Archives
The last day of National Cyber Awareness Month just happens to coincide with Halloween. Anyone who has experienced a hack, ransomware, spyware, or other computer attack know that it can be a scary experience. To keep your network and data safe this Halloween and moving forward, let’s look back at the highlights provided by Stay […]
BitTorrent facilitators are facing another disparaging malware attack. Popular client Transmission was unknowingly distributing a brand of malware known as “OSX/Keydnap”. This is a backdoor program which target Macs in order to steal passwords and gain root access to the user’s computer. This should be concerning to users because earlier this year, another similarly coded […]
Dropbox – it’s not just for storing documents anymore. The file storage company has 500 million users with three different levels of membership – basic, pro, and business. The business level allows for collaboration with a team and has additional safety features such as permission levels and administrator tools. These tools are being refreshed with […]
CyptoWall, CryptoDefense, CryptoLocker…different names for the same powerful ransomware virus. You know that you are the victim of a CryptoVirus if you see a message like this: The moment you see this on your computer is likely to be intimidating- and for good reason. You should take a CryptoVirus seriously, as encrypted files can never […]
In July 2014, a thunderstorm hit Indiana that caused a power outage effecting thousands – both individuals and businesses. A smaller but still significant outage happened just this year in Boone County. Summer is still in full-swing, and the risk of more thunderstorms is present. This means it is a good time to take a […]
The Growing Trend Mobile devices have changed the face of the workforce. According to Tech Pro Research – 74% percent of businesses survey allow or plan to soon allow employees to “Bring Your Own Device” (BYOD) to work. In industries like construction where employees are often out of the office setting – this can allow […]
We’ve gotten smarter about malware. An email with a strange looking sender or a suspicious link is easy to avoid when you know how to look for it. But malware does not always make itself so obvious. Sometimes, it acts more like a chameleon and is able to slip in to legitimate websites. One form […]
When you call L5 Solutions, you are not calling an automated system, but a group of people. The L5 team is made up of people at different points in their careers who bring different experiences and knowledge sets to the table. Some come from the corporate world, others from healthcare, etc. However, they have several […]
L5 Solutions is celebrating 10 years of minimizing technology frustrations for our customers. Therefore, it is a good time to stop and take a look back. This is part one of a two-part series getting to know the people behind the computer, starting with Frank Howard and what led him to founding L5 Solutions. Before […]
It has not been a good summer for password security. Within the last few months, LinkedIn and Twitter have had issues with leaked login information, and big names such as Mark Zuckerberg and Katy Perry have seen their accounts hacked. While at first glance it can appear scary, these leaks can be used as a […]