Blog - Iler Networking & Computing

Spyware is one of the most common threats on the internet. It runs quietly in the background collecting your personal data without you even knowing it’s there.  It then sends that information over the internet to a

A Trojan Horse, or, simply, a trojan, is a kind of malware that hides within computer programs and is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network. The infected

  Ransomware is a type of malware designed to encrypt, erase, or block access to files on a system, until a ransom is paid by the victim. Payment is most often asked for in crypto-currency, such as

Cyber scams are increasing every month and the techniques used are becoming more advanced. Phishing is one of the oldest and most common attacks used today. These schemes typically come by email, disguised as a trusted individual

10 years ago it was inconceivable to the public that the power grid could be sabotaged by digital means. Now with the increasing connectivity of devices used in business systems, the DHS is warning companies that Russian

Kent Iler January 19, 2018 0 Comments

Iler Networking and Computing is now partnered with Hyland Software to bring you Sharebase. Here is a webinar introducing our collaboration.  

Kent Iler January 16, 2018 0 Comments

  You may have seen some news regarding two discovered vulnerabilities in computer systems. These vulnerabilities, known as Meltdown and Spectre, are catastrophic vulnerabilities that can allow an attacker to gain access to every part of a

Kent Iler November 6, 2017 0 Comments

Information technology consultant adds Hyland’s cloud-based content services applications to its product portfolio LAGRANGE, OHIO – November 6, 2017 – Iler Networking & Computing, a company providing IT services since 1994, and Hyland, a leading provider of

Take this quiz to find out! How can you tell if you are receiving poor or substandard service? How do you know if your computer guy is doing everything possible to secure your network from downtime, cyber-criminals,

Kent Iler November 13, 2015 0 Comments

You have heard of phones, tablets, and computers being hacked. You may have even heard of industrial equipment being hacked. But did you know that vehicles are increasingly finding themselves in a digital attacker's crosshairs? Vehicles have