Do you have what it takes to manage your own security?

Do you have what it takes to manage your own security? Now that the World Wide Web has turned into the Wild Wild West, residential and commercial users alike face more security threats than just viruses. Programs need regular updates to install patches. Change passwords a regular basis. Run malware scans from multiple sources to…

Some Of The Best Things In Security Are Free

  Some of the best things in life are free, right? But what if I told you some of the best security for your computer is also free, would you believe me? It’s true, out of all the titles for antivirus and anti-malware programs out there we have the paid versions and the free versions.…

Yummy Spam: The Gameover Trojan is Back

Botnet takedowns aren’t permanent. Less than a month after law enforcement officials and security researchers took down the Cutwail botnet, the gang appears to be back in action. A joint operation back in May between law enforcement and security researchers took the Cutwail botnet offline. While spam volumes drop after a botnet takedown, the decline…

Proactive Managed IT Services vs. Reactive Fix: Which is Best for Your Small Business?

It’s completely understandable that as a small business owner or entrepreneur, you’re trying to minimize your expenses and keep tight reins on your budget. One way you might try to do so is by forgoing the monthly expense of PROACTIVE managed IT services, and adopting a REACTIVE “break/fix” philosophy, calling on a professional only when…

Internet Security for Small Business Is Still Taken Too Lightly

U.S. small business owners are guilty of wishful thinking when it comes to cybersecurity, a new survey shows. While three-fourths (77 percent) say their company is safe from hackers, viruses, malware and cybersecurity breaches, 83 percent have no formal plan to address these threats. The threat is real. Targeted cyberattacks against small and medium-size businesses (SMBs)…

Breathing Life Back Into Blank CDs to Protect from Banking Trojans

One of the most damaging, and most difficult to detect, pieces of malware nowadays is a banking Trojan. Banking Trojans infect Windows PCs via email attachments or drive-by downloads from corrupted Web pages. They take up residence in Web browsers and lie in wait until a user accesses an online bank account. When the user…

9 Major Ways Criminals Use Facebook

1. Hacking Accounts Once hacked, an account can be commandeered and used as a platform to deliver spam, or — more commonly — sold. Clandestine hacker forums are crawling with ads offering Facebook account IDs and passwords in exchange for money. In the cyber world, information is a valuable thing. 2. Commandeering Accounts A more direct form…

New Year, New Entity Designation (A Quickie Notice)

As of today A Geek To Go! L.L.C. is now A Geek To Go! Inc. We will always continue to serve our loyal customers, contractors and subcontractors as before, but the branding has changed slightly. Since our inception in 2006, every year we have proven our company standards as a major increase past the following…