888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

0 Comments
Continue reading

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

0 Comments
Continue reading

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

In November of 2014, the Federal Trade Commission announced that “two massive telemarketing operations” had been temporarily shut down after collecting over $120 million by “deceptively marketing computer software and tech support services.” It wasn’t long before these companies lost significant court judgements to the FTC, but by then, the money was gone.

0 Comments
Continue reading

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

0 Comments
Continue reading

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

0 Comments
Continue reading

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

Alert: Vast Marketing Database Leaked. 33.7 Million Records Made Public

A sizable cache of personal information has been made public, with 33.7 million records being exposed. While not technically dangerous in its own right, this data could potentially be used to enable those with less-than-noble intentions.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Network Security Cloud Malware Hackers Internet User Tips Productivity Communications Efficiency Microsoft Data Cybersecurity Business Management Outsourced IT Communication IT Support Software Ransomware Backup Business Smartphones Hardware Windows 10 Tech Term Passwords Innovation Google VoIP Email Mobile Device Network IT Services Users Social Media Alert Productivity Small Business Apps Smartphone Browser Data Backup Bandwidth Data Recovery Collaboration Microsoft Office Phishing Holiday Miscellaneous Save Money Hosted Solutions Cloud Computing Data Breach Vulnerability Office 365 Android Access Control Saving Money Internet of Things App Business Continuity Twitter Mobile Devices Workplace Tips Computer Workers Law Enforcement Office Gadgets Settings Net Neutrality Personal Information Excel Company Culture Networking Politics Chrome Employer-Employee Relationship Remote Monitoring Scam Cybercrime Wireless Government Mobile Device Management Compliance BDR Applications Facebook Wi-Fi Blockchain Patch Management Retail Managed Service Marketing Antivirus Data Security Computers Paperless Office BYOD Medical IT Automation Managed IT Service Voice over Internet Protocol Dark Web Managing Stress Website SaaS Virus Education Telephony Information Remote Monitoring and Management Upgrade Word Vendor Management Windows Spam Virtual Assistant Value Connectivity How To Entertainment Recovery Maintenance Password Healthcare Downloads Live Streaming Safety Unified Threat Management Reporting Cryptocurrency Tablet Cost Management Computer Care VoIPMyths Video Files Backup and Disaster Recovery Cables Plug-In Telephone Systems The Internet of Things Data Protection Managed Service Provider Microsoft Office 365 Electronic Health Records Budget Gmail Websites Microsoft Teams CrashOverride Mobility Remote Support Hard Drive Managed IT Tactics Hiring/Firing Artificial Intelligence Employer Employee Relationship Trends Profitability WhatsApp Wireless Charging Botnet e-waste VPN Disaster Recovery Knowledge IT budget PowerPoint Gaming Console VoIPSavings SSD Proactive IT E-Commerce Remote Control Authentication Health Battery Data Management Training Processors Digital Encryption Internet Explorer Analytics Customer Service Comparison Automobile A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal GDPR Time Management IT Management Sports Video Games Google Maps Update Emergency Inventory Synergy Payment Authorization Employees Dongle Yahoo Worker Security Cameras Apple Edge Threat IaaS Multi-Factor Security Specifications Movies Credit Cards Wireless Internet News Spyware Television Information Technology Storage Hard Drives Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology instant Messaging Email Management Printer Server Solid State Drive DDoS Bring Your Own Device Printer iPhone HaaS Human Resources Two-factor Authentication Data loss Gadget Help Desk Telephone System WannaCry HP Biometrics Error Avoiding Downtime Streaming Media Outlook Travel Dark Data Business Intelligence Regulation Vulnerabilities Sales Cleaning Printers Troubleshooting Hard Disk Drive Physical Security Technology Tips Hybrid Cloud WiFi Touchscreen Employee-Employer Relationship Router Tech Support Content Filtering Cortana Staff RAM Current Events Shortcut Certification HIPAA Document Management Database Leadership Access Server Management Online Shopping Environment IBM Ink Hacker Millennials Competition Windows 7 Google Drive Customer Relationship Management OneNote IT Support IP Address Hosted Solution Big Data File Sharing User Tip Fun Machine Learning Mobile Office Copy Spam Blocking User Security Tip of the week G Suite Windows 10 Domains Virtualization Telecommute VoIP Autocorrect Chrome OS Mobile Security Paste Business Technology Quick Tips Remote Computing Wearables Public Speaking Search Laptop Scheduling Printing Conferencing Server Unified Communications Presentation Network Attached Storage Managed IT Services Lithium-ion battery eCommerce Operating System Emoji Telecommuting Augmented Reality Instagram Paper Samsung Wireless Technology 5G Money

Newsletter Sign Up