McAfee Reports Chinese Malware Strikes Again

Malware Strikes Again

In the world of cybersecurity, it seems there is a never ending battle against new security threats or revamped old threats.  In a recent case, McAfee reported the reemergence of components of a former Chinese state-sponsored malware threat.  In an interesting twist, this new threat derived from an old threat, reuses code that was never made public, nor was it ever available on the black market.  Read on to learn

Benefits of Outsourced IT Services in Los Angeles

Outsourced IT Services

It’s generally recommended to outsource the management of computing technology that runs the various type of businesses — unless one is computer-savvy and has a lot of extra time on their hands, this should be the norm. If the goal is to focus as much attention on what brings monetary profit into a company, then less time should be allocated by managers to do computer maintenance and repair work themselves — that’s assuming

Building a Simple Computer Network

Computer Network

The term “computer network” can be intimidating depending on how it’s presented — the reality is that it takes relatively little computer knowledge to assemble one. For the do-it-yourself person looking for a hobby or some way to advance their small business, all the material that is needed is at least 2-3 working computers and a hub or switch although in some cases a hub or switch is not necessary. If using relatively

Pursuing the New

Pursuing the New

Three factors should be considered when purchasing new or upgraded computer gear: security, usage, and budget. Upgrading equipment is necessary at times but it’s not always necessary to get rid of old equipment. New equipment has its obvious uses, but older equipment can be reassigned and not thrown away saving a significant amount of money. For instance, an older computer can be used as a print server for printing documents, or for a file server which shares files

Basic Security Aspects

Basic Security Aspects

There are two basic types of employees revolving around any given business — current employees, and employees who are discharged from a company (Employees who are fired, who quit, or who retire). One small or missed detail in a business’ security infrastructure can result in vast databases of compromised computer data and/or personal data — fortunately, the computer industry is constantly at work in searching out security vulnerabilities to make