888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

0 Comments
Continue reading

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

0 Comments
Continue reading

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Privacy Managed IT Services Network Security Cloud Malware Internet Hackers User Tips Efficiency Microsoft Communications Data Productivity Outsourced IT IT Support Cybersecurity Communication Business Management Tech Term Backup Ransomware Business Smartphones Windows 10 Hardware Passwords Software Innovation VoIP Email Google Users Productivity Social Media Network Mobile Device IT Services Small Business Alert Data Backup Smartphone Apps Bandwidth Browser Data Recovery Cloud Computing Save Money Miscellaneous Collaboration Hosted Solutions Holiday Phishing Microsoft Office Twitter Workplace Tips Office 365 Data Breach Saving Money Vulnerability Mobile Devices Computer Internet of Things Access Control Android Business Continuity App Government Patch Management Blockchain Workers Office Net Neutrality Personal Information Wireless Settings Excel Company Culture Mobile Device Management Politics Law Enforcement Chrome Wi-Fi Networking Employer-Employee Relationship Compliance Applications Remote Monitoring Scam Facebook Gadgets BDR Cybercrime Maintenance Password Healthcare Website Managed Service Retail Upgrade Data Security BYOD Spam Computers Medical IT Paperless Office Automation Managed IT Service Antivirus SaaS Voice over Internet Protocol Dark Web Managing Stress Virus Remote Monitoring and Management Telephony Windows Information Word Virtual Assistant Education Value Marketing Entertainment Vendor Management Connectivity How To Recovery Travel Troubleshooting Hard Disk Drive HP Sales Cleaning Printers Hard Drives Data loss Current Events Shortcut DDoS WiFi Certification Leadership Access Streaming Media Physical Security Touchscreen Employee-Employer Relationship Technology Tips Hybrid Cloud Customer Service HIPAA Router Reporting Content Filtering Cryptocurrency Live Streaming VoIPMyths Video Document Management Dark Data Database Plug-In Tablet Computer Care Staff Avoiding Downtime RAM Microsoft Office 365 Electronic Health Records CrashOverride Telephone Systems Data Protection Mobility Downloads Files Cortana Backup and Disaster Recovery Cables Remote Support Profitability Hard Drive Disaster Recovery Gmail Microsoft Teams WhatsApp VoIPSavings Wireless Charging Tactics Unified Threat Management Proactive IT Knowledge E-Commerce Gaming Console Websites Authentication Health e-waste Remote Control Training Analytics Managed Service Provider Artificial Intelligence Cost Management Trends SSD Two-factor Authentication Eliminating Downtime Processors IT budget Managed IT PowerPoint GDPR Time Management Scalability Phone System Hiring/Firing Employer Employee Relationship Update Lead Generation Digital Botnet Internet Explorer VPN Comparison Payment Video Games Google Maps Emergency Authorization Employees Worker disposal Security Cameras IaaS A.I. Battery Inventory Data Management Tech Support Apple Wireless Internet Television Information Technology IT Management Encryption Sports Storage Credit Cards Dongle Automobile News Technology Efficiently Smart Technology Edge Threat Safety Multi-Factor Security Specifications instant Messaging Staffing The Internet of Things Licensing Voice over IP Solid State Drive Printer Spyware Synergy Email Management HaaS Printer Server Movies Gadget Yahoo Amazon Budget iPhone Help Desk Biometrics Tech Terms Error Human Resources Bring Your Own Device Telephone System Outlook WannaCry Business Intelligence Regulation Vulnerabilities Big Data eCommerce IP Address Unified Communications Operating System Search Network Attached Storage Scheduling Telecommuting Server Paper Online Shopping Emoji Mobile Office Millennials Environment Server Management Instagram Domains Samsung Money Ink Windows 7 OneNote Hosted Solution Google Drive IT Support File Sharing Public Speaking Presentation User Tip Copy Lithium-ion battery Augmented Reality Windows 10 Spam Blocking User Security Machine Learning VoIP Fun Wireless Technology 5G Tip of the week Chrome OS G Suite IBM Paste Quick Tips Hacker Business Technology Wearables Telecommute Mobile Security Remote Computing Virtualization Customer Relationship Management Laptop Autocorrect Printing Competition Conferencing Managed IT Services

Newsletter Sign Up