The Top 4 Ways Malware Is Spread

Top Ways Malware Is Spread

By: Shawn Brown, COO, Snap Tech IT Every day, I read another article about a company or city that has been infected with some form of malware. Which is any software program purposely designed to interfere with the normal functioning of a computer system for malicious reasons, such as to hold files hostage for ransom. One […]

Is it Malware or a Computer Virus? Understanding the Difference

Malware or a Computer Virus

The terms “Malware” and “computer virus” are used interchangeably in the computer world. While most people understand that either will create havoc on your system, they don’t necessarily know the differences between them. Let’s spend a few moments digging deeper to demystify them. Malware is a general term that encompasses all types of malicious software. […]

Why You Should Claim Your Equifax Data Breach Payment

Equifax Data Breach Payment

Capital One’s recent data breach is the latest in a series of attacks that serve to remind us all of the vulnerability of our personal information. The data of more than 100 million people in the United States and Canada was exposed and possibly compromised. Ironically, this new breach occurred shortly after the settlement of […]

Why you Need Threat Detection for your Antivirus or Firewall

Threat Detection

Nobody in their right mind would suggest you leave your door unlocked at night or when you’re on vacation. However, if someone can pick that door lock, or break the window right next to the door, they will still enter and burglarize your home. What you need along with your door lock, is something that […]

Business-to-Business: Employee Retainment Tips from the Trenches

employee retainment

With the unemployment rate at its lowest in 50 years, finding qualified candidates for IT positions is a difficult task. We should know, we are currently dealing with it ourselves. For the past few years, we’ve continually fine-tuned our employee recruitment process, from how we onboard new hires, to ongoing employee management and retention. In […]

Business-to-Business: Employee Recruitment Tips from the Trenches

Recruitment Tips

With the unemployment rate at its lowest in 50 years, finding qualified candidates for IT positions is an increasingly difficult task. We should know, we are currently dealing with it ourselves. For the past few years, we’ve continuously fine-tuned our employee recruitment process. This has ranged from how we onboard new hires, to ongoing employee […]

Tech Support Horror Stories: Hackers Hold Files Hostage for Bitcoin Ransom

bitcoin ransom

By Karl Bickmore, CEO This week we continue our series “Tech Horror Stories.” Each post tells the story of a real-life tech-based horror story and explains best practices you can adopt to make sure it won’t happen to you. The names have been changed to protect the innocent. Last week we wrote about a disgruntled […]

Tech Support Horror Stories: Disgruntled Employee Is Up to No Good

Disgruntled Employee

By Karl Bickmore, CEO This week we continue our series “Tech Horror Stories.” Each post tells the story of a real-life tech-based horror story and explains best practices you can adopt to make sure it won’t happen to you. The names have been changed to protect the innocent. Last week we wrote about an $80K […]

Tech Support Horror Stories: An $80K Phish Attack

How to prevent phish attack

By Karl Bickmore, CEO In the hopes of educating business owners and IT managers about the real dangers of cyberspace, we’ve created a new blog series we’re calling “Tech Support Horror Stories.” Each post recounts a story of a horrible event that actually occurred, and then explains the best practices you can adapt to make […]