Latest On Computer Service Now Blog

MacOS High Sierra Root Account Compromise Fixed

MacOS High Sierra Root Account Compromise Fixed

December 1, 2017

Most computers have an account which by default allows unrestricted access and control to all of the commands and programs on an operating system. This account is called a “root” account by Macintosh and Linux, and “administrator” by Windows. Earlier this week Apple released its next big operating system update: MacOS High Sierra. Software updates […]

Read More

Cyber Security and Protecting Your Clients Part 2 – Starring Equifax.. Again

Cyber Security and Protecting Your Clients Part 2 – Starring Equifax.. Again

October 13, 2017

If you live in the United States there’s a good chance that you already know what Equifax is, and if you don’t already know what Equifax is then you’re probably going to get a not-so-great first impression of the business from this article. Equifax is one of three companies required to provide credit reports for […]

Read More

Cyber Security and Protecting your Clients – Starring Equifax

Cyber Security and Protecting your Clients – Starring Equifax

September 8, 2017

Equifax is one of three companies required by the federal government to provide credit reports for citizens of the United States. Recently, Equifax announced that it had been hacked back around May or April of this year. Here’s the problem, if you are a business that interacts with other people or organizations, you are probably […]

Read More

Net Neutrality 101: How it Will Impact your Business

Net Neutrality 101: How it Will Impact your Business

August 28, 2017

You may have heard the term “net neutrality” but never really given it much thought. I understand why; it is a term that has been tossed around the tech industry for the last 15 years with little attention given to the everyday business person…until now. What you may not know is that the discussion about […]

Read More

Windows 10 S – Is the Security Really There?

Windows 10 S – Is the Security Really There?

July 5, 2017

  Windows 10 S is a new version of Windows which launched alongside the new Microsoft Surface Laptop. The Surface Laptop itself is a fairly powerful device, but its default operating system – Windows 10 S – limits the laptop to the capabilities of a chromebook. No, this is not a design flaw with Windows […]

Read More

Email & PowerPoint-Based Malware Attacks

Email & PowerPoint-Based Malware Attacks

June 21, 2017

As if there weren’t already enough reasons to distrust your emails, a ransom ware attack in late May shows that hackers have the power to steal money and information without your input. Well, actually they don’t, but that’s not what all the headlines said a week ago. Many cyber attacks and news articles rely on […]

Read More

WannaCry Ransomware Attacks – Why Keeping your OS Updated Matters

WannaCry Ransomware Attacks – Why Keeping your OS Updated Matters

May 17, 2017

Whenever you get the opportunity to update your operating system, please do it. You may be uncomfortable with the updates applied at first, but at least you reduce the risk of being heckled for money by your own computer. Last Friday marked the start of a huge ransomware attack. This specific ransomware attack has been […]

Read More

The Perils of Using Legacy Systems

The Perils of Using Legacy Systems

April 12, 2017

Older products often lack the benefits provided by newer products. For example, an old flip phone does not have all the benefits of a modern-day smartphone. However, using older technology does not mean that you only have less features than what is available with current technology. Using older technology also means that in many cases […]

Read More

Three Main Methods of Ransomware Delivery

Three Main Methods of Ransomware Delivery

March 8, 2017

Spring is almost upon us, but before we begin hanging up our winter coats, let us take a look back to the 2017 Presidential Inauguration. A few days before the Presidential Inauguration, which was on January 20th, Washington D.C. had a brief ransomware infection. This infection affected systems which were networked with some of the […]

Read More

Protecting Your Accounts with Multi-Step Authentication

Protecting Your Accounts with Multi-Step Authentication

February 8, 2017

For those of you who do not already know, two factor authentication is a method of adding extra security to a product or service by requiring the user to provide their traditional account information, such as username & password, as well as an additional piece of information which can come in many forms. Two forms […]

Read More