Thank you for the Best of the Upstate nomination for BEST COMPUTER SERVICE!

The Greenville News has a yearly “Best of the Upstate” program where people nominate businesses, organizations and individuals who they feel are the best our area has to offer. This year, someone (or multiple someones?) nominated us, Homeland Secure IT, in the category of “Best Computer Service”!  I don’t know who this kind stranger was (or kind strangers), but we …

Greenville Computer Virus Cleanup and Removal Experts

If you see mention of “Greenville Virus Experts”, that’s us! We have created a new website especially designed to attract the eye of someone who might be experiencing a computer security issue such as a virus, worm, trojan or other malware.  Searching for “Greenville virus cleanup” might result in a person finding the Homeland Secure IT site, but our home …

PSA: The Annual International Internet Spring Cleaning Day is once again upon us!

Spring has sprung and with it comes Annual International Internet Spring Cleaning Day! This year ISPs (Internet Service Providers) around the world are increasing their efforts to keep our networks in tip-top shape so that they perform as fast as possible. Perhaps you may have missed the stories on the news and the endless emails flying around for the last week …

A Plethora of Patches for Microsoft’s Patch Tuesday – March 2015

On Monday 2015-03-09, Apple released a slew of updates to address security issues, and on the regularly scheduled “Patch Tuesday” 2015-03-10, Microsoft made a rather large bundle of security updates available. Many security experts did not believe Microsoft would correct the FREAK vulnerability during this batch of patches, however it appears that they did. It is estimated that the FREAK …

Don’t FREAK out – Apple has fixed their vulnerabilities

There’s a major web encryption flaw that has been documented and widely covered in the media which permits a “man in the middle” type attack to occur from your web browser How does it work? It allows an attacker to intercept HTTPS traffic between vulnerable clients and servers, and then forces them to use an export-grade cryptography, which can then …

Lenovo issues statement to partners concerning Superfish debacle

If you have been watching the news or reading about computer security, you probably are already aware of the fact that Lenovo, one of the top computer manufacturers, has included a malicious piece of software called Superfish with new computers. Being a Lenovo dealer and having sold many of their products, we want to make sure you are aware of …

Pardon our dust – we’re revamping our website

It’s time for a cool change.  We’re going to spend the next few weeks toying with our website and ways to make it more useful to our clients and to us. A web based store for some of our most common products may be in the works and an additional website that is specific to one service we offer will …

We offer Greenville computer virus removal and cleanup services

Our number one phone call question is, “Can you remove a virus from my computer?” The short answer is, “yes”.  The long answer is, “it depends on the severity of the infection.” While most malware occurrences may be nothing more than annoying, some of them will include a much more sinister payload, one that installs keylogging, or rootkits with complete …

Microsoft Patch Tuesday should be taken seriously this time (Sept 2014)

FORTY-ONE vulnerabilities have been addressed in this edition of Microsoft’s Patch Tuesday. There are 37 security flaws in Microsoft Internet Explorer alone which are being corrected. These range from “Important” all the way up to the “Critical” level, and include one fix for a “zero day vulnerability” that attackers have been exploiting. It is recommended that you apply the patches …

CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …