Pardon our dust – we’re revamping our website

It’s time for a cool change.  We’re going to spend the next few weeks toying with our website and ways to make it more useful to our clients and to us. A web based store for some of our most common products may be in the works and an additional website that is specific to one service we offer will …

We offer Greenville computer virus removal and cleanup services

Our number one phone call question is, “Can you remove a virus from my computer?” The short answer is, “yes”.  The long answer is, “it depends on the severity of the infection.” While most malware occurrences may be nothing more than annoying, some of them will include a much more sinister payload, one that installs keylogging, or rootkits with complete …

Business desktop computer pricing for end of 2014

As the year draws to a close, many of the businesses here in Greenville SC and around the Upstate are making last minute purchases. Some are to use up the budget they have remaining, and some want to get purchases in on the 2014 tax year. Almost all of them want something new! Below you will find two of the …

Microsoft Patch Tuesday should be taken seriously this time (Sept 2014)

FORTY-ONE vulnerabilities have been addressed in this edition of Microsoft’s Patch Tuesday. There are 37 security flaws in Microsoft Internet Explorer alone which are being corrected. These range from “Important” all the way up to the “Critical” level, and include one fix for a “zero day vulnerability” that attackers have been exploiting. It is recommended that you apply the patches …

CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …

Stolen computer from Greenwood hospital may contain unencrypted patient data

Here we are in 2014, with operating systems which feature built-in data encryption, and in the news today over on WYFF’s site is a story titled “Hospital: Patient info at risk after laptop is stolen“.  It was just a couple years ago that I wrote on this blog about a similar incident HERE. The long and short of today’s story …

Holiday Hours for Computer / Network Service & Sales

Homeland Secure IT is closing in observance of Independence Day 2014 and so we can spend time with our families! We’re walking out the door on July 3rd at 2pm and will return on Monday, July 7th ready to tackle any project you may have. Should you have an emergency such as your server go down over this holiday weekend, …

Apple iCloud ransomware is a real threat

People are being locked out of their iPhones and iPads due to an attack that is taking place where the devices are locked and you can only gain access to your files if you pay a “ransom”. This is mainly in Australia but it has been reported in other locations. You should backup your data so that in the event …

Kevin Mitnick demonstrates a Microsoft Word document exploit

Did you know that most successful computer exploits that we encounter are because the user simply clicked a link, or opened a document without giving it a second thought? I think we’re all guilty of receiving an email from someone we know, or assume we know, then opening the email and following that link. I know I have done it, …

1

And the winner of our Jabra Freeway giveaway is….

We have a winner in our giveaway!  Olga Bannister, simply for being awesome and subscribing to the Homeland Secure IT blog, you have won this cool device that may keep you from getting a ticket in the City of Greenville. Stop by and pick it up most any weekday between 8:30 and 5:30.  You might call ahead to make sure …