Remote Code Execution in Networking Equipment, Unveiling a Hidden Threat

Networking equipment serves as the backbone of communication infrastructure, linking devices and systems across offices and organizations. However, beneath their surface lies a lurking danger – vulnerability to remote code execution (RCE). Remote code execution, a threat typically associated with software applications, has extended its grasp to networking equipment, including routers and switches. These devices,…

Read more

Can the new tax laws help your business?

Darren McBride was at Thursday’s presentation, learning how to maximize savings as the country transitions into the new tax era.  The owner of Sierra Computer Group says his business will see immediate gains. “The overall, over the next couple of years, lower tax rate puts more money back in the business, which let’s us buy…

Read more

Password Advice has changed time to update yours

Password Advice has changed. Back in 2003 Bill Burr, a mid-level manager at the National Institute of Standards wrote an 8 page publication providing guidance on computer passwords.  The document suggested using obscure characters, a mix of upper and lower case, and recommended changing the password regularly.  The document became the guideline that many government…

Read more

Look out for Locky

Look out for Locky, the newest member of the ransomware family. It has only emerged in the past few weeks but has already proved to be much more devastating than its predecessors. The main difference between Locky and the other variants of ransomware is that can see un-mapped networked drives. Files encrypted by Locky don’t…

Read more

Ten IT questions to keep your business safe

It can be tough to narrow down all the security risks on a network. So we’ve complied a list of our favorite questions to gauge a networks stability and security level. What do you currently use for backup and disaster recovery. What is the password complexity, how often is it changed, and lockout policy on…

Read more

Cyber Monday safety tips

Cyber security while shopping on Cyber Monday Bargains abound on cyber Monday that make shopping very appealing to the masses. Browsing items in your cozy warm house, beats hitting the long lines of black Friday shopping. But buyer beware, cyber criminals are waiting to steal information from vulnerable devices and unprepared shoppers. It used to…

Read more

Creating Passwords Using Seed Mapping

Rod Coleman Passwords are a pain. Security requirements are becoming more complex just as we need more passwords for new apps, challenging our ability to remember them all. Here are the requirements for a reasonably secure password: 1. Contain at least 8 characters. 2. Contain upper case letters. 3. Contain lower case letters. 4. Contain…

Read more