Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

What You Need to Do If Your Business is Hacked

What You Need to Do If Your Business is Hacked

Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organization. This is precisely why it is so important that—should a business be hacked—the proper steps are taken in response.

0 Comments
Continue reading

Cyberattack Discovery Time is Decreasing (But This Isn’t All Good News)

Cyberattack Discovery Time is Decreasing (But This Isn’t All Good News)

Research has revealed that cyberattacks are spending decreasing amounts of time on their targeted networks before they are discovered. While this may sound like a good thing—a faster discovery of a threat is better than a slower one, after all—this unfortunately is not the case.

0 Comments
Continue reading

A Hacker Could Steal All Of Your Text Messages for a Few Bucks

A Hacker Could Steal All Of Your Text Messages for a Few Bucks

We always picture hackers as these foreboding, black-clad criminals, smirking through the shadows cast in their dark room by their computer monitor. Hardened, uncaring individuals who don’t go outside very often, staring at code as if they were able to decipher the Matrix.

It’s time we give up this persona and stop mystifying cybercriminals. Why?

It only takes a few bucks and some spare time to truly hold an individual’s data hostage.

0 Comments
Continue reading

HAFNIUM Attacks Target Most Microsoft Exchange Servers

HAFNIUM Attacks Target Most Microsoft Exchange Servers

The recent discovery of four flaws in Microsoft’s Exchange Server software came too late to prevent a rash of stolen emails, but that doesn’t mean you need to remain vulnerable to this attack. Let’s go over the story so far, and how you can help protect your business.

0 Comments
Continue reading

Let’s Take a Look at the Data Breaches So Far in 2021

Let’s Take a Look at the Data Breaches So Far in 2021

By now, everyone knows that businesses can be defined on how they approach cybersecurity. Unfortunately, even if your business makes a comprehensive effort to protect your network and data from data breaches, all it takes is one seemingly minor vulnerability to be exploited to make things really hard on your business. Let’s take a look at the major data breaches that have happened since the calendar turned to 2021. 

0 Comments
Continue reading

With Remote Operations, Security is (Even More) Important

With Remote Operations, Security is (Even More) Important

Since the beginning of the COVID 19 pandemic, it has been clear that many companies were not prepared to continue their operations remotely. This was largely due to their leadership being convinced in recent years that allowing people to work remotely would lead to a considerable reduction in production, leading them to be unprepared to shift to remote functionality. Cybercriminals have taken advantage of many organizations as a result, so today we’ll discuss what needs to be done to secure endpoints from afar.

0 Comments
Continue reading

When the People You Trust Phish You

When the People You Trust Phish You

Having success in business often relies on developing trustworthy relationships. You have to trust your vendors and suppliers to get you the resources you need, you need to trust your staff to complete their tasks without putting your business in harm's way, and you need to trust your customers to buy the products and services that you offer. Running counter to these necessary bonds of trust are people actively soliciting people’s time, energy, money, and attention for their own selfish purposes.

0 Comments
Continue reading

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

0 Comments
Continue reading

Comparing the Relative Danger of AI-Aided Crimes

Comparing the Relative Danger of AI-Aided Crimes

When we think of cybercrime, most people’s minds go to one of two places. On the one hand, some think about the annoying, misspelled emails that are so obviously scams, while on the other, we can’t help but think about the hacks that we see in movies, where a criminal manages to overcome the best the government can incorporate into their defenses.

0 Comments
Continue reading

How Cybercriminals Are Keeping Themselves Entertained

How Cybercriminals Are Keeping Themselves Entertained

With the given pandemic, a lot of people have had a bit more time on their hands, so it makes sense that many are turning to streaming services and the like for their entertainment. Unfortunately, this has not gone unnoticed by cybercriminals.

Let’s take a few moments and examine the practice of credential stuffing.

0 Comments
Continue reading

What We Can Learn from the 2020 Data Breach Investigations Report

What We Can Learn from the 2020 Data Breach Investigations Report

Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts need to be focused. Let’s go over some of 2019’s trends and insights that were highlighted in the Verizon Business 2020 Data Breach Investigations Report (DBIR).

0 Comments
Continue reading

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Some of the Worst Data Breaches Since September

Some of the Worst Data Breaches Since September

Cybersecurity is becoming a massive issue for every organization due to the immense amount of data breaches that take place regularly. Businesses of all types are looking at strategies to protect their sensitive customer and employee data from hackers, malware, and any other potential danger. The problem is it’s not always as simple as just implementing cybersecurity software.

0 Comments
Continue reading

New Cryptomining Malware Targets Windows Computers

crypto-12-6

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass delete files, lock your system down or flood you with pop-up ads. Rather, its purpose is to install itself stealthily and live in the background where it will steal resources from your PC. It plans on using the resources to mine various forms of cryptocurrency on behalf of the malware's owners, giving them a fat payday and you a frustratingly slow system.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

Hackers Are Already Targeting Disney Plus Accounts

streaming-11-27

In case you weren't already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since it was first announced. If the early indications are any clue, Netflix has little to worry about, but Disney has their hands full. Mere hours after the service was launched, complaints started flooding in, and not just on Disney's website.

0 Comments
Continue reading

Some Hackers Promote Cybersecurity

Some Hackers Promote Cybersecurity

Most people have acquired much of their familiarity with what a hacker is through the mixed representation seen in pop culture today… but does this impression match up to a hacker in real life? Popular entertainment unfortunately doesn’t differentiate between different hacker types and their motivations very well, so that’s what we’ll handle here.

Understanding Hackers, Based on Motive

0 Comments
Continue reading

Public Chargers Can Expose Your Device To Hacking And Malware

airport-11-23

On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a convenient means of recharging their favorite devices. Unfortunately, things are not working out quite according to plan. Naturally, hackers around the world have taken note, and regard such easily accessed terminals as juicy targets and low hanging fruit. According to a security alert published by the Los Angeles District Attorney's office, many of these stations have been compromised, and using them could expose you to malware.

0 Comments
Continue reading

Hackers Are Imitating Government Agencies To Spread Malware

government-11-22

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with a variety of malware.

0 Comments
Continue reading

Another WhatsApp Vulnerability Has Been Found

whatsapp-11-21

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner of the globe. The company is still reeling from the blowback associated with these various issues, but their troubles don't seem to be over yet.

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106