NEWS ARTICLES
At Our IT Department, we do our best to keep you up-to-date with all the latest news and updates regarding IT issues and enhancements.
5 Cyber Safety Tips To Survive the Internet, Hackers and Scammers
Navigating the internet can be hard. Bad actors intent on exploiting uninformed users are constantly lurking behind emails, websites, and social media invites. Even your
Western Digital app bug gives elevated privileges in Windows and mac-OS
Western Digital’s EdgeRover desktop app for both Windows and Mac are vulnerable to local privilege escalation and sandboxing escape bugs that could allow the disclosure
Microsoft reminds of Internet Explorer’s looming demise in June
Microsoft has reminded Windows customers today that they’ll finally retire the Internet Explorer 11 web browser. After Internet Explorer is retired, Microsoft will still support
How Long It Would Take A Hacker To Brute Force Your Password In 2022, Ranked
According to Hive Systems your passwords should be at least 18 mixed up characters for maximum security. Here’s how long it would take a hacker
New worm and data wiper malware seen hitting Ukrainian networks
Newly discovered malware was deployed in destructive attacks against Ukrainian organizations and governmental networks before and after Russia invaded the country on February 24. While
What is Backup and Recovery?
Are you on the fence contemplating on whether or not your company needs a backup solution? If you have a backup solution, how often is
FTC: Americans lost $770 million from social media fraud surge
By: Sergiu Gatlan Americans are increasingly targeted by scammers on social media, according to tens of thousands of reports received by the US Federal Trade
Microsoft pulls new Windows Server updates due to critical bugs
By: Lawrence Abrams Microsoft has pulled the January Windows Server cumulative updates after critical bugs caused domain controllers to reboot, Hyper-V to not work, and
A New Year Will Bring New Targets: What to Look for in 2022
By: Derek Manky There’s no way to put it nicely: cybercrime just continues to get worse as we become increasingly connected. 2020 was a banner
LastPass users warned their master passwords are compromised
By: Sergiu Gatlan Many LastPass users report that their master passwords have been compromised after receiving email warnings that someone tried to use them to
Credit card info of 1.8 million people stolen from sports gear sites
By: Bill Toulas Four affiliated online sports gear sites have disclosed a cyberattack where threat actors stole credit cards for 1,813,224 customers. While not much
New zero-day exploit for Log4j Java library is an enterprise nightmare
By Sergiu Gatlan Proof-of-concept exploits for a critical zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library are currently being shared online, exposing home
US government securities watchdog spoofed by investment scammers – don’t fall for it!
by: Paul Ducklin The US Securities and Exchange Commission (SEC) has issued numerous warnings over the years about fraudsters attempting to adopt the identity of
Online Holiday Scams are Upon Us
Holidays are the times we look forward to our entire year. Whether it be joyful times with family or vacation plans, everything can be messed
Costco discloses data breach after finding credit card skimmer
By: Sergiu Gatlan Costco Wholesale Corporation has warned customers in notification letters sent this month that their payment card information might have been stolen while
FBI: Ransomware targets companies during mergers and acquisitions
By: Sergiu Gatlan The Federal Bureau of Investigation (FBI) warns that ransomware gangs are targeting companies involved in “time-sensitive financial events” such as corporate mergers and
US government discloses more ransomware attacks on water plants
By: Sergiu Gatlan U.S. Water and Wastewater Systems (WWS) Sector facilities have been breached multiple times in ransomware attacks during the last two years, U.S.
Facebook privacy Settings you should change now
by: Kaleb Brown As if Facebook didn’t have enough drama last week following the testimony from the whistleblower and the outage affecting all of its
Enterprises Warned About Zix-Themed Credential Phishing Attacks
By Eduard Kovacs Enterprise users have been warned that cybercriminals may be trying to phish their credentials by luring them with fake emails that appear
US farmer cooperative hit by $5.9M BlackMatter ransomware attack
By: Lawrence Abrams U.S. farmers cooperative NEW Cooperative has suffered a BlackMatter ransomware attack demanding $5.9 million not to leak stolen data and provide a
Are you backing up your Office 365? (Probably not)
By: Kaleb Brown When purchasing Office 365, you’ve probably been under the impression that your information is safe and secure. You pay a monthly (or
The home security system that can be hacked with your email address
By: Paul Ducklin A researcher at vulnerability and red-team company Rapid7 recently uncovered a pair of risky security bugs in a digital home security product.
Cybersecurity and Infrastructure Security Agency Advisory
By: Brooke Baggett An advisory has been issued this week by the FBI and CISA (Cybersecurity and Infrastructure Security Agency). This advisory (link provided below)
T-Mobile CEO: Hacker brute-forced his way through our network
By Sergiu Gatlan Today, T-Mobile’s CEO Mike Sievert said that the hacker behind the carrier’s latest massive data breach brute forced his way through T-Mobile’s network after
T-Mobile says hackers stole records belonging to 48.6 million individuals
By Sergiu Gatlan T-Mobile has confirmed that attackers who recently breached its servers stole files containing the personal information of tens of millions of individuals. The
Microsoft Exchange servers scanned for ProxyShell vulnerability, Patch Now
By Lawrence Abrams Threat actors are now actively scanning for the Microsoft Exchange ProxyShell remote code execution vulnerabilities after technical details were released at the Black
Windows “PetitPotam” network attack – how to protect against it
by Paul Ducklin French researcher Gilles Lionel, who goes by @topotam77, recently published proof-of-concept code that attackers could use to take over a Windows network.
To Pay or Not to Pay?
By: Greg Hayman, Kaleb Brown, and David Watson Computer Networks for Businesses continue to be under fire. They’re being attacked by old and new Cyber
You’ll want to shut down the Windows Print Spooler service (yes, again): Another privilege escalation bug found
By: Richard Speed Microsoft has shared guidance revealing yet another vulnerability connected to its Windows Print Spooler service, saying it is “developing a security update.”
Kaseya patches VSA vulnerabilities used in REvil ransomware attack
By Lawrence Abrams Kaseya has released a security update for the VSA zero-day vulnerabilities used by the REvil ransomware gang to attack MSPs and their
Microsoft’s incomplete PrintNightmare patch fails to fix vulnerability
By Lawrence Abrams Researchers have bypassed Microsoft’s emergency patch for the PrintNightmare vulnerability to achieve remote code execution and local privilege escalation with the official
Ransomware: What REALLY happens if you pay the crooks?
By: Paul Ducklin Governments and law enforcement hate it when ransomware victims pay the blackmail demands that almost always follow a ransomware attack, and you
Cisco ASA vulnerability actively exploited after exploit released
By Lawrence Abrams This vulnerability can allow an unauthenticated threat actor to send targeted phishing emails or malicious links to a user of a Cisco
Carnival Cruise Ship hit with Cyberattack
by Lisa Vaas This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware
Last Week in Ransomware – June 11th 2021 – Under Pressure
By Lawrence Abrams It has been quite the week when it comes to ransomware, with ransoms being paid, ransoms being taken back, and a ransomware
US recovers most of Colonial Pipeline’s $4.4M ransomware payment
By Lawrence Abrams The US Department of Justice has recovered the majority of the $4.4 million ransom payment paid by Colonial Pipeline to the DarkSide
“Have I Been Pwned” breach site partners with… the FBI!
by Paul Ducklin In case you’ve never heard of it, Have I Been Pwned, or HIBP as it is widely known, is an online service
Beware fake online trading apps, on iOS as well as Android
by Paul Ducklin Remember how ransomware started? It was all about volume. The CryptoLocker gang, for example, raked in millions of dollars, perhaps even hundreds
Tecinfo Communications RDOF Fiber Project
Our parent company, TecInfo Communications, is proud to have won the opportunity, to build and operate a fiber network, through portions of Sunflower, Bolivar and
Ransomware: don’t expect a full recovery, however much you pay
by Paul Ducklin When it comes to all the various types of malware out there, none has ever dominated the headlines quite as much as
Gamers beware! Crooks take advantage of MSI download outage
by Paul Ducklin Well-known computer gaming hardware vendor MSI is warning of fake download sites ripping off its brand. The company doesn’t just sell high-end
FBI Hacks into infected US Servers (and cleans them)
by Paul Ducklin Remember HAFNIUM? Of course you do – it was the name behind a foursome of Exchange bugs that got patched in an
The Buzz about Cloud Computing
“Cloud computing” is a major buzzword, and while you may know that it could be a great benefit to your business, you may not be
Cisco Continues To Build Intercloud Strategy
Cloud computing has changed business IT in many ways. Now, businesses of all sizes can achieve more and enjoy better efficiency, all while lowering expenses.
Are employees putting your data at risk?
A data breach is a terrifying prospect, whether your business has six employees or six thousand. But in the quest for tighter, more foolproof security,
The difference between download and upload speeds
Normally it takes more time to upload a file then to download one of the same size, and for the most part this is by
Before you call tech support
Our IT Department can build or re-design your network from the ground up and handle all maintenance issues. More importantly, we’re always there for you,
Benefits of Dedicated Bandwidth
Dedicated bandwidth is reserved for one subscriber; your connection is yours and yours alone. This ensures that you always get the same high rate of
Cloud Computing
“Cloud computing” is a major buzzword, and while you may know that it could be a great benefit to your business, you may not be
Colocation from Our IT Department
Our IT Department in Leland and Jackson Mississippi offers colocation services, data center services, disaster recovery and a fully experienced, knowledgeable team of IT people
Computer Security, Part 4
Keeping Your Business Computer Safe and Secure We’re bringing you more ways to stay safe and secure online. So far, we’ve covered antivirus protection, antispyware
Should you own your own data center?
Should you own your own data center? As a business owner or manager, one of the most critical decisions you will make is how to
How Do I Choose the Best Local ISP
How Do I Choose the Best Local ISP? When shopping around for local Internet service, it often means that a customer will compare several different
Computer Security, Part 3
Keeping Your Business Computer Safe and Secure Our IT Department wants to make sure that your business information is safe from attacks. In our ongoing
Battle of the Bandwidth
We’ve all been there. We’ve all been that frustrated customer gritting our teeth to the ever-ongoing cheesy elevator music while we curse the name of
Make the Most of Your Internet Connection
One of the biggest annoyances of this day and age when it comes to modern technology is an Internet connection that is not being maximized
Protect Your Business Assets
I am sitting at my desk this morning kicking off the New Year, well actually month two of it and like you, our business has
Computer Services from Our IT Department
Our IT Department presents a new way of managing your computer systems. We offer a single point of contact for consulting, network management, systems integration,
Holiday Hours
Our IT Department will observe the following hours during the holiday: Christmas Eve: 8:00 AM CST to 12:00 PM CST Christmas Day: Closed New Year’s
Computer Security 101, Part 2
Keeping Your Business Computer Safe and Secure We’re continuing our look at easy and inexpensive ways to keep your computer clean and in great shape.
Computer Security 101 Part 1
Keeping Your Busines Computer Safe and Secure It’s a simple truth that there is danger in the world. We’ve been taught our whole lives how
Customer Service Problem Solving
The truth is that a business isn’t a business unless they have business. A customer base is the foundation of a business’ ability to operate
Dedicated Bandwidth
Dedicated bandwidth is reserved for one subscriber; your connection is yours and yours alone. This ensures that you always get the same high rate of
Computer Security 101, Part 5
Keeping Your Home Computer Safe and Secure Welcome back to our series on home computer security! We’ve talked about antivirus, antispyware, firewalls, and strong passwords.
Computer Security 101, Part 4
Keeping Your Business Computer Safe and Secure We’re bringing you more ways to stay safe and secure online. So far, we’ve covered antivirus protection, antispyware
Computer Security 101, Part 3
Keeping Your Business Computer Safe and Secure In our ongoing efforts to keep you safe and secure online, we’ve talked about antivirus software and antispyware.