Infracore Blog

Infracore has been providing enterprise-level IT Support for medium sized businesses in and around San Diego, CA since 2003. Time and experience has helped us develop best practices, workflow procedures and a proactive philosophy toward the management of IT departments for our clients.

Social Engineering Isn’t Going Away

Social Engineering Isn’t Going Away

When someone starts talking about social engineering, people often get confused. They think we’re talking about cloning. While having two of something you love may not be terrible, the social engineering we routinely cite is much, much worse. Social engineering is the act of using social interactions to get people to make cybersecurity mistakes. Today, we’ll take a look at social engineering and how it can have a negative effect on your business. 

0 Comments
Continue reading

The Three Key Steps to Stop Malware

The Three Key Steps to Stop Malware

Malware is a bad thing. It’s right there in the name, as the prefix mal- comes from the Latin malus, which literally translates to “bad.” So, it only makes sense to try to keep it out of your business. Let’s discuss a few basics to form the foundation of your greater cybersecurity strategy.

0 Comments
Continue reading

Windows 7 Has Nearly Ticked Its Last Tock

Windows 7 Has Nearly Ticked Its Last Tock

It won’t be long before Microsoft retires two of its most popular operating systems - but hopefully, you already knew that. Microsoft has made a point of reminding Windows 7 users that they need to upgrade before January 14 - and yet, many users haven’t done so.

0 Comments
Continue reading

Facebook and Your Privacy (Part 2)

Facebook and Your Privacy (Part 2)

If you haven’t read part one of our Facebook privacy blog yet, you may want to do that before reading this one. If you’re ready, we’ll be taking an in-depth look at your Facebook settings to make sure that your account and its data are as secure as possible. This is important because protecting this kind of data hasn’t been one of the platform’s strong suits - and user privacy has been the star of many lists of concern.

0 Comments
Continue reading

Facebook and Your Privacy (Part 1)

Facebook and Your Privacy (Part 1)

Two billion users strong, Facebook is one of the Internet’s most popular websites… which has frequently put the tech giant in the spotlight when it comes to how secure the data you’ve entrusted to them (in addition to what they’ve collected) really is. Today, we’ll discuss how you can access the information Facebook has on you.

0 Comments
Continue reading

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

 

Imagine what would happen if sensitive data stored by your business was exposed or stolen. The consequences could be catastrophic. Some very successful companies have had this happen to them. Today, we will look at some of the largest data breaches since September 1.

0 Comments
Continue reading

Protect Smartphones Like Any Other Computer

Protect Smartphones Like Any Other Computer

We go into great depth on how to protect your desktop and laptop computers from malware and other malicious threats. In fact, one of the first steps you take anytime you are setting up a new computer is to install antivirus and other security programs. You do this because an unprotected device presents substantial risk. With the way people are using their smartphones today, it’s a solid practice to outfit your mobile device with the security software needed to maintain the security of your data.

0 Comments
Continue reading

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

0 Comments
Continue reading

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Most of us like to take matters into our own hands, almost to a point where we might refer to ourselves as control freaks. So, when it comes to letting other people or even our own devices update themselves, we tend to click “remind me later” or “don’t ask me again”. Patches however, are a crucial task in the computing era. Keeping everything up-to-date aids your business in staying one step ahead of lurking threats. Recently, Microsoft announced that it had two major security updates which required emergency patches. 

0 Comments
Continue reading

Cybersecurity: An Origin Story

Cybersecurity: An Origin Story

The way a business handles network security is directly related to what problems will arise from their use of information systems. Cybersecurity has become a major part of all businesses. Because the better your cybersecurity is, the less problems your business will have to overcome, cybersecurity has grown into a multi-hundred-billion dollar a year industry. The history of cybersecurity has a fascinating story behind it and today we’d like to share it with you. 

0 Comments
Continue reading

How You Should Judge Potential Password Management Programs

How You Should Judge Potential Password Management Programs

Complex passwords are hard to remember - there’s no denying that. However, there is also no denying how important it is to use different ones for each account, all sufficiently complex and stored in a way that you can only access them. The point is, a lot of people use bad password practices because good password practices are too difficult and time consuming. There has to be some kind of acceptable middle ground… and there is.  

Recent comment in this post
Dorothy J. Williams
This is my first visit to this website,you have shared very write your essay for you beautiful images of buildings which i like it... Read More
Friday, 30 August 2019 19:15
1 Comment
Continue reading

Think Before You Click: Spotting a Phishing Attempt

Think Before You Click: Spotting a Phishing Attempt

We’ve all caught the obvious spam email, like the message that is clearly bogus, or the offer that is definitely too good to be true.

We’re going to confidently assume none of our readers are getting tricked by Nigerian Princes or getting roped into order virility drugs from an unsolicited email. The real threat comes from the more clever phishing attacks. Let’s take a look.

0 Comments
Continue reading

Even Amazon Can Be Hacked

Even Amazon Can Be Hacked

In 2018, Amazon was struck by a considerable attack, with hackers taking funds from approximately 100 seller accounts, according to a Bloomberg report. Between May and October 2018, Amazon sellers were struck approximately 100 times, draining funds from the seller control platform to augment their own funds. According to the investigation, the first fraudulent transaction took place on May 16, 2018, with an undisclosed amount being stolen. The hackers utilized phishing attacks in order to scam their targets.

0 Comments
Continue reading

Windows 7 and Windows Server 2008 R2 is Finally Losing Support

Windows 7 and Windows Server 2008 R2 is Finally Losing Support

Microsoft Windows has been a staple of modern computing, with each title in the series offering more innovative features. When it becomes time to retire one of their OSs, it can be troublesome for businesses. This coming January, two of the most utilized versions of the Windows OS--Windows 7 and Windows Server 2008 R2 will be losing support, effectively ending their viability. Businesses that still use these titles will have to come up with a plan about how they are going to proceed once Microsoft retires that software. 

0 Comments
Continue reading

How Much Risk Can the IoT Cause?

How Much Risk Can the IoT Cause?

The Internet of Things is rapidly growing in popularity, which makes it all the more likely that some IoT devices will make their way into your office. Also growing: the reputation that these devices have as vulnerabilities to your organizational security. In an increasingly connected world, it is important to remember how the IoT could quickly become a hindrance to your business if not managed properly.

0 Comments
Continue reading

The Time Has Come for SQL Server 2008 and 2008 R2

The Time Has Come for SQL Server 2008 and 2008 R2

Software solutions don’t last forever. While patches and security updates can stave off the inevitable for quite some time, it’s impossible to maintain a specific solution forever. Support is eventually cut off, and businesses are left exposed if they haven’t taken the time to prepare. In the case of Microsoft SQL Server 2008 and 2008 R2, you are running out of time.

0 Comments
Continue reading

Even Small Businesses are Targets for Hackers

Even Small Businesses are Targets for Hackers

Do you ever think of your business as too small of a target to matter to hackers? Some organizations actually do believe this, and that notion is effectively a trap. The thing that all businesses need to keep in mind is that all organizations, regardless of which industry they fall into, as all companies have data that’s valuable to hackers. We’re here to prove it and ensure you know the best way to protect your data.

0 Comments
Continue reading

Staff Education Goes a Long Way in Preventing Security Issues

Staff Education Goes a Long Way in Preventing Security Issues

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

0 Comments
Continue reading

Is Blockchain a Shield for Cybercrime?

Is Blockchain a Shield for Cybercrime?

Blockchain technology is all the rage these days. Business owners are going to start hearing this buzzword as a bullet point in software solutions. Developers from all over the world are trying to harness the power of encrypted, distributed data, mainly due to the reputation that blockchain has regarding the “unhackable” permanence of the data stored upon it. However, it as powerful as blockchain is purported to be, it isn’t totally infallible.

0 Comments
Continue reading

Taking an Exploratory Stab at Spear Phishing

Taking an Exploratory Stab at Spear Phishing

Chances are, you’ve heard of “phishing” - a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried out. Here, we’ll discuss the realities of spear phishing, and the risks it poses to your business.

0 Comments
Continue reading

Recent Comments

TotoDesk What’s the Point of An IT Assessment
23 March 2020
great work man, you have to post a great post it will help people very much keep it do more for peop...
TotoDesk Understanding the New NIST Guidelines for Password Security
14 March 2020
great work man, I would like to congratulate you on this effort Arte Del Gusto.
TotoDesk Understanding the New NIST Guidelines for Password Security
12 March 2020
you have done a great job I hope you will do much batter in the future fusionex.
NoahAnton Understanding the New NIST Guidelines for Password Security
01 March 2020
This is the good head pattern changer. Here is the facebook password reset confirmation email, https...
Tim Meyers Motivate Your Employees with More Playful Work Practices
14 February 2020
It is well-known that a dirty environment is an unhealthy one and makes people sick more often than ...