LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed
 

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

Continue reading
0 Comments

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

Continue reading
0 Comments

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity Business malware IT Support Backup Microsoft Email Software Network Security Data IT Services Hosted Solutions Managed Service Provider Hardware Efficiency User Tips Mobile devices Computer Disaster Recovery Mobile Device Management Workplace Tips Google Business Management Microsoft Office Smartphone Android Ransomware Remote Monitoring Miscellaneous Holiday Virtualization Windows Business Continuity The Internet of Things Network Smartphones analytics Collaboration Server Social Media Operating System Small Business BYOD Remote Computing Unified Threat Management Mobile Computing IT Support WiFi Phishing Managed IT Services Passwords Cybersecurity Alert VoIP Windows 10 Save Money BDR Outsourced IT Big Data Upgrade communications Firewall Vendor Management apple Innovation Managed IT Data Management Saving Money Gmail Office Lithium-ion battery Managed IT services Employer-Employee Relationship Browser Quick Tips Facebook History Budget Communication Artificial Intelligence Outlook Productivity Search Internet of Things IT Management App Marketing Bandwidth Encryption Recovery Automation Running Cable Windows 10 Wireless Technology Proactive IT Money Update Document Management Customer Service Save Time Information Technology Cost Management Hard Drives Hiring/Firing Content Filtering Best Practice Help Desk Saving Time SaaS Hacking Office 365 Project Management Gadgets Hosted Solution Robot Networking Disaster tablet IT Consultant Antivirus Spam Health Mobility Bring Your Own Device IBM Hard Drive Tech Support Apps Two-factor Authentication Word Data Backup Law Enforcement Data Recovery Data storage User Intranet Virus Specifications Bitcoin Compliance Chrome VPN Education Experience Presentation Digital Telephony Safety Virtual Desktop Social Maintenance Risk Management Network Congestion Training DDoS Business Intelligence Heating/Cooling Programming Unified Threat Management Start Menu YouTube IT service Password Cybercrime Uninterrupted Power Supply Comparison Computers Unified Communications Cortana Monitors Excel iphone Business Growth Retail Scam Government Laptop Going Green Software as a Service Google Maps PowerPoint Solid State Drive Documents Cloud Computing Mobile Device Flexibility Legal Downtime Cryptocurrency Social Networking Computing Infrastructure Website Travel Access Control Current Events Company Culture End of Support Phone System avoiding downtime Telephone Systems Administration Data Security Net Neutrality eWaste Wireless Patch Management Google Docs Electricity Television Data Loss Digital Signature Statistics Windows 8 Hack Environment HIPAA Redundancy Office Tips Data Breach WannaCry Mouse Social Engineering Entertainment Teamwork Google Drive Blockchain Printer Distributed Denial of Service Regulations Online Currency Micrsooft SharePoint LiFi Gaming Console Time Management Tip of the week Emails Staffing Audit Content Management Computing Emergency Access Evernote Visible Light Communication Best Available Virtual Assistant Music Computer Care Deep Learning Printing Public Speaking Vulnerability Value Spyware Data Warehousing Advertising File Sharing Securty Computer Accessories Keyboard Read Touchscreen Hard Drive Disposal Black Market Downloads Archive Streaming Media Bluetooth Storage Hacker Risk Mangaement Business Technology Cache Windows Server 2008 Politics Electronic Payment Shortcut Websites Fiber-Optic Data Protection Google Calendar Settings IP Address Assessment Windows 7 Permissions Public Cloud Displays Fraud Google Wallet Corporate Profile Technology Tips switches Troubleshooting Augmented Reality Knowledge Consultation Freedom of Information Processors CIO Upgrades LinkedIn Trending email scam Drones VoIP Business Owner Skype Tech Terms Bata Backup News How To PDF Human Resources User Error Computer Repair Competition Vulnerabilities Cabling Capital Mobile Technology IT consulting Inbound Marketing USB Co-Managed IT Entrepreneur Vendor Mangement Fake News Cleaning Sports Application Business Cards Worker Productuvuty Mobile Payment Windows XP Domains Product Reviews Router Business Mangement Microsoft Excel Society Sync Writing Customer Relationship Management Pain Points Licensing

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
      QR-Code