Blog
home
  • Register

Data Net Blog

Data Net has been serving the California area since 1983, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SamSam Is More than a Computer Virus

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

The Right Analogy Makes Hacking Make More Sense

The Right Analogy Makes Hacking Make More Sense

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

0 Comments
Continue reading

What Does a SMiShing Attempt Look Like?

What Does a SMiShing Attempt Look Like?

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading

It’s Cybersecurity Awareness Month! Educate Yourself on These Threats

It’s Cybersecurity Awareness Month! Educate Yourself on These Threats

October is Cybersecurity Awareness Month! To prepare for this incredibly important month, you’ll want to focus your efforts on ensuring your business is protected against the myriad of online threats that can pose a danger for your business. Thankfully, you don’t have to do it alone. With our trusted IT professionals by your side, you’ll be able to take the fight to hackers and other entities that threaten your data.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Privacy Productivity User Tips Tech Term Smartphones Microsoft Data Internet Malware Communication Email Cybersecurity Google Cloud Efficiency Hardware Communications Android Innovation Windows 10 Browser Passwords Software Mobile Devices Mobile Device Small Business IT Support Collaboration Network Wi-Fi VoIp Ransomware Hackers Users Business Management IT Services Holiday Outsourced IT Managed IT services Cloud Computing Data recovery Applications Managed IT Services Internet of Things Hosted Solutions Data Backup Backup Wireless Social Media Business Smartphone Workplace Tips Patch Management Saving Money Blockchain Information Access Control Chrome Employer-Employee Relationship Networking Microsoft Office Marketing Word Bandwidth Apps Cortana Virus How To Paperless Office Compliance Router VPN BDR Wireless Charging Government Remote Computing Data Management Physical Security Phishing Managed IT Service G Suite Virtual Assistant Business Intelligence Virtualization Tech Terms Cost Management Excel Miscellaneous Office 365 Computers Facebook Data Protection Scam Data Breach Automation Remote Monitoring and Management Medical IT Gmail Data Security Mobility Artificial Intelligence Save Money Computer Password Connectivity Movies Touchscreen Knowledge Battery News Help Desk disposal Licensing GDPR IT Management Mobile Security Voice over Internet Protocol Eliminating Downtime Hard Drive E-Commerce Staff Ink Live Streaming Hard Drives Managing Stress Conferencing Lead Generation Retail Security Cameras Tech Support Time Management Analytics Microsoft Office 365 Telephone System Business Continuity Server Management Value Maintenance Plug-In Websites Streaming Media Storage eCommerce Operating System BYOD Processors Payment Digital PowerPoint SSD Troubleshooting Office Remote Support Wearables Telecommute Alert Vulnerability Chrome OS Unified Communications Authentication Cleaning Upgrade Internet Explorer Proactive IT Law Enforcement Telecommuting Safety Downloads Dark Web Sales Online Shopping Wireless Internet User Tip Spyware instant Messaging Sports Reporting Bring Your Own Device Update Content Filtering Healthcare Data loss Big Data Technology Tips RAM Authorization Server Certification Database Threat Edge Trends Error Tablet Settings Network Attached Storage Environment Amazon Apple Vulnerabilities User Security Telephony Congratulations IT budget Twitter Hybrid Cloud Outlook WannaCry HP Spam Workers Travel Microsoft Teams Comparison Botnet Cybercrime Printing Cryptocurrency Dongle A.I. e-waste Tip of the week iPhone SaaS Business Technology Voice over IP Gadgets WhatsApp Inventory Cables Profitability HIPAA Website Personal Information Document Management Antivirus Managed Service File Sharing Millennials Education Laptop Backup and Disaster Recovery Company Culture Specifications Remote Monitoring Training Machine Learning Tactics Paper Windows 7 Printers WiFi Regulation Thank You Quick Tips Analysis Disaster Recovery

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123