Our Blog

Articles, Reviews and Technical Alerts

Current Filter: virus cleanup

How to run a Malwarebytes Scan (Retail Edition)

Tim Summers
How To

If you have the retail version of Malwarebytes installed on your Windows computer, you can easily run a full scan to check your computer for malware infections that might not be detected by your antivirus software.

How to run an AVAST Antivirus Scan

Tim Summers
How To

If you are running the retail edition of AVAST antivirus, the business edition of AVAST antivirus or the AVAST Cloudcareedition of antivirus, you can follow these steps to run a scan of your computer.

How do you know if your mailbox was hacked?

Tim Summers
Technical Support

Email can be hacked in a variety of ways. One such method is tricking people into opening an infected email attachment. Once opened, the email account and contact list can become vulnerable to the hacker.

Five Key Steps to Improving the Cybersecurity of Your Business

Tim Summers
Information

Unfortunately, there’s no way to provide 100% complete protection from hackers and spammers. But don’t despair, that’s no reason to throw out all the computers and go back to paper and pencil. There are recommended best practices for businesses to follow that can help better protect your network, your Windows devices, and your business-critical data.

Ten Steps To Take When Your Email Account is Hacked

Tim Summers
Technical Support

It can happen to anyone. Sometimes all it takes is opening an infected email attachment or entering your email username and password into a website portal that turns out to be fake. Unfortunately, with the way digital technology works, if you're connected to the internet, you can be hacked. Here are ten steps you should take when your email account is hacked.

The Importance of Cyber Safety, Educate Your Employees

Tim Summers
Information

Even the most sophisticated security plan may not protect you from an employee that clicks on a bad hyperlink, that attempts to open a dangerous email attachment, or that allows a fake technician to remote into their computer. The well-meaning employee is often the weakest link in your security plan. Hackers know this which is why they target your employees daily with email phishing campaigns, popups, browser redirections and alerts urging them to call fake technicians.

 

<<
page 1 of 1
>>
Dayton and Miami Valley Better Business Bureau, A+ Rating
Vandalia Ohio Chamber of Commerce Member
DELL Premier Partner, Computer Hardware and Software
Microsoft Partner Logo
Google Workspace Logo
Avast Anti-Virus
Carbonite Registered Partner, Remote Backup
eVault from Carbonite, Remote Backup
Wathguard Firewall Routers and Security Appliances
Sonicwall Firewall Routers and Security Appliances
Business Networking International (BNI), Referral Group