• What is Ransomware?
    Comments Off on What is Ransomware?

    Ransomware is a type of malware that locks users out of their computers and requires a fee to return access to the computer. More sophisticated forms encrypt files on the hard drive making it very difficult to decrypt without paying the fee. Once the fee is paid, the malware isn’t necessarily gone; it could be…

    Read more
  • Security is expensive But not implementing is 1000 times more expensive
    Comments Off on Security is expensive But not implementing is 1000 times more expensive

    A massive breach of medical records containing confidential personal information has prompted both federal and state investigations. It all started when CBS 2 Investigator Dave Savini got a tip about what a dumpster diver found in the trash. Suburban Lung Associates has numerous offices affiliated with major hospitals. The Northbrook company is responsible to store…

    Read more
  • Google’s Project Zero Exposes Windows 8.1 Security Flaw
    Comments Off on Google’s Project Zero Exposes Windows 8.1 Security Flaw

    Windows 8.1 allows low-level users to gain administrator privileges. It has been 90 days since Google found the security issue, however there is still no fix from Microsoft. This security hole was found as part of Google’s Project Zero initiative, which finds weaknesses in software in hopes that the developers can create solutions before hackers…

    Read more
  • Snowden Documents Show the Scope of NSA
    Comments Off on Snowden Documents Show the Scope of NSA

    In light of the NSA documents released by Edward Snowden, we are able to see what levels of encryption the NSA struggled to break through. German News Station Der Spiegel, has revealed the holes in the NSA’s encryption breaking programs. It turns out that there are some networks that the NSA just can’t break at…

    Read more
  • Information Theft: It is Easier to Prevent Than to Clean Up
    Comments Off on Information Theft: It is Easier to Prevent Than to Clean Up

    It is unfortunate, but every now and then we come across a similar information theft story. In this case, it was a restaurant whose poor security resulted in stolen credit card information. The medium sized restaurant had a few point of sale (POS) terminals and a single computer in the manager’s office which was also…

    Read more
  • Recommended bandwidth for health care providers
    Comments Off on Recommended bandwidth for health care providers

    It is critical you have the broadband capabilities to support your electronic health record (EHR) system. The Federal Communications Commission (FCC) recommends the following minimum bandwidth speeds: Single Physician Practice – 4 megabits per second (Mbps) Supports practice management functions, email, and web browsing Allows simultaneous use of electronic health record (EHR) and high-quality video consultations…

    Read more
  • How Will Major Changes Coming to Credit Cards Affect You?
    Comments Off on How Will Major Changes Coming to Credit Cards Affect You?

    Starting October 2015, MasterCard and Visa will helper in a major change in the U.S. credit card industry.  Credit cards will have chips built in. Instead of signing credit card receipts consumers will use PIN numbers.  Instead of swiping a magnetic strip consumers will insert the credit card into. It’s all part of a main…

    Read more
  • Beware Predatory Apps in the Google Play Store
    Comments Off on Beware Predatory Apps in the Google Play Store

    The bane of the remote access Trojan (RAT)—those greedy apps that use Web microphones and cameras to secretly spy on victims—has officially entered the Android arena. Researchers have found a secret RAT available for download in the official Google Play store. Not only this, they have also detected a full-featured toolkit for sale in secretive…

    Read more
  • Network Vulnerability
    Comments Off on Network Vulnerability

    It is that time of the year again: March Madness. Continuous memories of your father sitting down your whole family for a yearly test on college sports teams’ mascots, if you’re like me. More usual people probably means you’re conscious and have filled out a support, if you are other. Many of us out there…

    Read more
  • Protect Yourself against This Unique Netflix Scam
    Comments Off on Protect Yourself against This Unique Netflix Scam

    I’d never seen before, “Uniting a phishing con with a fake tech support call center”. The Malwarebytes senior security researcher told segura trying to enter a fake Netflix login on the streaming service’s homepage, only to be presented with a notice telling him the account has been suspended, and telling him to sound a fake…

    Read more

Skokie Location

5152 Main Street
Skokie, IL 60077
Tel: (847) 763 0763
Fax: (847) 763 1308

Chicago Location

77 W Washington St
Chicago, IL 60602-2803
Tel: (312) 739 2427
Fax: (847) 763 1308

Glenview Location

4725 Locust Ave
Glenview, IL 60025
Tel: (847) 972 2062
Fax: (847) 972 2090

Dallas Location

5057 Keller Springs Road Suite 300
Addison, TX 75001
Tel: (972) 214 2373
Fax: (972) 666 4289

Certified Chicago IT Consulting Company

Microsoft Certified Gold Partner

Great Computer Solutions, Inc. BBB Business Review

Search

Support


Back to Top