Why Having Data Backup Is Important for Your Business

So, imagine this situation—you walk into your house, turn the light switch on, and you hear that tingly “pop” sounds as the light burns out. If you were smart and prepared, you should probably have some extra light bulbs on hand in your closet. If you don’t have any spares, well then, you’ll have to ….  Read More

How IT Guys Protect Businesses from Cybersecurity Threats

Information, particularly online information, has become a form of currency. For modern companies, the threat of information being leaked or stolen is a serious concern. IT specialists, short for information technology specialists, are on the front lines of defense against hackers, phishers, and scammers. What Are the Biggest Current Cybersecurity Threats to Businesses? The threat ….  Read More

How Cloud Software Can Keep Your Business Connected

The term “the cloud” gets thrown around all the time but most businesses have no idea what it can do for them. It is a lucrative way to make things accessible and easily connected, especially in large businesses. Using this software can be tough to get used to but when it is all set up ….  Read More

Arista Acquires Awake Security

Arista has formally announced its official acquisition of Awake Security. Awake security is a leader in cloud networking. Their acquisition of Awake Security indicates they are moving to combine both artificial intelligence with human expertise to find internal and external threats to their security. Acquiring Awake Security is both a network detection and response to ….  Read More

New Vulnerability Leaves ALL WIFI Insecure

Yesterday, we learned about KRACK (or Key Reinstallation Attack) – a security flaw in the WPA2 protocol, which could see an adversary break the encryption between a router and a device, allowing them to intercept and interfere with network traffic.  But understanding the issue is tricky. This, obviously, is profoundly complicated stuff. To help clear things,  David ….  Read More

Hacking is inevitable, so it’s time to assume our data will be stolen

If recent hacking attacks such as the one at Equifax, which compromised personal data for about half of all Americans, have taught us anything, it’s that data breaches are a part of life. It’s time to plan for what happens after our data is stolen, according to Rahul Telang, professor of information systems at Carnegie ….  Read More

How You Should Respond To The Equifax Breach

Do not try to frivolously sue a $17B company Step Number 1.0 Relax. Your info isn’t likely to be used unless you lose the lottery I talk about later. And nobody is playing the lottery until about 90 days from now. So relax. But take it seriously. This is still important. What Happened? Equifax, one of the ….  Read More

Are you protected from Wanna Crypt ransomware?

This past weekend many corporations around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. We at Economic Computers wanted to reach out and check if this malware affected any of our customers. Please contact us if you are experiencing problems due to this or any future attacks. We have a partnership with Microsoft, which allows us to receive up to date patches and guidance for scenarios like these.

New HP Audio Drivers Record Your Keystrokes

Update: HP has released updated drivers for all affected models. A new report from the user Catalin Cimpanu on the tech forum Bleeping Computers has brought to light some “hidden features” in the new audio drivers for a few HP models. The driver saves everything the user types in to a local file on the computer. This ….  Read More