Total Networks Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in Security

b2ap3_thumbnail_stethescope_keyboard_400.jpgIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

Tagged in: Health Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Tagged in: Privacy Security WiFi
0
Continue reading 0 Comments

Is Your Antivirus Software Up to Snuff?

Posted by on in Security

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpgAll of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

0
Continue reading 0 Comments

USB Software is Bad to the Bone, Literally

Posted by on in Security

b2ap3_thumbnail_badusb_a_threat_400.jpgUSB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business.

Tagged in: Malware Memory Security
0
Continue reading 0 Comments

Use a Firewall Before You Get Burned

Posted by on in Newsletter

b2ap3_thumbnail_security_procedure_including_firewall_400.jpgToo many people think that their systems are safe from the corruption of hackers and viruses. They're wrong. In order to keep your business safe from all of the common threats found on the Internet, you should think about installing some protective software.

0
Continue reading 0 Comments

b2ap3_thumbnail_smartphone_security_400.jpgWhen it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

0
Continue reading 0 Comments

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpgApple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

Tagged in: Apple Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_are_they_watching_you_400.jpgThe Hackers on Planet Earth (HOPE) conference which took place on Saturday, July 21st 2014, had an important panelist, that being Edward Snowden. Whether he's a whistleblower or a traitor is a hot topic on the web, but one thing is certain - he has called for assistance in creating and promoting anti-surveillance technology to mitigate government spying.

0
Continue reading 0 Comments

b2ap3_thumbnail_will_everything_be_connected_400.jpgThe Internet of Things is on its way. But, is the world ready for it? Some experts aren't so sure about that. The Internet of Things may very well usher the world through the door to social inequality and violations of basic human rights, among other atrocities.

0
Continue reading 0 Comments

b2ap3_thumbnail_gameover_zeus_and_cryptolocker_400.jpgIt has been two weeks since the National Communications Association warned the world about the GameOver Zeus and Cryptolocker ransomware, and if you haven't taken steps to avoid these threats, it's not too late - if you haven't been infected yet, do so as soon as possible. Otherwise, your network will be vulnerable, and so will your banking credentials.

Tagged in: Alert Malware Security
0
Continue reading 0 Comments

b2ap3_thumbnail_do_not_remove_antivirus_400.jpgDoes your company have dedicated antivirus software to protect it against the annoying threats on the Internet? Sometimes, a computer virus can weasel its way past your software, but there's no greater frustration than when you realize that the reason you contracted a virus is because an employee disabled your software. Don't let this happen to you!

0
Continue reading 0 Comments

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

Tagged in: Hackers Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_security_wifi_400.jpgIf your wireless router is an archaic piece of machinery from the turn of the century, you owe it to yourself to upgrade to something a little less dusty. Depending on your Internet connection, increasing your bandwidth is a tricky matter, and the easiest way to do so is by upgrading your wireless router. These next-gen routers are simple to use and don't require passwords; something that both increases network security and ease of use.

Tagged in: Router Security WiFi
0
Continue reading 0 Comments

b2ap3_thumbnail_broken_memory_400.jpgWhen your server experiences an issue, you have to act fast and take care of it before the issue turns into a problem. If a server problem is left unresolved, it can spread across your network and negatively affect operations. This is why it's best to take care of a server issue as soon as it's discovered.

A common server problem is... what was it again? Oh, right. Memory failure!

0
Continue reading 0 Comments

b2ap3_thumbnail_game_over_zeus_400.jpgA new botnet threat could spell "game over" for unaware Windows users - the threat targets almost all versions of Windows and Windows Server (excluding Windows 8.1). Even though the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice have disrupted it, users are still at risk. Thankfully, they still have time - two weeks, until the threat returns.

Tagged in: Alert Malware Security
0
Continue reading 0 Comments

b2ap3_thumbnail_windows_eight_updates_400.jpgIn light of all of the recent vulnerabilities found in Microsoft's Internet Explorer browser and Windows XP operating system, owners of XP are growing nervous about the upcoming "patch Tuesday," Microsoft's monthly patch release day. But, what if what Microsoft isn't patching in the newer operating systems is what needs to be patched the most in XP?

0
Continue reading 0 Comments

b2ap3_thumbnail_siri_vuln_400.jpgDon't trust anything you can't see - a valuable lesson for anyone. But, why shouldn't you trust your own phone? Egyptian programmer Sherif Hashim has discovered a vulnerability in the most recent version of iOS (7.1.1) that allows hackers to physically access your contacts without unlocking your phone.

Tagged in: Alert iPhone Security
0
Continue reading 0 Comments

b2ap3_thumbnail_internet_connected_security_400.jpgIn today's connected home, Internet security needs to extend beyond the PC. Any device that's connected to the Internet needs to be password protected, secured with a firewall, and utilize available security apps. These precautions should be taken even with seemingly harmless devices like baby monitors. A family from Ohio recently learned this lesson the hard way.

0
Continue reading 0 Comments

A Lesson from Y2K’s Unsung Heroes

Posted by on in Newsletter

b2ap3_thumbnail_proactive_one_400.jpgFifteen years ago, a simple oversight in technology development caused worldwide panic. The crisis was Y2K, and the fear was that, on New Year's Eve, computers would reset to 1900 instead of 2000, causing all technology to fail. Thankfully, New Years Eve came and went without incident and people got worked up over nothing. You've heard story, but you may not have heard about all the work IT companies did to save the day!

0
Continue reading 0 Comments

Space Technology Repair By Chewbacca

Posted by on in IT Blog

b2ap3_thumbnail_chewy_face_400.jpgAcross the galaxy, Star Wars fans will be celebrating their beloved science fiction franchise on May 4th (May the fourth be with you). One of the most fascinating aspects about Star Wars is its space technology. As cool as lightsabers and blasters are, Star Wars tech can break down just like our modern space technology. Concerning technology repair, we think troubleshooting space tech in our day can be just as exciting as repairing space technology "a long time ago in a galaxy far, far away."

0
Continue reading 0 Comments