Latest Articles

Category: IT Security

windows-11-dump-files
Microsoft
Kegan Mooney

How to Find Windows Dump Files on Windows 11

Are you fed up with seeing the notorious BSOD (Blue Screen of Death)? Thankfully every time you see that dreaded blue screen, it creates Windows dump files that offers some insight into what is wrong with your PC. The only issue is, Windows 11 doesn’t make it obvious where to

Read More »
roll-back-windows-11-updates
Microsoft
Kegan Mooney

How to Roll Back Windows Updates in Windows 11

Sometimes it can be necessary to roll back a Windows update, this might be due to compatibility issues, or the update simply added a feature that’s causing you trouble. However, it’s important to first make sure that rolling back the update won’t cause you any security problems, leaving you vulnerable

Read More »
best-rj45-ethernet-cable
Hardware
Kegan Mooney

Ethernet Cables Explained: Choosing the Right RJ45 Standard

When it comes to networking, the RJ45 Ethernet cable acts as the backbone for transmitting data between devices. However, not all Ethernet cables are created equally, newer Ethernet standards offer much quicker data transfer rates, but at a higher price. But what is the difference between Ethernet standards, and is

Read More »
hdr-content
Microsoft
Kegan Mooney

How to Calibrate HDR in Windows 11

If you’ve got a HDR capable display, you’re going to want to ensure you’re making the most out of it, and that often includes calibrating HDR in Windows 11 to make sure you are getting the best visual experience possible. Enabling HDR in Windows 11 Before you calibrate HDR, you

Read More »
ransomware-attack
IT Security
Kegan Mooney

Understanding Ransomware Attacks and How to Prevent Them

Ransomware is one of the most devastating forms of cyber security threats you can face. Ransomware is an invasive malware that prevents a user from accessing their device, and all the data stored on it. Unlike some malware, if you’ve been targeted by a ransomware attack you will know it. Not

Read More »
ddos-attack
IT Security
Kegan Mooney

What Are DDoS Attacks and How to Protect Yourself From Them

In today’s digital world, where everyone is connected through the digital landscape, there is an ever-increasing threat of cyberattacks. One of the most damaging cyberattacks is the DDoS (Distributed Denial-of-Service) attack. But what exactly is a DDoS attack, how can it affect your small business, and more importantly, what can

Read More »
2fa-azure-methods-featured
IT Security
Don Houk

Microsoft Azure AD’s New Settings Push Greater Security

If your company uses Microsoft Entra ID (formerly Azure Active Directory) to manage its users, a new option for admins will push greater security onto your users. Let’s take a look at what this means and how this setting works. Microsoft Gets More Secure We’ve discussed before how a password

Read More »
qr-codes-phishing-attack
IT Security
Don Houk

How QR Codes Are Used in a New Phishing Attack

In mid-August 2023, security company Cofense published a report detailing a new string of phishing attacks against an otherwise-unnamed “major Energy company based in the US”. These attacks rely on the use of a QR code, which is not a particularly popular method for such schemes. Let’s look at the

Read More »
security-man-featured-image
IT Security
Don Houk

A Microsoft Outlook Exploit Is 2023’s Worst Security Flaw So Far

One of the first major security vulnerabilities of 2023 has hit, and it’s a massive one. This Outlook exploit allows remote attackers to steal a user’s Windows password by simply sending them an email. Let’s review what this exploit does, why it’s so dangerous, and what we’ve done to protect

Read More »
aug-2022-secuity-events-featured
IT Security
Don Houk

Looking Back at 5 Security Threats From August 2022

In August 2022, several companies experienced security breaches or other exploits that left user data exposed. While these breaches aren’t as severe as the headline ones from 2021, they’re still concerning. Let’s quickly review the major security events that happened in August 2022 so you’re aware of what happened and

Read More »
email-phishing-crowdstrike-campaign-featured
IT Security
Don Houk

How a Malicious Campaign Impersonated Security Companies

In July 2022, several security companies found that malicious actors were impersonating them to send out emails with the intent to trick users. While the exact results of this campaign aren’t known, it’s a good opportunity to learn from scammers’ tricks to protect yourself in the future. Let’s look at

Read More »
follina-exploit-featured
IT Security
Don Houk

Understanding the Windows Follina Exploit

A nasty Windows exploit popped up in June 2022 that allowed remote attackers to take over your computer with little input needed from your end. While this has since been patched by Microsoft, it’s worth going over to see how this worked and what we can learn from it for

Read More »
iphone-security-tips-featured
IT Security
Don Houk

5 Important iPhone Security Practices You Should Know

This post was originally published on February 26, 2019, and updated on April 20, 2022. You often hear about securing your computer and home network, but how much have you thought about securing your phone too? Our smartphones go with us everywhere and carry a lot of personal information. It’s

Read More »
edr-security-explained-featured
IT Security
Don Houk

Why Your Business Needs an EDR for Better Protection

As threats to your company’s infrastructure continue to involve, a traditional antivirus isn’t enough to keep you safe anymore. A more intelligent solution like an EDR is needed as a proactive layer. We’ve rolled out CrowdStrike EDR to all our clients for this purpose. Let’s take a look at what

Read More »
cloud-storage-security-featured
IT Security
Don Houk

How to Keep Your Files Safe When Using Cloud Storage

If you store files in a cloud storage service, whether for business or personal use, you should be aware of ways to keep those files secure. While cloud storage is convenient and mostly safe, there are always risks when storing files on someone else’s server. Let’s look at some practical

Read More »