Blog

Malware Causing Severe Data Loss is on the Loose – Here’s What To Do

Ransomware is not a new concept. Simply explained, it is software that encrypts your data and tries to sell it back to you, or ...

A New Favorite Way Hackers Are Gaining Access To Your PC

Do you have Java turned on in your web browser? If your answer is “Yes” or “I’m not sure” then it’s time to take action to find out. Why? The biggest threat ...

Would You Rather Text Than Talk? Essential Tips For Business Texting

You use your iPhone or Android for everything else. Your spouse even texts you to grab some milk at the store or to tell you they’ll be gone when you get home. ...

What You Need To Know About Security Breach Notification Laws

It’s Monday morning and one of your employees notifies you that they lost their laptop at a Starbucks over the weekend, apologizing profusely. Aside ...

Beware the Phony Security Patch Scam

A scam that has been around the block a few times is back again with some new twists. The revamped scam has been extremely ...

If Disaster Strikes, How Fast Could Your Company Be Back Up And Running?

You hear it all the time from us—back up your data, keep your virus protection current, and install and maintain a firewall to protect ...

End of an Era - The Death of Windows XP

An end of an era in the computer world is a short six months away.  Based on conversations I’ve been having with business owners and executives, many aren’t aware it’s coming or ...

The Difference Between Backup, Disaster Recovery And Business Continuity

If you think “data backup” is synonymous with “disaster recovery” and you aren’t sure what “business continuity” means, you’re not alone. Most of the ...

Hackers Are Now Targeting Macs

Until recently, MacIntosh computer users have long enjoyed relative freedom from hacker attacks; however, researchers at Symantec Corporation say online criminals are now setting their sites on Mac users. Online porn hunters are the latest target. Visitors to certain web ...

Do the Cyber-Criminals Really Want Your Data?

We recently participated in a meeting where cyber-security was the primary topic of concern. The host was an insider that works with the FBI, NSA, and the military to diagnose what data cyber-criminals are looking for and why. You’ll be ...

Contact

BeckTek | IT Services & IT Support Moncton, NBBeckTek | IT Services & IT Support Moncton, NB Logo $$$