‘Tis the season… to avoid holiday scams!
As the holiday season comes to a close, you may be scrambling to find the perfect gift for a loved one. Don’t know what to get? Maybe you’re looking at gift cards for them to use at their favorite restaurant or retail store. Whatever the case, you’ll most likely be using the internet to help […]
Continue Reading...Venus Ransomware: Secure Remote Desktop Access!
A relatively new malware is making its rounds by the name of “Venus”. According to MalwareHunterTeam, it first appeared in August, with additional attacks in September and October. Although recent, attackers are actively targeting networks and devices, with new submissions uploaded daily to request identification of ransomware. Read on to learn more about Venus Ransomware […]
Continue Reading...Update Your Devices!: New Apple Zero-Day Vulnerability
Earlier this month, Apple discovered a zero-day vulnerability that posed a risk to Mac and iOS devices across the board. The flaw specifically targets software – macOS and iOS systems – and the company reported that cybercriminals may have seized the opportunity to make use of the vulnerability. Read on to learn more about this […]
Continue Reading...The Resurgence of the MSP
How managed services providers are crucial to supporting hybrid work environments As we look back, our world forever changed in 2020 by the COVID-19 pandemic. Within the IT services world, it was also the year that made a significant impact on the MSP industry. Organizations and companies rapidly pivoted away from the traditional office environment […]
Continue Reading...How remote employees could compromise your network
For the last few years, many businesses have let their employees work from home to stop the spread of the COVID-19 virus. Now, many are returning to work in either a full-time or hybrid capacity. While that may be wonderful for productivity and team culture, it may bring a downside. A new survey released by […]
Continue Reading...Can You Spot A Spoofed Email?: How To Protect Your Business From Today’s Biggest Phishing Risks
Have you ever received an email from a client you regularly communicate with, but it looks… “off”? Or perhaps you’ve received an email from a bank that you don’t hold an account with, or a company requesting that you pay an invoice for goods you never even purchased. What you’ve encountered is most likely a […]
Continue Reading...Protect Your Business From a Cyberattack!
Recent geopolitical events in Eastern Europe have sparked global warnings of pending cyberattacks. It’s critical now more than ever that consumers and businesses secure the proper data protection solutions to help mitigate against these threats. Recent threat predictions for 2022 now show that 1 of 5 small businesses will suffer a cyberattack or security breach […]
Continue Reading...The hybrid work model and why it’s here to stay
Since Spring of 2020, we at Orange County Computer have seen a huge increase in clients migrating into our Cloud. New mandatory working options were necessary either due to state mandates or individual illness. Because of that, companies needed to turn to tech solutions suited for transitioning to the hybrid work model. Hybrid workplaces existed […]
Continue Reading...Log4j Vulnerability – Am I At Risk?
Just recently, popular cloud services such as Steam and iCloud, as well as apps like Amazon and Twitter were reportedly vulnerable to attack by logging utility Log4j. As reported by Ars Technica, Minecraft was the first to discover the Log4j vulnerability. Their services warned of an actively circulating attack code that exploited the vulnerability to […]
Continue Reading...