USER INTERFACE

Posted by Ashley Victoria Cannon on June 21, 2018

 

Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, Microsoft, bitcoin, Routers, Security Patches, Updates, Internet of Things, IoT

SECURITY PATCHES - THE TOP SECURITY THREAT THAT'S BEING IGNORED

Posted by Ashley Victoria Cannon on June 12, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, Microsoft, bitcoin, Routers, Security Patches, Updates, Internet of Things, IoT

US-CERT ALERT TA18-145A - CYBER ACTORS ARE ATTACKING HOME AND OFFICE ROUTERS WORLDWIDE

Posted by Ashley Victoria Cannon on May 29, 2018

 

Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, bitcoin, Routers, European Union, Home Router, Office Router, Small Business Router

FACEBOOK AND GOOGLE RECEIVE COMPLAINTS OVER GDPR

Posted by Ashley Victoria Cannon on May 25, 2018

 

Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, Microsoft, bitcoin, Routers, GDPR, EU, European Union, Data Regulation, General Data Protection Regulation, Privacy Laws

THEMOON BOTNET IS ATTACKING A ZERO-DAY VULNERABILITY IN GPON WIFI ROUTERS

Posted by Ashley Victoria Cannon on May 24, 2018

 

Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, blockchain, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, APT, GPU, Microsoft, CPU, TPT, TDT, AMS, bitcoin, cryptocurrencies, Mettle, Muhstik, TheMoon, Mirai, Hajime, Satori, Botnet, GPON, Routers

MICROSOFT'S SURFACE HUB 2 IS SERIOUSLY FUTURISTIC

Posted by Ashley Victoria Cannon on May 18, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, blockchain, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, APT, GPU, Microsoft, CPU, TPT, TDT, AMS, bitcoin, cryptocurrencies, Surface Hub 2, Surface Hub

COVEE IS CREATING COVETED COLLABORATION

Posted by Ashley Victoria Cannon on May 1, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, blockchain, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, APT, GPU, Microsoft, CPU, TPT, TDT, AMS, bitcoin, cryptocurrencies

UNITED STATES COMPUTER EMERGENCY READINESS TEAM LAUNCHES ALERT (TA18-106A)

Posted by Ashley Victoria Cannon on April 20, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, APT, GPU, Microsoft, CPU, TPT, TDT, AMS, alert

INTEL TO USE VIRUS SCANNING FOR BETTER FUNCTIONALITY AND BATTERY USAGE

Posted by Ashley Victoria Cannon on April 18, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, Intel, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime, APT, GPU, Microsoft, CPU, TPT, TDT, AMS

A FIREWALL IS CRUCIAL IN PROTECTING PRICELESS DATA

Posted by Ashley Victoria Cannon on April 12, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, security, hack, debitcard, creditcard, crime

JOKERSTASH STRIKES AGAIN

Posted by Ashley Victoria Cannon on April 2, 2018
Read More

Tags: Insider, Fixes, Computer Fixes, PC Issues, Software, Security & Virus Protection, Internet, ransomware, tech, FBI, IT Support, Bitcoins, IT, habits, anti-virus, malware, technology, hackers, code, tehcnology, computer, device, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency, Digital, transform, breach, databreach, hudsonbaycompany, security, hack, debitcard, creditcard, crime, SaksFifthAvenue, JokerStash, Fin7, LordAndTaylor

RANSOMWARE: THE ACTUAL COST OF AN OUTAGE

Posted by Ashley Victoria Cannon on March 2, 2018
Read More

Tags: Fixes, Computer Fixes, PC Issues, Advice, Hardware, Software, Security & Virus Protection, Internet, ransomware, FBI, IT Support, Bitcoins, IT, anti-virus, anti-spam, firewall, malware, hackers, passwords, msp, tehcnology, blockchain, data, data loss, infrastructure, cyber criminals, attackers, server, cyber crime, cryptocurrency

Mobile Phone Security Tips

Posted by Ashley Victoria Cannon on August 23, 2017

We’ve all seen the stories about celebrities getting their mobile phones hacked and having their private photos splattered all over the web. 

Although you may think there is nothing of real interest on your phone, you are still at risk of security invasion. Any number of people could have motives to harm you, from ex-es to a colleague who perceives you as a threat. Even innocuous content on your phone can be taken out of context to reflect negatively on you in general or be manipulated.  

Use some of these simple tips to protect your mobile phone and reputation:

Passwords - Your passwords are your primary defense against would-be hackers – from your lock code to email account password. Don't share your passwords with others.

Also, make sure your passwords aren’t easily guessed, such as your pet’s name or child’s birthday.  A secure password may not be as easily remembered, but it is far harder to hack. Finally, shield your phone’s screen with your hand or body when entering passwords in public lest onlookers take note of which buttons you push.

Clear Out the Cobwebs – In addition to creating more storage space on your mobile phone, it is just wise to remove old text conversations, photos, and other data periodically. Back up the things you want to keep onto other devices, so you can access them later. With all of the excess stuff you don’t use on a regular basis gone, you leave less for hackers to work with if the security of your mobile phone is breached. In the event of being hacked, you would also likely lose all of those things, so backing such info up protects you twofold.

Beef Up Security – Take advantage of the lesser-known security features of your mobile phone. For example, turn off the Discoverable mode on your Bluetooth. Look on your phone under Security to see if there are free, included options, such as an automatic lock screen that activates after a certain period of inactivity.

There are also applications you can download to increase the level of security on your phone, including apps that allow you to access and control your phone remotely in the case of loss or theft. Our company provides an option for businesses that not only allows mobile lock and/or wipe of a lost phone, but restrictions on what apps can be installed. For more advice on ways to boost your staff's productivity, check out our blog post.

 

Read More

Tags: Advice, Security & Virus Protection

Are You One of the Majority Of Businesses That Aren’t Prepared For IT Risks?

Posted by Ashley Victoria Cannon on June 28, 2017

Does your IT staff include personnel who are dedicated to compliance or cybersecurity? How confident are you that your team is prepared to take today’s security threats head on? How likely are you to be able to ward off a determined attack?

Read More

Tags: Advice, Security & Virus Protection

Recommendations that will make you a little less worried about the virus Petya

Posted by Ashley Victoria Cannon on June 28, 2017

You may have heard about the newest ransomware virus (Petya) that hit companies worldwide in the past few days. This new threat will encrypt your entire system, not just the files. The threat can enter your system through email, and potentially infected websites. Here are our recommendations for protecting your company.

Read More

Tags: Advice, Security & Virus Protection

Can Your Car Be Hacked Just With A USB Stick?

Posted by Ashley Victoria Cannon on June 26, 2017

Jay Turla has been a very busy man since purchasing his new Mazda vehicle. He’s been spending time researching hacks to his car’s infotainment system, and as with most other “smart” products on the market today, he’s finding the system incredibly easy to break into.

Read More

Tags: Security & Virus Protection

Why we recommend Webroot as the best anti-virus program out there.

Posted by Ashley Victoria Cannon on May 31, 2017

Ask a room full of CEO's what is at the top of their minds, and chances are they'll answer "security and protection against ransomware". We agree. It should be top of mind. We've seen the impact and loss of productivity for companies who are hit with viruses. As a managed services provider, it's our job to make sure that our clients have the latest and best tools out there to protect them against hackers and cryptoviruses.

Read More

Tags: Security & Virus Protection

TECHNOLOGY TODAY 

Technology Today is Circulent's weekly tech blog 

We sift through the good, the bad and the techy tid-bits of all things tech! 

Be sure to tune-in weekly for 

  • The latest trends 
  • Product launches
  • Acquisitions 
  • How-to's/To-do's 
  • And much, much more...

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all