<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

The Different Types of Malware

Posted by Griffin Ball on May 25, 2018 9:07:00 AM

What is Malware?

Malware is short for malicious software and comes in many different forms. While some may believe that its purpose is to slow down or make a computer unusable, in reality that’s only a side effect. The main focus is to bypass security or steal information. This leads to the a question;
What are the different types of malware and how can I protect myself against them?

Computer Viruses, The Most Notable Malware

‘Virus’ is the most universal term for malware or odd computer issues. They are often blamed for even the most mundane computer problems; however, they are not always to blame. Many of the side effects they cause are very similar to other technical problems. Computer viruses get their namesake from viral infections due to similarities in life-cycle and side effects. Having an actual virus is very dangerous to a computer's health and the network it is on.
Read More

Topics: Harmony, IT services, Network Risk Assessment, Managed Service Provider, Internet Safety

What are HTTP Cookies and why can't I eat them...?

Posted by Laif Thorbahn on Apr 20, 2018 8:55:00 AM

When you think of cookies you probably imagine sweet sugar cookies or rich chocolate chip, but in terms of computers unfortunately this is not the case. Browser cookies, otherwise known as an HTTP Cookie, is a small segment of data used by websites to remember certain data when you visit them. Having websites store data about you may sound like a bad thing, but it is not as awful as it seems. Cookies can often lead to a better online experience by making your internet navigation more efficient. Let’s go over in greater detail what cookies do exactly, what ‘flavors’ they come in, and when they can be good or bad.

What do Cookies do?

Cookies are used to store personal information needed on the site locally. Back in the good old days when internet online shopping was not as simple as it is today, an item being placed into a cart required an action had to be recorded somehow. Thus, the Cookie was created! They are primary used in three main ways now-a-days.

Read More

Topics: IT services, Network Risk Assessment, Managed Service Provider

What if everything you do was being watched?

Posted by Griffin Ball on Apr 13, 2018 9:12:00 AM

When you are on a computer, especially your personal one, you would expect a certain amount of privacy when it comes to passwords, bank info, and where the gold you buried three years ago is located.

What is Spyware?

So, what is Spyware? It is a form of malicious software that looks at what you are doing on your computer or mobile device. It aims to gather data on the person or organization it is targeting without consent and without the user's knowledge. Spyware, (like Adware, Trojans, system monitors and cookies which are all forms of spyware) collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the Internet to pass this information along to third parties without you knowing. Spyware can also be referred to as tracking software for this reason.

Read More

Topics: IT services, Network Risk Assessment, Managed Service Provider, Internet Safety

What is Air-Gapped Security?

Posted by Griffin Ball on Apr 6, 2018 9:03:00 AM

Now this is some seriously sci-fi stuff... But we can start at the beginning.

There was a time not too long ago where there was a sure, fool-proof way to secure your servers, computers and even entire networks. A way that would mean the end to worrying about nasty hackers. As old as time, the method is called Air-Gapped Security. This was where you would have a gap of air between the system and the rest of the network. Now when I refer to ‘air’ I mean in the sense that there is nothing connecting the machine to the world. There is no direct network connection from the internet or a large network to this machine. This is a terrific way to isolate a network or a device on your network that needs to be very secure. (Backups of important documents or codes are a fitting example of this and the stock market, the military/government and many industrial powers use air-gapping as a result.)

Read More

Topics: Harmony, IT services, Network Risk Assessment, Managed Service Provider, Internet Safety