LTech Solutions Blog

LTech Solutions has been serving the Hudson area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpgThere’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

Continue reading
0 Comments

The Wolfman is an Executable Virus and 3 Other Monster/Malware Comparisons

b2ap3_thumbnail_fight_night_it_400.jpgIt’s the time of year when we reflect on scary things. For an IT company, it doesn’t get much scarier than an organization’s network getting slammed with a malicious computer virus. There are a variety of really bad viruses out there, each one with its own unique ability to cause some scary results. The way we see it, each computer virus is kind of like a classic monster.

Continue reading
0 Comments

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpgCan you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Continue reading
0 Comments

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpgYou might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network.

Continue reading
0 Comments

Understanding How Advanced Malware Can Harm Your Business

b2ap3_thumbnail_advanced_malware_400.jpgThere are a lot of different threats out there: Viruses, malware, spyware, adware, the list goes on. While all of these threats are certainly problematic, some are more dangerous than others. In particular, advanced malware can be exceptionally devastating if they manage to inflict damage on your technology.

Continue reading
0 Comments

Are Your Employees Watching Porn At Work?

b2ap3_thumbnail_watching_from_work_400.jpgHere’s a statistic that’s going to shock business owners. We hope you’re sitting down for this because we were blown away when we first heard it. Did you know that 70 percent of all online porn access happens during business hours? What does this mean for your company?

Continue reading
0 Comments

How to Remove the Super Dangerous Superfish App from Your PC

b2ap3_thumbnail_superfish_two_400.jpgAs seen by the recent Superfish app debacle, software that comes preinstalled on a new PC shouldn’t always be trusted. Most of the time, the innate software on a device can be trusted; but the Superfish application is an exception. This app, which came preinstalled on new Lenovo PCs between the months of September and December of 2014, can potentially compromise the security of your machine.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Productivity Google Hackers Miscellaneous Cloud Workplace Tips Business Internet Efficiency Microsoft Mobile Devices Email Hosted Solutions Backup Browser Malware Windows 10 User Tips Marketing Holiday Android Business Computing Innovation Office Employer-Employee Relationship Windows Save Money Small Business IT Services Hacking Social Media Remote Computing Application Business Continuity Disaster Recovery Software Automation Smartphone VoIP Chrome Hardware Data Computer Upgrade Server Communication Mobile Computing Microsoft Office WiFi Gadgets Gmail Health Managed Service Provider Mobile Device Management Passwords Bandwidth Lithium-ion battery Retail Business Management Going Green Mouse IT Solutions Big Data IT Support Network Apple Social Engineering Entertainment Telephone Systems Fax Server Spam DDoS Biometrics Networking Memory App History Saving Money The Internet of Things Recovery Mobility Smartphones Virtualization Budget communications Environment Website Office Tips Operating System Quick Tips Bluetooth Network Security Sports Social Networking Facebook Windows Media Player Hacker User Error WIndows 7 Online Currency USB iPhone Best Practice VPN Robot Computers Science Wearable Technology Virtual Reality Managing Stress YouTube Customer Relationship Management Settings Windows 8 Twitter Running Cable Bloatware Privacey NarrowBand Customer Service People BYOD Tablet Avoiding Downtime Entrepreneur Wireless Technology Mobile Office Tablets Data Management Search Chromecast Two-factor Authentication Meetings Unified Threat Management Hard Drives Save Time PowerPoint Distributed Denial of Service Uninterrupted Power Supply Consultant Human Resources Bring Your Own Device Maintenance Office 365 Humor Collaboration Cleaning Programming Vendor Management Best Available Laptop Shortcut Risk Management Virus Streaming Media Tech Support Phone System Remote Monitoring Touchpad Wireless Analyitcs Compliance Encryption Shadow IT Safety Ransomware SharePoint Analytics Notifications Internet Exlporer Social Worker Commute User Excel eWaste

Blog Archive