Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

The Importance of Secure Conferencing

The Importance of Secure Conferencing

Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider security just as much as they consider functionality. Today, we’ll take a look at security for your company’s conferencing solutions.

0 Comments
Continue reading

What You Need to Consider to Securely Permit Remote Work

What You Need to Consider to Securely Permit Remote Work

At any given time, a business needs to consider its security, but this need only exacerbates when its employees are working remotely. With the coronavirus pandemic still in play, the likelihood is that your employees are in this situation has risen dramatically. In order to maintain  your organizational security, you need to consider the many factors that a remote workforce can introduce.

0 Comments
Continue reading

Let’s Look at the Different Types of Ransomware

Let’s Look at the Different Types of Ransomware

The growing popularity of ransomware has been disconcerting to many IT professionals, particularly due to the different tactics that this malware variant has been spotted utilizing. In order to protect your business from these attacks, it helps to know how they work. We’ve put together a beginner’s field guide to ransomware types to help you identify (and hopefully avoid) it.

0 Comments
Continue reading

The Security Questions Surrounding Cloud Solutions

The Security Questions Surrounding Cloud Solutions

All types of businesses use cloud resources as a part of their IT infrastructure. It allows them to turn what was once a major capital expenditure into a controllable operating cost; and, it does it while offering solutions to almost any business problem. The one drawback that most IT professionals agree on is how to gain enough control over a cloud platform to ensure that the platform is secure. 

0 Comments
Continue reading

How to Get Rid of an Old Computer Without Sacrificing Security

How to Get Rid of an Old Computer Without Sacrificing Security

Time passes, and things get old. This is especially true of technology, as new and better options are developed and released all the time. Sooner or later, you’re likely to find yourself in need of a new system… The only question left is how to get rid of the old one.

0 Comments
Continue reading

Do Inherent Security Risks Make Smart Devices Dumb?

Do Inherent Security Risks Make Smart Devices Dumb?

Over the past few years, there has been a general fascination with smart devices in the home, and to a certain extent, the office. These Internet of Things-powered appliances and gadgets can help add to the convenience of rote tasks and other everyday activities, but is it actually a good idea to use them? As it turns out, unless you’ve taken the proper precautions, maybe not.

0 Comments
Continue reading

Tip of the Week: 3 Considerations When Securing Personal Information

Tip of the Week: 3 Considerations When Securing Personal Information

Personal information is precious, especially in this increasingly digital day and age. This makes it incredibly important that you are doing everything you can to protect it in your business - whether it is your own or belongs to somebody else. Here, we’ll go over a few tips to help you better protect the data you’re responsible for.

0 Comments
Continue reading

Best Practices for Your Access Management

Best Practices for Your Access Management

As you oversee your business, there is a lot that you’re going to have to manage - including how much access your employees have to the data you have collected and generated throughout your operations. An access management policy can help you to accomplish this. Here, we’ll review a few key features you need to include in your strategy.

0 Comments
Continue reading

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Google Knows a Lot About You. Here’s How to Control It

Google Knows a Lot About You. Here’s How to Control It

Nearly everyone uses Google in some way or another. The search engine is, by far, the most common way people get answers and find content online. The margins aren’t even close, either. Currently, Google handles about 90% of search queries, while the second and third place goes to Yahoo and Bing, who share just below 5% of the search market share.

Google curates the search results on the fly based on a lot of variables including where you are located, what kind of device you are on, and your online surfing habits. This means Google is collecting a lot of information about how we use the web to give us a better experience. Let’s look at how you can control what Google knows about you to better protect your privacy.

0 Comments
Continue reading

Watch Out For Large Amounts of Scams This Holiday Season

holiday-resize_20191227-162950_1

The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber Monday. Sadly, those two big shopping days mark the beginning of a mad sprint to push out as many shopping-related scams as possible. Researchers at ZeroFOX have been monitoring the online retail landscape and have identified more than 60,000 potential scams, most of them aimed at mundane product categories that are not categorized as luxury items.

0 Comments
Continue reading

Some of the Worst Data Breaches Since September

Some of the Worst Data Breaches Since September

Cybersecurity is becoming a massive issue for every organization due to the immense amount of data breaches that take place regularly. Businesses of all types are looking at strategies to protect their sensitive customer and employee data from hackers, malware, and any other potential danger. The problem is it’s not always as simple as just implementing cybersecurity software.

0 Comments
Continue reading

New Cryptomining Malware Targets Windows Computers

crypto-12-6

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass delete files, lock your system down or flood you with pop-up ads. Rather, its purpose is to install itself stealthily and live in the background where it will steal resources from your PC. It plans on using the resources to mine various forms of cryptocurrency on behalf of the malware's owners, giving them a fat payday and you a frustratingly slow system.

0 Comments
Continue reading

Security Issues Found In Several VNC Applications

computer-12-7

Microsoft RDP has its share of problems. That simple truth has sparked the rise of a number of open-source VNC (Virtual Network Computing) applications, which allow a user to remotely control another computer. Regardless of which VNC solution you use, they all work pretty much the same way. There's a "server component" which runs on the computer that shares its desktop.

0 Comments
Continue reading

Automation Plays a Critical Role in Cybersecurity

Automation Plays a Critical Role in Cybersecurity

Automation is sometimes misconceived as a troublesome or unreliable addition to business. It’s not about replacing people with machines, it’s about getting more done with the people you have. Having an attitude that doubts technology and believes nothing can replace human processing can quickly put you at a disadvantage compared to your competitors.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

New Ransomware Called DeathRansom Hits The Scene

ransomware-12-3

Early in 2019, a new strain of ransomware appeared. Called "DeathRansom," its bark was initially much worse than its bite. Researchers quickly discovered that the new strain only pretended to encrypt a user's files. If victims simply removed the "encryption" extension, they could get their files back without doing anything at all. That ceased to be the case around November 20th of this year.

0 Comments
Continue reading

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

zombie-12-2

Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor generations from 2011 and beyond. Intel hasn't had a good run of late, being beset almost constantly by these kinds of issues, and Zombieload was one of three new MDS variants discovered.

0 Comments
Continue reading

It’s Shopping Season, But Let’s Be Safe!

It’s Shopping Season, But Let’s Be Safe!

With Black Friday, Cyber Monday, and the gift-giving holidays rapidly approaching us (can you believe 2019 is almost over? I feel like I just stopped writing 2018 on my checks!), it’s time to take a look at how we can be as safe as possible while shopping on the Internet.

0 Comments
Continue reading

New Ransomware Targets Removable And Attached Drives

drive-11-29

There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. One of the most unusual features of this strain is the fact that it specifically doesn't target the C: drive of the target computer.

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106