Protect Your Business From a Cyberattack!
Recent geopolitical events in Eastern Europe have sparked global warnings of pending cyberattacks. It’s critical now more than ever that consumers and businesses secure the proper data protection solutions to help mitigate against these threats. Recent threat predictions for 2022 now show that 1 of 5 small businesses will suffer a cyberattack or security breach […] Continue Reading…
The hybrid work model and why it’s here to stay
Since Spring of 2020, we at Orange County Computer have seen a huge increase in clients migrating into our Cloud. New mandatory working options were necessary either due to state mandates or individual illness. Because of that, companies needed to turn to tech solutions suited for transitioning to the hybrid work model. Hybrid workplaces existed […] Continue Reading…
Log4j Vulnerability – Am I At Risk?
Just recently, popular cloud services such as Steam and iCloud, as well as apps like Amazon and Twitter were reportedly vulnerable to attack by logging utility Log4j. As reported by Ars Technica, Minecraft was the first to discover the Log4j vulnerability. Their services warned of an actively circulating attack code that exploited the vulnerability to […] Continue Reading…
Apple Devices Targeted by Pegasus Spyware – Update to 14.8
Apple Devices Targeted by Pegasus – What? We are all vulnerable to digital spying, albeit the recommended protections have been put into place for our protections. The latest in cyber security threats is Apple devices targeted by Pegasus Spyware. Devices running iOS (iPhones, Apple Watches, iPads, Laptops) version 14.6 and lower are in jeopardy. The […] Continue Reading…
TLS 1.3 Why Your Emails Just Stopped Working
As the world moves further and further into the cloud, securing the cloud becomes increasingly important. There are an uncountable amount of security protocols which are constantly improved and reinvented to make everyone’s online presence that much safer. As new updates are welcomed, older protocols become unsupported due to discovered exploits and holes; which can […] Continue Reading…