[vc_row][vc_column][vc_column_text] New kid on the malware block teaches SMBs old lesson Stealing account numbers and access passwords to financial resources is almost par for the course for today's malware, but according to Trend Micro, there really is something new...
Data Protection
New IT Security Threat Tactics Proliferate During First Half of 2013
[vc_row][vc_column][vc_column_text] US is most prevalent spam producing nation in 2013 The midpoint of the calendar year provides businesses with a chance to evaluate their progress so far so that they can make more accurate predictions about the six months to come,...
Cyber Criminals Targeting SMB Websites – IT Support More Critical
[vc_row][vc_column][vc_column_text] Data Backup and Disaster Recovery Growing in Importance to Small Business Survival I am continually getting phone calls and emails from colleagues and customers with stories of how they know an SMB whose website was targetted by...
Were You Surprised About The NSA?
M. Ursula Herrmann is Great Lakes Computer's guest blogger on Government IT Security. You may also recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network Security Analyst living in Juneau, Alaska. ...
Why Instituting Data Backup Regulations Will Pay Off in the End
[vc_row][vc_column][vc_column_text] SMB's should avoid being penny wise and pound foolish on data security and IT support According to one of the latest studies in the data security field, businesses that decry the cost of following new regulations may well be putting...
A Lesson on IT Security – We are Under Attack!
[vc_row][vc_column][vc_column_text] Proper IT Security is the way to fight off attack. Came across this article on ComputerWorld.com and found it compelling for a number of reasons. Firstly, the message is on target. We are under attack. As the article states, last...
BYOD Forcing Creative Ways to Tackle Network Security
[vc_row][vc_column][vc_column_text] BYOD has company IT departments on edge about network security Bring Your Own Device, or BYOD, is increasingly becoming a common issue when companies address their network security needs. Whether it is laptops, smartphones, or...
Regulations Complicate Data Backup Practices
[vc_row][vc_column][vc_column_text] Cloud backup adoption in today's regulatory environment In the 21st century marketplace, information is the lifeblood of a growing number of businesses both large and small. Although this has made the need for adequate data backup...
Data Protection Case Study for Educators and Government Agencies
Great Lakes Computer is proud to call ourselves a member of Dell's PartnerAssure Program. Dell AppAssure is the industry's leading software for backup and replication for voicemail, physical and cloud comuting environments. We also have a number of government...
Beware: “Changeup” Malware Threatening Data Security
[vc_row][vc_column][vc_column_text] "Changeup" Worm infecting SMB's and large businesses worldwide Few businesses want worms invading the premises, but night crawlers are probably preferable to what office supply retailer Staples has had to contend with during the...