Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Cyberattacks Have Gone Way Up Since the Pandemic Started

Cyberattacks Have Gone Way Up Since the Pandemic Started

We’ve been predicting it, and feeling it, but now the numbers are in. Officially, cybersecurity attacks have increased significantly since the start of the COVID-19 crisis - in particular the lockdown.

  0 Comments
0 Comments
Continue reading

2-Factor, 2-Furious - How 2FA is Our Last Hope

2-Factor, 2-Furious - How 2FA is Our Last Hope

Two-factor Authentication, also referred to as Multi-Factor Authentication, or 2FA, is typically where you log in to something and have to type in a small code from your mobile device in order to finish the sign-in process. It’s really the only thing protecting your accounts anymore, so it’s critical to use it.

  0 Comments
0 Comments
Continue reading

Microsoft is Finding Leaving Windows 7 Users Behind Difficult

Microsoft is Finding Leaving Windows 7 Users Behind Difficult

Windows 7 might not be supported by Microsoft any longer, but millions of people are still using PCs that run the antiquated operating system. Since Microsoft has put an end to extended support for Windows 7 OS, a couple bugs have been found. Let’s take a look at what exactly is behind these issues and discuss your options.

  0 Comments
0 Comments
Continue reading

The Endless Line of Costs from a Data Breach

The Endless Line of Costs from a Data Breach

Picture this… In your office you have a bag filled with thousands of envelopes. In each envelope there is $242 in cash. Unbeknownst to you, a thief has gained access to your office, but you don’t realize this until 279 days later. How much is this going to cost your business?

  0 Comments
0 Comments
Continue reading

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

  0 Comments
0 Comments
Continue reading

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

  0 Comments
0 Comments
Continue reading

Securing Your Business from the Internet of Things

Securing Your Business from the Internet of Things

Now that the holidays have come and gone, you might have a couple of new gadgets in your home or office that connect to the Internet. Depending on what these gadgets are, you might have a serious security issue sitting right in front of you without realizing it. Some devices that don’t normally connect to the Internet--also known as Internet of Things devices (IoT)--aren’t as secure as you’d like them to be, particularly in a business environment.

  0 Comments
0 Comments
Continue reading

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

  0 Comments
0 Comments
Continue reading

Looking Back at This Year’s Cybersecurity Issues

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

  0 Comments
0 Comments
Continue reading

Tech Term: Hacker

Tech Term: Hacker

The term “hacker” is possibly one of the best-known technology-related terms there is, thanks to popular culture. Properties like The Girl with the Dragon Tattoo and the Die Hard franchise have given the layman a distinct impression of what a hacker is. Unfortunately, this impression isn’t always accurate. Here, we’ll discuss what real-life hackers are like, and the different varieties there are.

  0 Comments
0 Comments
Continue reading

Hackers Prey on Social Media Users

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.

  0 Comments
0 Comments
Continue reading

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

  0 Comments
0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

  0 Comments
0 Comments
Continue reading

Is Your Security Prepared to Stop a DDoS Attack?

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.

  0 Comments
0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

  0 Comments
0 Comments
Continue reading

Charity Scams Are Very Real. Here’s How To Dodge Them

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Data Recovery Internet Email Software Business Managed IT Services Malware Innovation Outsourced IT Small Business Google Collaboration Tech Term Cloud Computing Hackers Phishing Business Management Cybersecurity User Tips Upgrade Hardware Computer Business Continuity Windows 10 Microsoft Smartphone Mobile Devices Managed Service Workplace Tips Mobile Device VoIp Communication Covid-19 Quick Tips Android Ransomware Backup Managed Service Provider Disaster Recovery Paperless Office Smartphones Communications Encryption Saving Money Remote Work Office 365 Business Technology Server Data Management Browser BDR Remote Monitoring Network Managed IT Users Artificial Intelligence Healthcare Social Media Help Desk Holiday Vulnerability Wi-Fi Compliance Document Management Internet of Things Passwords Windows 7 Data Security Save Money Facebook Chrome Miscellaneous Laptops Government Managed IT services Applications Blockchain Microsoft Office Information Antivirus Employer-Employee Relationship Virtualization Health Project Management Processor Office Two-factor Authentication Analytics Redundancy Scam Bandwidth Tip of the week Automation Vendor Management Avoiding Downtime Infrastructure Windows Storage Customer Relationship Management Router RMM Software as a Service Mobile Office Proactive Machine Learning Meetings Data Loss Website Maintenance Company Culture VPN Mobility Employee-Employer Relationship Regulations IoT BYOD Hard Drive Apps Gadgets Training Files Access Control IT Management OneDrive Virtual Private Network Money Utility Computing Net Neutrality Bring Your Own Device Network Management HIPAA Word Consultation Patch Management Data Breach Tablet Monitoring Remote Worker Internet Exlporer Co-Managed IT Password Dark Web Augmented Reality Financial Time Management Remote Monitoring and Management Smart Technology Recycling Computing Operating System Alert Electronic Health Records Unified Threat Management File Management Employees Instant Messaging Consulting Downtime Flexibility Mobile Security Payment Cards Unified Communications Networking Data Storage Management Server Management Information Technology Search Managed Services Provider File Sharing Remote Workers Professional Services The Internet of Things Social Network Managed Services Gmail Risk Management Cooperation Assessment IT Consulting Cache Settings Personal Information Conferencing Mouse Language Computers Samsung Geography 5G Mobile VoIP Virtual Assistant Bitcoin Printing Windows Server 2008 Social Networking SharePoint Manufacturing Vendor Human Error Break Fix Permissions Content Filtering Mail Merge Identity User Error SaaS Batteries Authentication Cyber Monday Staff Shadow IT Superfish Screen Reader GDPR E-Commerce Theft Microsoft Excel Remote Computing Transportation Active Directory Computing Infrastructure Holidays Modem High-Speed Internet Wireless Internet Big Data Electronic Medical Records Outsource IT Tech Support Wasting Time Current Events Downloads G Suite Touchscreen Hacking Smart Devices OneNote Permission Features Google Calendar Fraud Remote Address WiFi Mobile CIO applications Authorization Outsourcing Smart Tech Peripheral Heating/Cooling Windows Server Politics Alerts IT Development Employer/Employee Relationships Apple Virtual Reality Laptop IT Technicians Techology Cost Management Database Private Cloud Travel Optimization Motherboard Chromebook Hard Disk Drives Trending Sensors How To Test Procurement Banking Statistics WPA3 Firewall Video Conferencing Connectivity Notes PCI DSS Migration Technology Laws eWaste Servers User Management Comparison Licensing Business Telephone Cookies Cables Proactive Maintenance Solid State Drive Data Warehousing Remote Working Outlook Disaster Resistance Voice over Internet Protocol Projects Bookmarks ROI Technology Tips Virtual Machines Emergency Multi-Factor Security Vulnerabilities Solid State Drives PowerPoint Recovery Display Cyberattacks Social Legislation Printer Managing Stress Bluetooth Value of Managed Services Fleet Tracking Zero-Day Threat Distributed Denial of Service Biometric Chatbots Unified Threat Management Teamwork Customer Service Specifications IT Assessment Nanotechnology Wires Cybercrime Cyber security Mobile Device Management Operations Budget Shortcut Mirgation Proactive IT Return on Investment Favorites Digital Payment Hotspot Credit Cards Mobile Computing Options Telephone Wireless Read Only Security Cameras Spam Enterprise Content Management Asset Tracking Backup and Disaster Recovery Managed IT Service Gamification Wearable Technology Star Wars CRM Identity Theft Enterprise Resource Planning Shared resources Websites Going Green MSP Finance Black Friday Digitize Lenovo App Database Management Point of Sale Tech Terms Printers Education CEO Students Regulation Twitter Daniel Stevens Marketing

Latest Blog

A lot is made about cloud computing and its cost and time saving benefits, but when your business is small, a lot of times, it could just be looked at as an unnecessary addition to your computing infrastructure. Today, we thought we would go through a few ways that even the ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...