VisiCom Services Blog

VisiCom Services has been serving the Rochester Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Fall for Fake Facebook Friends

b2ap3_thumbnail_friend400.jpgIt's a trap! As more people subscribe to social media networking sites, we can expect more scammers to weasel their way into our friend bases. Especially when using Facebook, you'll need to be on the look out for scammers. Here are some warning signs of fake Facebook friends to consider in order to keep your profile safe.

Continue reading
0 Comments

What can You do to Keep Your Data in the Cloud Safe?

b2ap3_thumbnail_threebucksforthis400.jpgIn October of 2013, Adobe disclosed to their 2.9 million customers that their hosted information was compromised due to a data breach. Adobe sent out letters stating, "The attackers may have obtained access to your Adobe ID and encrypted password." For anyone that uses companies like Adobe to host their data, you will want to be prepared for a breach.

 

Continue reading
0 Comments

Trojan:Win32/Crilock.A The Newest and Nastiest Ransomware on the Web

b2ap3_thumbnail_virus1-400.jpgThe latest nasty virus to hit the Internet is called Trojan:Win32/Crilock.A, a ransomware that first showed its ugly head on September 10th, 2013. This virus is capable of locking you out of your computer and stealing your sensitive information. Here's everything you need to know about this new ransomware and how to stop it.

Continue reading
0 Comments

Why You Should Never Put Off Your Security Maintenances

b2ap3_thumbnail_safecomp400.jpgHow do you know if your IT security system is doing its job? Security is a silent system, which means if the system is functioning properly, then you won't notice it. However, strong IT security requires maintenance, and if this upkeep is neglected, then your silent system will fail.

Continue reading
0 Comments

What to do when a Dragon Attacks Your Business

b2ap3_thumbnail_dragonrev400.jpgYou know it's important to have a firewall to keep your data safe, but did you know the needs of your business demand stronger firewall software than what comes with your Windows operating system? When dealing with a complex business network, it's highly recommended that you go with a hardware firewall solution that's up for the task.

Continue reading
0 Comments

Get Rid of Virtual Zombies Once and For All

b2ap3_thumbnail_zomb400.jpgIs your computer infected with a Distributed Denial of Service (DDOS) virus? If your workstation is infected with DDOS, then you wouldn't know about it. DDOS is a virus that compromises web servers by creating a zombie command-and-control center. This allows hackers to take control of your servers for the purpose of using your computers for malicious activities.

Continue reading
0 Comments

Russian Communicationist Find a Better Solution

b2ap3_thumbnail_keys400.jpgToday's international headlines are dominated with stories like WikiLeaks spreading secret documents, and the United States' NSA spy scandal. These stories are making people doubt how secure their communications really are, which is why Russia is taking the drastic measure of using paper to communicate in a digital age.

Continue reading
0 Comments

Lockdown Your Sensitive Files with TrueCrypt

b2ap3_thumbnail_truecrypt400.pngWhat if you walked away from your PC and someone else jumped on with bad intentions? How much digging around would they have to do before they discovered your most sensitive files? If your personal files are encrypted, then a thief will be stopped in their tracks and your identity will be safe.

Continue reading
0 Comments

What Happens to Your Accounts After Death?

b2ap3_thumbnail_inactive400.jpgIt's 3 o'clock in the morning and you just shotgunned your last Red Bull to finish up debugging some code for the new software your company plans to launch next week. You decide to take a break and log into your Facebook account and find that John, who recently passed away, just shared a blog titled, "From Beyond the Grave" with you. Spooky right?

Continue reading
0 Comments

Watch Out for Cellphone Thieves!

b2ap3_thumbnail_CellPhoneTheft400.jpgIt seems like everybody owns a cellphone. This might actually be the case; 175 million cellphones were sold last year in the U.S. alone. With the proliferation of cellphones in pockets, comes more cellphones being picked from pockets. Cellphone theft is on the rise, accounting for 1/3 of all thefts in the US. What's being done to stop cellphone theft?

Continue reading
0 Comments

What’s in Your Firewall?

b2ap3_thumbnail_Firewall400.jpgIt is vital that you have a firewall in place to protect your network. Unlike the name suggests, a firewall will not protect your PC from an actual fire, but rather, a firewall will protect your computers from cyber-threats. Network firewalls are a little more complex than brick and mortar; here is a basic explanation on how firewalls work.

Continue reading
0 Comments

Is Your Business Appealing to Hackers?

b2ap3_thumbnail_HackingAppeal400.jpgYou may think that just because you are a small and local company that hackers won’t want to waste their time on you. Wouldn’t a hacker prefer to go after a large corporation? If your business has poor network security, then your company is more appealing to hackers then even the biggest banks.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Michigan small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Sign Up For Our Newsletter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
14 September 2017
Usually I don't refer spending time like these categories subjects and website but really the blog w...
Tip of the Week: 4 Google Chromecast Features that May Surprise You
05 September 2017
I’m really satisfied to find this site.I need to thank you only for this brilliant read!!I unquestio...
Microsoft OneNote May Be the Best Note-Taking Tool on the Market
27 June 2017
I blog frequently and I really value your substance. The article has really crested my advantage. I ...

Latest Blog Entry

23 February 2018
Visicom Blog
Technology
Think for a minute the power a signature has. Signatures have started and ended wars, they have committed whole nations of people to rule of law, and they are attached to birth and death. For the indi...

Latest News

Contact Us

Learn more about what VisiCom Services can do for your business.

callphone

Call us today    248.299.0300

2534 S Rochester Road
Rochester Hills, Michigan 48307

#