Solving Today's Problems With Today's Technology

Articles, Alerts & How To's

Home » Archive by category "Guidance" (Page 2)

Security Tip – Securing Network Infrastructure Devices

Tip (ST18-001) Security Tip – Securing Network Infrastructure Devices Original release date: June 21, 2018 Redirects to the Official website of the Department of Homeland Security [US-CERT – United States Computer Emergency Readiness Team] To read article visit: https://www.us-cert.gov/ncas/tips/ST18-001

Read Post »

Introduction to Proxy Servers

Article (PSA-0008) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: Introduction to Proxy Servers Original release date: April 17, 2018 Introduction to Proxy Servers You may not know it, but every time you visit a website or connect with someone online,...

Read Post »

What Are Managed Services

Article (PSA-0007) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: What Are Managed Services? Original release date: January 15, 2018 What Are Managed Services? Managed services allow business managers/owners to offload specific IT operations to a service provider. This service provider...

Read Post »

How to Protect Against the Meltdown and Spectre Vulnerabilities

How to Protect Against the Meltdown and Spectre Vulnerabilities Original release date: January 4, 2018 Author: Susan Bradley To read article visit: http://www.itprotoday.com/network-security/how-protect-against-meltdown-and-spectre-vulnerabilities Additional source: https://www.theverge.com/2018/1/4/16848976/how-to-protect-windows-pc-meltdown-security-flaw Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

Read Post »

What Is A Firewall?

Article (PSA-0006) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: What Is A Firewall? Original release date: October 15, 2017 What Is A Firewall? The word firewall was borrowed from firefighting and fire prevention, where the word was used to indicate...

Read Post »

High availability – following the backup rule

Article (PSA-0005) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: High availability – following the backup rule Original release date: September 23, 2017 Reliable backups are one of the foundations of “high availability”. Catastrophe can hit any business, no-matter how small...

Read Post »

CCleaner compromised – urgent read

Original article: https://www.theverge.com/2017/9/18/16325202/ccleaner-hack-malware-security Additional source: https://www.reuters.com/article/us-security-avast/hackers-compromised-free-ccleaner-software-avasts-piriform-says-idUSKCN1BT0R9 CCleaner Software Compromised Original release date: September 18, 2017 If you have been infected please contact (707) 506-6228, and schedule an appointment to have your PC cleaned

Read Post »

How Antivirus and Antispyware Work

Article (PSA-0004) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: How Antivirus and Antispyware Work Original release date: July 18, 2017 Both antivirus and antispyware software monitor your computer for potential threats. If your computer is connected to the internet, you...

Read Post »

Petya Ransomware

Alert (TA17-181A) Petya Ransomware Original release date: July 01, 2017 Redirects to the Official website of the Department of Homeland Security [US-CERT – United States Computer Emergency Readiness Team] To read article visit: https://www.us-cert.gov/ncas/alerts/TA17-181A

Read Post »

IC3 Annual Report – Trends in Internet Crime

2016 Internet Crime Report Giving someone access to your computer is like giving out a key to your front door. A computer can have your bank account information, family photos, and other private documents and data—information that fraudsters would like to steal. That’s why tech...

Read Post »