VisiCom Services Blog

VisiCom Services has been serving the Rochester Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

Continue reading
0 Comments

Warning: Heartbleed Bug Assails the Web

b2ap3_thumbnail_heart_bleed_two_400.jpgThe same day that Microsoft ceased supporting Windows XP with security patches was also the day a vicious little monster was discovered – the Heartbleed bug, which renders privacy in the OpenSSL cryptographic library completely obsolete. Basically, anything utilizing the OpenSSL open source library is at risk here. Websites utilizing this form of encryption include Yahoo! Google, and Facebook. To put it in perspective, sites that utilize OpenSSL number more than two-thirds of the entire worldwide web. Though this bug only applies to versions 1.0.1 and 1.0.2 beta of OpenSSL, hackers are able to obtain private keys which can be used to obtain sensitive information from countless people all around the world. Nothing says "heartbreak" like having your identity stolen and your sensitive data Shanghaied.

Continue reading
0 Comments

It Doesn’t Make Sense to Be Anti-Antivirus

b2ap3_thumbnail_antivirus_solutions_400.jpgThe Internet has grown to such a vast size that it in itself is like a world within a world. Some people live on it, and share their secrets far too openly. These people think themselves safe in a world that technically doesn't exist, but there is a lot more danger involved with the Internet than some people realize. There are criminals everywhere, and they are just waiting for you to drop your guard long enough to swipe everything you've worked so hard to protect.

Continue reading
0 Comments

What to Do When Your Smartphone Gets Stolen

b2ap3_thumbnail_lost_my_phone_400.jpgAs with anything else that's deliberately taken from you, having your smartphone stolen can be one of the most frustrating experiences ever. After all, many of us use them to keep us on point with our daily tasks. Measures are being taken by legislators and cell phone companies to help curb the issue, but there are ways that you can prevent and react to your phone being stolen.

Continue reading
0 Comments

200 Million People’s Identities Compromised in One Scam

b2ap3_thumbnail_it_security_400.jpgDetails are still coming in regarding one of the biggest data breaches in history that compromised the personal records of 200 million Americans! The scam was propagated by the online ID theft service Superget.info, and it's currently being investigated by the U.S. Senate Committee on Commerce, Science, and Transportation.

Continue reading
0 Comments

Data Protection is Still Important, No Matter What We Write

b2ap3_thumbnail_mobile_data_security_400.jpgPrior to the XXII Olympic Games in Sochi, Russia, concerns were shared from many American news outlets in regards to mobile data security. On the eve of competition the NBC Nightly News with Brian Williams broadcasted a story suggesting that data security in Russia, and more specifically, at the Olympic games was atrocious; with the reporter, Richard Engel, getting both his smartphone and his work laptop hacked almost immediately.

Continue reading
0 Comments

Hackers Go for the Gold at the Sochi Winter Olympics

b2ap3_thumbnail_sochi_winter_olympics_400.jpgIn Sochi, Russia, the world's best athletes aren't the only ones having spent years preparing for the Winter Olympics. Russian hackers have also readied themselves for the world's arrival. Hackers have tapped every public WiFi network in the vicinity of the games. We can learn a thing or two about the WiFi problems in Sochi.

Continue reading
0 Comments

Don’t Underestimate the Black Market Value of Your Email

b2ap3_thumbnail_email_value_400.jpgDue to the many different forms of digital communication, you may check your email less than ever before. However, just because you may not use your email account very often, it doesn't mean that a hacker will leave it alone. Every email account is full of valuable information and should be protected with the strongest security measures available.

Continue reading
0 Comments

Biometrics: The New Standard in Security

b2ap3_thumbnail_biometrics_future_of_security_400.jpgWith the introduction of Microsoft's Kinect and Apple's iPhone 5s, biometrics has exploded! Both of these tools are being utilized for security purposes to lock others out of your device and accounts. Biometrics for these devices are also being employed to grant you access to your technology. As biometrics becomes more popular, you are sure to see it used for your business in the not too distant future.

Continue reading
0 Comments

Where Did Internet Spam Come From?

b2ap3_thumbnail_spammy400.jpgSpam in your email inbox is extremely annoying. Email spam is always an eyesore, and swallows up valuable time wasted on sifting through your inbox. Have you ever wondered how email spam got its name? You may be surprised to find the answer. Here's a hint: it has something to do with Vikings, a diner, canned meat, and a British comedy.

Continue reading
0 Comments

Protect Your Critical Data with VPN

b2ap3_thumbnail_vpnet400.jpgWhen getting work done on the Internet, users are faced with a slew of threats that could hack sensitive company and personal data. Integrating a VPN solution may be your best option in securing your company network and files from online attacks. What is VPN, and why should your company be using it?

Continue reading
0 Comments

2 Million Stolen Passwords Recovered

b2ap3_thumbnail_pwrrrd400.jpgSecurity company Trustwave made a discovery last week that sent the online world into a frenzy. They recovered two million stolen passwords from 93,000 different websites. This password cache included user accounts from major companies like Facebook, LinkedIn, Google, Twitter, and Yahoo. Is your password part of this haul?

Continue reading
0 Comments

Can the CryptoLocker Virus be Stopped?

b2ap3_thumbnail_ransom400.jpgLast September, the Internet was introduced to CryptoLocker, a dangerous ransomware that has quickly spread and become one of the worst viruses we have seen. CryptoLocker will literally take your files hostage by encrypting them so it can force you to pay for the encryption key. A business hit with CryptoLocker will be locked out of their computers and unable to get work done.

Continue reading
0 Comments

The Copyright Alert System

b2ap3_thumbnail_copyright400.jpgSince the dawn of the digital age in the 1990s, illegal downloading of information, music, movies, software, and content has become an issue leading to major shifting in the way these industries do business. It's been hard to contain this issue of illegal downloading, but the latest attempt, the Copyright Alert System, looks promising.

Continue reading
0 Comments

Don’t Fall for Fake Facebook Friends

b2ap3_thumbnail_friend400.jpgIt's a trap! As more people subscribe to social media networking sites, we can expect more scammers to weasel their way into our friend bases. Especially when using Facebook, you'll need to be on the look out for scammers. Here are some warning signs of fake Facebook friends to consider in order to keep your profile safe.

Continue reading
0 Comments

What can You do to Keep Your Data in the Cloud Safe?

b2ap3_thumbnail_threebucksforthis400.jpgIn October of 2013, Adobe disclosed to their 2.9 million customers that their hosted information was compromised due to a data breach. Adobe sent out letters stating, "The attackers may have obtained access to your Adobe ID and encrypted password." For anyone that uses companies like Adobe to host their data, you will want to be prepared for a breach.

 

Continue reading
0 Comments

Trojan:Win32/Crilock.A The Newest and Nastiest Ransomware on the Web

b2ap3_thumbnail_virus1-400.jpgThe latest nasty virus to hit the Internet is called Trojan:Win32/Crilock.A, a ransomware that first showed its ugly head on September 10th, 2013. This virus is capable of locking you out of your computer and stealing your sensitive information. Here's everything you need to know about this new ransomware and how to stop it.

Continue reading
0 Comments

Why You Should Never Put Off Your Security Maintenances

b2ap3_thumbnail_safecomp400.jpgHow do you know if your IT security system is doing its job? Security is a silent system, which means if the system is functioning properly, then you won't notice it. However, strong IT security requires maintenance, and if this upkeep is neglected, then your silent system will fail.

Continue reading
0 Comments

What to do when a Dragon Attacks Your Business

b2ap3_thumbnail_dragonrev400.jpgYou know it's important to have a firewall to keep your data safe, but did you know the needs of your business demand stronger firewall software than what comes with your Windows operating system? When dealing with a complex business network, it's highly recommended that you go with a hardware firewall solution that's up for the task.

Continue reading
0 Comments

Get Rid of Virtual Zombies Once and For All

b2ap3_thumbnail_zomb400.jpgIs your computer infected with a Distributed Denial of Service (DDOS) virus? If your workstation is infected with DDOS, then you wouldn't know about it. DDOS is a virus that compromises web servers by creating a zombie command-and-control center. This allows hackers to take control of your servers for the purpose of using your computers for malicious activities.

Continue reading
0 Comments

Sign Up For Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
14 September 2017
Usually I don't refer spending time like these categories subjects and website but really the blog w...
Tip of the Week: 4 Google Chromecast Features that May Surprise You
05 September 2017
I’m really satisfied to find this site.I need to thank you only for this brilliant read!!I unquestio...
Microsoft OneNote May Be the Best Note-Taking Tool on the Market
27 June 2017
I blog frequently and I really value your substance. The article has really crested my advantage. I ...

Latest Blog Entry

20 August 2018
Visicom Blog
Security
It’s not out of the ordinary for employees to not know the best practices surrounding email management, but it’s something that any self-respecting employer needs to consider. How are your employees u...

Latest News

Contact Us

Learn more about what VisiCom Services can do for your business.

callphone

Call us today    248.299.0300

2534 S Rochester Road
Rochester Hills, Michigan 48307

#