NetWorthy Systems Blog

NetWorthy Systems has been serving the Beaumont area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Bites Back with Fix to POODLE SSL Vulnerability

b2ap3_thumbnail_poodle_ssl_vulnerable_400.jpgA few weeks ago, a new vulnerability was discovered in the Internet Explorer functionality of SSL 3.0. Due to the encompassing nature of the vulnerability, all operating systems are affected. This makes it a big problem that must be resolved. Thankfully, Microsoft has released a fix to the vulnerability, called Fix It, making it far easier to prevent the vulnerability from becoming an issue.

Continue reading

Ghost Servers - Who Ya Gonna Call?

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

Continue reading

To Understand the Hacker, You Must Become the Hacker

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

Continue reading

Tip of the Week: How to Prevent IT Equipment Theft

b2ap3_thumbnail_device_theft_400.jpgHow familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.

Continue reading

BadUSB: Theoretical Malware Turned Reality

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Continue reading

Alert: Don’t Get Hit with Shellshock by the New Bash Bug

b2ap3_thumbnail_alert_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

Continue reading

3 Shopping Tips to Protect Yourself from the Next Major Retail Data Breach

b2ap3_thumbnail_credit_card_security_400.jpgMajor retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?

Continue reading

3 Ways to Keep IT Simple Stupid (KISS)

b2ap3_thumbnail_keep_it_simple_stupid_400.jpgKeep It Simple Stupid, aka KISS, is a sure way to find success in business. By keeping operations simple, the cost of doing business is reduced, there's less room for error, and more people understand what's going on. Your IT infrastructure is at the heart of your organization, keeping IT simple will help your business kiss many of its problems goodbye!

Continue reading

How Much Cash Can Hackers Cost Your Business?

b2ap3_thumbnail_costs_of_data_security_400.jpgCrime might pay for those bold enough to do it, but that doesn't mean everyone should. Hackers likely don't take into account the fact that they are costing the world countless millions of dollars in damage only to further their own gain, and their influence can have far-reaching effects on people all over the world, let alone your business.

Continue reading

Public Cloud Computing: Right For Your Business, but Not For Jennifer Lawrence

b2ap3_thumbnail_confidential_files_leaked_400.jpgHow your business chooses to store its data is a major decision. You can implement a private cloud computing model and spend more on equipment and maintenance than you need to, or you can save money with a public cloud. Although, in light of the recent celebrity-nude-photo-iCloud hack, is the public cloud secure enough to host your company's data? Let's address this concern and explore your cloud computing options.

Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpgIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

Continue reading

Is Your Antivirus Software Up to Snuff?

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpgAll of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

Continue reading

USB Software is Bad to the Bone, Literally

b2ap3_thumbnail_badusb_a_threat_400.jpgUSB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business.

Continue reading

Use a Firewall Before You Get Burned

b2ap3_thumbnail_security_procedure_including_firewall_400.jpgToo many people think that their systems are safe from the corruption of hackers and viruses. They're wrong. In order to keep your business safe from all of the common threats found on the Internet, you should think about installing some protective software.

Continue reading

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail

b2ap3_thumbnail_smartphone_security_400.jpgWhen it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

Continue reading

Apple’s iOS May Contain Backdoors to Leak Sensitive Information

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpgApple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

Continue reading

What Could Anti-Surveillance Technology Mean for National Security?

b2ap3_thumbnail_are_they_watching_you_400.jpgThe Hackers on Planet Earth (HOPE) conference which took place on Saturday, July 21st 2014, had an important panelist, that being Edward Snowden. Whether he's a whistleblower or a traitor is a hot topic on the web, but one thing is certain - he has called for assistance in creating and promoting anti-surveillance technology to mitigate government spying.

Continue reading

Internet of Things: Innovation, a Ride Aboard the Hype Train, or Worse?

b2ap3_thumbnail_will_everything_be_connected_400.jpgThe Internet of Things is on its way. But, is the world ready for it? Some experts aren't so sure about that. The Internet of Things may very well usher the world through the door to social inequality and violations of basic human rights, among other atrocities.

Continue reading

Warning: Protect Yourself from Cryptolocker and GameOver Zeus Now!

b2ap3_thumbnail_gameover_zeus_and_cryptolocker_400.jpgIt has been two weeks since the National Communications Association warned the world about the GameOver Zeus and Cryptolocker ransomware, and if you haven't taken steps to avoid these threats, it's not too late - if you haven't been infected yet, do so as soon as possible. Otherwise, your network will be vulnerable, and so will your banking credentials.

Continue reading

Don’t Even Think About Disabling Your Antivirus Software!

b2ap3_thumbnail_do_not_remove_antivirus_400.jpgDoes your company have dedicated antivirus software to protect it against the annoying threats on the Internet? Sometimes, a computer virus can weasel its way past your software, but there's no greater frustration than when you realize that the reason you contracted a virus is because an employee disabled your software. Don't let this happen to you!

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive