Proactive Managed IT Services vs. Reactive Fix: Which is Best for Your Small Business?

It’s completely understandable that as a small business owner or entrepreneur, you’re trying to minimize your expenses and keep tight reins on your budget. One way you might try to do so is by forgoing the monthly expense of PROACTIVE managed IT services, and adopting a REACTIVE “break/fix” philosophy, calling on a professional only when…

Hackers brew Android-targeting Windows malware

Connect device to infected PC, kiss your bank balance goodbye   Security breakers have stitched together the first strain of Windows malware that can hop over and infect Android smartphones and tablets. The Droidpak mobile banking trojan exploits syncing between smartphones and Windows PCs to jump from a compromised PC onto an Android device. The…

12 Year-Old Anonymous Hacker Pleads Guilty To Breaking Into Government Sites

I hear it all the time. “Who are these vicious, sick, evil people who use their talents on the computer for twisted things like viruses and spyware, when they could use these talents to get a good job?” In this case, the person thought it was fun and earned some free video games. 12 Year-Old…

Internet Security for Small Business Is Still Taken Too Lightly

U.S. small business owners are guilty of wishful thinking when it comes to cybersecurity, a new survey shows. While three-fourths (77 percent) say their company is safe from hackers, viruses, malware and cybersecurity breaches, 83 percent have no formal plan to address these threats. The threat is real. Targeted cyberattacks against small and medium-size businesses (SMBs)…

Malware…What Are You Missing Without Managed Security?

Chances are you’re probably running Norton or McAfee for infection protection on your computer, either because it came with it as a 60-day trial or was offered free by your internet Service Provider (I.S.P.) – right? The ‘set it and forget it’ days are over. Without Managed Services (managed security, updates, etc.) valuable updates for…

Breathing Life Back Into Blank CDs to Protect from Banking Trojans

One of the most damaging, and most difficult to detect, pieces of malware nowadays is a banking Trojan. Banking Trojans infect Windows PCs via email attachments or drive-by downloads from corrupted Web pages. They take up residence in Web browsers and lie in wait until a user accesses an online bank account. When the user…

9 Major Ways Criminals Use Facebook

1. Hacking Accounts Once hacked, an account can be commandeered and used as a platform to deliver spam, or — more commonly — sold. Clandestine hacker forums are crawling with ads offering Facebook account IDs and passwords in exchange for money. In the cyber world, information is a valuable thing. 2. Commandeering Accounts A more direct form…

New Year, New Entity Designation (A Quickie Notice)

As of today A Geek To Go! L.L.C. is now A Geek To Go! Inc. We will always continue to serve our loyal customers, contractors and subcontractors as before, but the branding has changed slightly. Since our inception in 2006, every year we have proven our company standards as a major increase past the following…