High availability – following the backup rule

Article (PSA-0005) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: High availability – following the backup rule Original release date: September 23, 2017 Updated date: August 16, 2019 [High Availability is a characteristic of a system, which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period. Modernization has resulted in an increased reliance on these systems. For example,…

Read More >>

CCleaner compromised – urgent read

Original article: https://www.theverge.com/2017/9/18/16325202/ccleaner-hack-malware-security Additional source: https://www.reuters.com/article/us-security-avast/hackers-compromised-free-ccleaner-software-avasts-piriform-says-idUSKCN1BT0R9 CCleaner Software Compromised Original release date: September 18, 2017 If you have been infected please contact (707) 506-6228, and schedule an appointment to have your PC cleaned

Read More >>

How Antivirus and Antispyware Work

Article (PSA-0004) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: How Antivirus and Antispyware Work Original release date: July 18, 2017 Both antivirus and antispyware software monitor your computer for potential threats. If your computer is connected to the internet, you should have a functioning, properly licensed and updated antivirus and antispyware program. At a minimum the software you choose should offer “real-time” scanning, as well…

Read More >>

Petya Ransomware

Alert (TA17-181A) Petya Ransomware Original release date: July 01, 2017 Redirects to the Official website of the Department of Homeland Security [US-CERT – United States Computer Emergency Readiness Team] To read article visit: https://www.us-cert.gov/ncas/alerts/TA17-181A

Read More >>

IC3 Annual Report – Trends in Internet Crime

2016 Internet Crime Report Giving someone access to your computer is like giving out a key to your front door. A computer can have your bank account information, family photos, and other private documents and data—information that fraudsters would like to steal. That’s why tech support fraud has become a significant trend in online crime, according to the 2016 Internet Crime Report from the FBI’s Internet Crime Complaint Center (IC3)….

Read More >>

Survey Response – Don Herriott

Don Herriott Rio Dell, CA 1. What would you rate your technicians performance? Excellent, Great, Okay, Bad 2. How quick was your order completed? Very Fast, Fast, Okay, Slow 3. How do you feel about our prices? Excellent, Great, Okay, Bad 4. How was your overall experience? Excellent, Great, Okay, Bad 5. Would you recommend us to a friend? Of Course, Maybe, Unsure, No Review – Billy Joe did everything…

Read More >>

Introduction to Malicious Software

Article (PSA-0003) Submitted by: Billy Joe Long, Member/Manager Company: Problem Solving Applications, LLC Titled: Introduction to Malicious Software Original release date: March 27, 2017 The Internet has become a dangerous place, and computer security threats are a very real concern for any organization or home that uses a computer. Symantec, a computer security provider, reported discovering more than 430 million new unique pieces of malware in 2015. That number is…

Read More >>

Survey Response – Kathy Wildgrube

Kathy Wildgrube Rio Dell, CA 1. What would you rate your technicians performance? Excellent, Great, Okay, Bad 2. How quick was your order completed? Very Fast, Fast, Okay, Slow 3. How do you feel about our prices? Excellent, Great, Okay, Bad 4. How was your overall experience? Excellent, Great, Okay, Bad 5. Would you recommend us to a friend? Of Course, Maybe, Unsure, No

Read More >>