Tech Tips

Cyber Security Awareness Month – Spoofing

Spoofing is a fraudulent practice in which a person or malicious program is disguised as a known computer/tablet/phone by cloning device information. The purpose of these attacks is to trick the recipient into allowing the transfer of data or secure transactions. The most common spoofing attacks include IP Spoofing, ARP Spoofing, and DNS Spoofing. IP…
Read more

Cyber Security Awareness Month – Spyware

Spyware is one of the most common threats on the internet. It runs quietly in the background collecting your personal data without you even knowing it’s there.  It then sends that information over the internet to a third party. It is this type of malicious software that infiltrates your computer or mobile device, secretly monitoring…
Read more

Cyber Security Awareness Month – Trojan Horse

A Trojan Horse, or, simply, a trojan, is a kind of malware that hides within computer programs and is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network. The infected code is meant to trick you into loading and executing the malware on your device. Unlike viruses, trojans…
Read more

Cyber Security Awareness Month – Ransomware

  Ransomware is a type of malware designed to encrypt, erase, or block access to files on a system, until a ransom is paid by the victim. Payment is most often asked for in crypto-currency, such as Bitcoin, but prepaid cards or gift vouchers are sometimes accepted. The malware can infect a variety of devices…
Read more

Cyber Security Awareness Month – Phishing

Cyber scams are increasing every month and the techniques used are becoming more advanced. Phishing is one of the oldest and most common attacks used today. These schemes typically come by email, disguised as a trusted individual or entity. Some scams target specific victims through online tracking, such as CEOs and important company board members,…
Read more

New Threats: Meltdown and Spectre

  You may have seen some news regarding two discovered vulnerabilities in computer systems. These vulnerabilities, known as Meltdown and Spectre, are catastrophic vulnerabilities that can allow an attacker to gain access to every part of a computer. Any passwords, credit card numbers, and any other piece of personal information can potentially be retrieved using…
Read more

Iler Networking & Computing Partners with Hyland to Provide Cloud-Based Content Services

Information technology consultant adds Hyland’s cloud-based content services applications to its product portfolio LAGRANGE, OHIO – November 6, 2017 – Iler Networking & Computing, a company providing IT services since 1994, and Hyland, a leading provider of information management solutions, have partnered to deliver a new, secure, cloud-based software solution for companies to better collaborate…
Read more

How Does Your Current Computer Guy Stack Up?

Take this quiz to find out! How can you tell if you are receiving poor or substandard service? How do you know if your computer guy is doing everything possible to secure your network from downtime, cyber-criminals, data loss, or other frustrating and expensive disasters? Could your current computer guy actually be jeopardizing your network?…
Read more