Posts by PDX Information Technology Services
Why do I keep getting this pop-up?
I originally was not going to post this, but received permission from the person it happened to… so.. Before our life in quarantine, there was a time were I was called in to help with a serious IT situation. A friend referred me to a doctor’s office that was having a computer issue. They were…
Read MoreNot a fan of Acer, but…
I am generally not a fan of Acer, but in this case I have to admit that they got this right. Acer’s Swift 3 SF313 is a small subnotebook equipped with a 13.5-inch display. It is based on Intel’s latest Ice Lake SoC and successor to the Kaby Lake generation of devices. With an Intel…
Read MoreTo Spin or Not to Spin, that is the question.
This is a great example of the differences between a solid state (SSD) and a traditional hard drive. As you can see the access time, IOPS and performance of the SSD is far better. Really, it is the difference between night and day. The cost of SSDs are far more reasonable than 5 years ago.…
Read MoreWhy Cyber-security is Important
John Ford, ConnectWise Chief Information Security Officer, put together a quick little video to explain what a Cyber Attack is and how it impacts your business. Your work life and personal life are not separate. Everyone checks their work email on their phone. Everyone looks at Facebook at work or check their personal email at…
Read MoreDo you have a Rescue Plan In the event of a Malware Infection?
Let us perform a security analysis of your company – Today! Does your company have a rescue plan? Some malware is planted days or even weeks before being activated, making backups useless. So, what’s the Plan, Stan?
Read MoreEncryption People.. Encryption…
Tesco, a giant supermarket club in England, similar to Costco in the US, announced that 600,000 names and passwords were stolen. The thief made off with the company’s database. It is known that the data was used to gain access to other websites. None of the company’s financial data was accessed. But… Who cares about…
Read MoreBest Anti-virus Software in 2020
I was a bit surprised about some of the rankings. I have used ESET, SEP and Norton in the past. I can see why they ranked where they did. These big names are good at what they do, but there is a lot of bloat in these products. I would like to test out BitDefender…
Read MoreRansomware
This is a great graphical depiction of Ransomware.
Read MoreMost common forms of cyberattacks last year
New research from BlackBerry Limited shows hackers use different strategies and attack types, depending on the industry they’re targeting. For example, criminals targeting the technology and software industry are most concerned with stealing intellectual property. To that end, a quarter of attacks (26 percent) were ransom based. Healthcare organizations also encountered a high proportion of…
Read MoreUS Railroad reports data breach AFTER a Ransomware Attack
A US Railroad company, RailWorks Corporation, reported a data breach after a Ransomware attack occurred. The exposure 3,500 Personal Identifiable Information (PII) of their employees (current and former), dependents and beneficiaries. Not only did RailWorks have to deal with the RansomWare, but also the exposure of a data breach of PII information of their employees.…
Read More