Don’t Panic if You Come Across Hard Drive Problems

Don’t Panic if You Come Across Hard Drive Problems

For people in the Apple Valley, Victorville, and Hesperia area, Sonic Systems provides a variety of computer services for local businesses. One of the most common computer problems that the professionals at Sonic Systems solve on a daily basis involves computer hard drives.  Hard Drives Fail over Time There are many ways that a hard…

Details
Detecting Keyloggers and Espionage Software

Detecting Keyloggers and Espionage Software

Did you know that there is a thriving industry that caters to people who enjoy surreptitiously spying on others? Spy shops that sell telescopes, hidden cameras, voice recorders, and other surveillance devices tend to do brisk business, and there is also a software side to this industry. What Can Spying Software Do? Spy software, not…

Details
Why Cybercrime Groups Become More Active During the Holidays

Why Cybercrime Groups Become More Active During the Holidays

Less than two weeks before Christmas, Mayor LaToya Cantrell of New Orleans declared a state of emergency after she was informed of a major cyberattack on the city’s networks. Following the advice of IT security managers, Mayor Cantrell ordered an immediate shutdown of municipal data centers, servers, hybrid cloud networks, and even internet-connected client devices.…

Details
Real-World Network Security Testing for Business Owners

Real-World Network Security Testing for Business Owners

The fourth and final season of “Mr. Robot,” the gritty techno-thriller series broadcast on the USA cable television network, will come to an end in the next few months, and it will likely be remembered for its highly realistic portrayal of cybercrime. The production team behind “Mr. Robot” insisted on making hacking scenes, which ranged…

Details
Lessons from the 2019 Baltimore Ransomware Attack

Lessons from the 2019 Baltimore Ransomware Attack

On May 7, various networks operated by the City of Baltimore were subject to a ransomware attack that resulted in a loss of more than $18 million. Municipal services in this large American metropolis were substantially crippled by the attack over several weeks; the City Council ordered employees to set up temporary Gmail accounts, but…

Details
Understanding Hybrid and Private Cloud Systems

Understanding Hybrid and Private Cloud Systems

Cloud computing, at least as we came to know it during its inception in the late 1990s, has changed significantly. When most people think about “the cloud,” they have a vision of public cloud computing, which encompasses popular services such as Microsoft Office 365, Google’s G Suite for business productivity, and Software-as-a-Service solutions such as…

Details
Information Security Lessons From the Marriott Data Breach

Information Security Lessons From the Marriott Data Breach

In December 2018, news about a massive data breach of networks used by Marriott International prompted United States Secretary of Commerce Wilbur Ross to comment on the matter. In response to a question presented by financial news network CNBC about the Marriott incident, which compromised the personal information of up to 500 million hotel guests…

Details
Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details
Understanding the Cyber Kill Chain Used by Hackers

Understanding the Cyber Kill Chain Used by Hackers

Information security researchers who study the actions and behavior of sophisticated hackers use the term “cyber kill chain” to describe some of the strategies used in modern cybercrime. To a certain extent, the cyber kill chain is similar to strategies used by military units and career thieves who take pride on pulling off complex heights.…

Details
What You Should Know About the VPNFilter Router Malware

What You Should Know About the VPNFilter Router Malware

According to a recent advisory published by the Federal Bureau of Investigation, small business owners in the High Desert should reboot their routers to minimize their exposure to a new cyber threat. What Businesses Are at Risk for Unsecure Data? The routers affected by VPNFilter include those manufactured by popular brands such as NETGEAR and…

Details