Greenville Computer Virus Cleanup and Removal Experts

If you see mention of “Greenville Virus Experts”, that’s us! We have created a new website especially designed to attract the eye of someone who might be experiencing a computer security issue such as a virus, worm, trojan or other malware.  Searching for “Greenville virus cleanup” might result in a person finding the Homeland Secure IT site, but our home …

PSA: The Annual International Internet Spring Cleaning Day is once again upon us!

Spring has sprung and with it comes Annual International Internet Spring Cleaning Day! This year ISPs (Internet Service Providers) around the world are increasing their efforts to keep our networks in tip-top shape so that they perform as fast as possible. Perhaps you may have missed the stories on the news and the endless emails flying around for the last week …

A Plethora of Patches for Microsoft’s Patch Tuesday – March 2015

On Monday 2015-03-09, Apple released a slew of updates to address security issues, and on the regularly scheduled “Patch Tuesday” 2015-03-10, Microsoft made a rather large bundle of security updates available. Many security experts did not believe Microsoft would correct the FREAK vulnerability during this batch of patches, however it appears that they did. It is estimated that the FREAK …

Don’t FREAK out – Apple has fixed their vulnerabilities

There’s a major web encryption flaw that has been documented and widely covered in the media which permits a “man in the middle” type attack to occur from your web browser How does it work? It allows an attacker to intercept HTTPS traffic between vulnerable clients and servers, and then forces them to use an export-grade cryptography, which can then …

Lenovo issues statement to partners concerning Superfish debacle

If you have been watching the news or reading about computer security, you probably are already aware of the fact that Lenovo, one of the top computer manufacturers, has included a malicious piece of software called Superfish with new computers. Being a Lenovo dealer and having sold many of their products, we want to make sure you are aware of …

Is your business ready for Microsoft Server 2003 End of Support?

Windows Server 2003 Support Ends in: [tminus t=”14-07-2015 01:00:00″ id=”<p>End of Support</p>”  omitweeks=”true” style=”TIE-fighter” /] Windows Server 2003 End of Support Microsoft has scheduled the End of Support for their Server 2003 product to for July 14th, 2015, after which, there will be no support, no updates, and no patches to help protect your business from security issues. That’s right, any of your …

Business desktop computer pricing for end of 2014

As the year draws to a close, many of the businesses here in Greenville SC and around the Upstate are making last minute purchases. Some are to use up the budget they have remaining, and some want to get purchases in on the 2014 tax year. Almost all of them want something new! Below you will find two of the …

CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …

Stolen computer from Greenwood hospital may contain unencrypted patient data

Here we are in 2014, with operating systems which feature built-in data encryption, and in the news today over on WYFF’s site is a story titled “Hospital: Patient info at risk after laptop is stolen“.  It was just a couple years ago that I wrote on this blog about a similar incident HERE. The long and short of today’s story …

Internet Explorer being actively targeted – Why are you using IE?

This is from our partners at WatchGuard, taken in its entirety from their blog for your reading enjoyment: Advanced Attackers Exploit IE & Flash 0days in the Wild by Corey Nachreiner Over the weekend, Microsoft released a critical security advisory warning customers of a serious new zero day vulnerability in Internet Explorer (IE), which attackers are exploiting in the wild. Around the same time, …