Defending Against Modus Operandi

You work for a small to mid-sized business and outsource the support of your IT systems to a vendor. How do you gauge if your vendor is doing the job you pay them to do? How do you know they are implementing proper security measures? Let us face it, these questions become secondary or tertiary […]Continue Reading

Cyber Security for Small Business Seminar

Join Avasek for a cyber security seminar aimed at small business. Sixty-six percent of companies and professional firms that suffer a data breach are out of business within six months. The trend among hackers: target small businesses. Avasek Security demonstrates how easy it is for hackers to access your data and how to protect your […]Continue Reading

US-Computer Emergency Readiness Team recommends uninstall of QuickTime for Windows

Description QuickTime for Windows has two critical flaws and Apple is ending support and not going to patch them. If a user visits a malicious web page or opens a malicious file, the vulnerabilities could execute code in the security context of the QuickTime player. Using unsupported software may increase the risks from viruses and […]Continue Reading

Tech Support Scam: Dell Customer Data Breached

A new phone scam is on the rise and it involves Dell PCs’ owners. Scammers call people who use Dell PCs, and claim to be Dell Tech Support Representatives. They trick users by offering to fix “existing” computer problems by installing remote access software on the victim’s computer. But instead of fixing a problem, scammers […]Continue Reading