Meltdown and Spectre CPU design flaws – massive security vulnerabilities for your business

The IT big news in 2018 has been about Meltdown and Spectre, two CPU design flaws that affect virtually every modern Intel processor with the exception of the Intel Itanium and Intel Atom prior to 2013. These flaws affect desktop computers, notebook & laptops, tablets, mobile phones, servers and even hosted servers “in the cloud”. What do you have to …

Trend Micro Worry Free Business Security 9.5 Released

We are excited to announce the release of Worry-Free Business Security version 9.5. Worry-Free Business Security now includes: User notification for when new versions, service packs, and patches are available Enhancements to the ransomware protection features Support for Microsoft Exchange Server 2016 (WFBS Advanced) Windows 10 Pro and Windows 10 Creators support We have updated most of the customers we …

Important notice regarding ISP maintenance

Today is Annual International Internet Spring Cleaning Day! ISPs (Internet Service Providers) around the world are increasing their efforts to keep our networks in tip-top shape so that they perform as fast as possible. In case you have missed the segments on the news and the endless emails flying around for the last week or so, I will go over …

Your business should consider a network security audit

Are you ready for 2017? How about your business network? This is a prime time to schedule a network security audit that will find the potential issues which are laying dormant, waiting for a “bad guy” to take advantage of them and exploit your network. Using a wide array of tools, Homeland Secure IT can perform a penetration test (PenTest) …

Consider managed services to reduce downtime and frustration for your business!

If you run a small or medium business without a dedicated IT department, you are probably painfully aware of the costs associated with keeping your computers and servers up to date with security patches and updates. Whether you are paying an IT company to perform preventive maintenance, or if you or another staff member are taking time out of your …

Backdoor.MAC.Eleanor trojan might encourage you to get anti-virus on your Mac

A story over on the Bitdefender blog warns that a trojan that is posing as a file converter (EasyDoc Converter.app) is out in the wild and once it is run, creates a connection to the outside world, allowing full control of your Apple Mac computer. If you do not have current anti-virus / anti-malware software on your Mac, this will …

Adobe out of band patch fixes flash vulnerability (Windows / Mac / Linux)

Adobe has released an out of band patch that corrects a flaw in Flash player which could permit an attacker to take control of an exploited system. This is actively being exploited by hackers and we recommend that the patch be applied immediately. More information about this security issue can be found on Adobe’s security website. If you require any …

Greenville Computer Virus Cleanup and Removal Experts

If you see mention of “Greenville Virus Experts”, that’s us! We have created a new website especially designed to attract the eye of someone who might be experiencing a computer security issue such as a virus, worm, trojan or other malware.  Searching for “Greenville virus cleanup” might result in a person finding the Homeland Secure IT site, but our home …

PSA: The Annual International Internet Spring Cleaning Day is once again upon us!

Spring has sprung and with it comes Annual International Internet Spring Cleaning Day! This year ISPs (Internet Service Providers) around the world are increasing their efforts to keep our networks in tip-top shape so that they perform as fast as possible. Perhaps you may have missed the stories on the news and the endless emails flying around for the last week …

Don’t FREAK out – Apple has fixed their vulnerabilities

There’s a major web encryption flaw that has been documented and widely covered in the media which permits a “man in the middle” type attack to occur from your web browser How does it work? It allows an attacker to intercept HTTPS traffic between vulnerable clients and servers, and then forces them to use an export-grade cryptography, which can then …