TopTop

Burgess IT Blog

phishing

Social Engineering Phishing Email Affects Woolwich Family

Phishing email scams are a constant threat to anyone with an email account. These email scams have evolved over the years from simple tactics to much more sophisticated plots using social engineering. In August 2018, one family in Woolwich fell victim to an email scam that we should all be aware of. While in the Continue Reading

windows 7

Windows 7 Extended Support Expiring

Does your PC still operate on Windows 7? If so, it’s time to start planning. In 2015, Microsoft stopped mainstream support for Windows 7. This means it stopped offering free phone and online support as well as non-security related updates. Since that time, Microsoft has continued to offer security updates for the operating system. This Continue Reading

bogus

Phishing Attempts Continue to Rise

Phishing Emails to Watch Out For We’ve seen a lot of recent email phishing attempts that we’d like you to be aware of. Phishing emails try to convince you to open links that could be harmful to your computer and/or network and your personal identity. Remember to always think before you click. Never click on any links or Continue Reading

fbi

FBI urges internet users to reboot their routers to stop Russia-linked malware

PLEASE NOTE: This does not apply to Sonicwall or Cisco Routers. The FBI recommends any owner of small office and home office routers power cycle (reboot) the devices. Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide. The actors used VPNFilter malware to target small office Continue Reading

summer-travel

Keep Mobile Devices Safe During Summer Travel

Now that summer is finally upon us, thousands of vacationers will be traveling throughout the United States and beyond. Here are some simple tips to keep your mobile devices safe and secure while you travel: The guidelines below provide core principles and recommendations for more secure use of digital devices and the Internet. Keep software Continue Reading

it security

Technology End-of-Life Guide

Technology end-of-life is an important aspect of your network and should be managed closely. If software or hardware is in its final stages of existence, or has already expired, it needs to be replaced. Once it reaches end-of-life, the manufacturers of the software/hardware will no longer offer any type of support, leaving your network vulnerable Continue Reading

cpu security alert

Flaws in CPU Architecture Could Be Exploitable

On January 3rd, information about a vulnerability that affects many computing devices was released. The flaws are present in the CPU (Central Processing Unit) which is the “brain”, or the part of a computer that performs all the processing of information. The flaws could allow an attacker to read information that the processor has accessed. Continue Reading

productivity apps

5 Tips for Recognizing Online Scams

Let’s face it, the online world is full of scammers, hackers and thieves. Being in the IT industry, I see the effects it can have on a company or individual. Even with the best antivirus software, the most secure firewall, and the latest operating system – you can still be a victim. That’s because hackers Continue Reading

blog image 2

Avoiding the Chrome “Not Secure” Warning

Chrome “Not Secure” Wondering about the Chrome “Not Secure” warning that appears when you visit certain websites? Read on to find out how their new SSL policy effects you as an internet user and as a website owner. When it comes to internet browsers, Google Chrome is at the top with over 1 billion users Continue Reading