Remote Utilities Blog


5 Things you Need to Know about Phone Support Scams

5 Things you Need to Know about Phone Support Scams

Hello and welcome! Today I’m going to write about phone support scams – phone calls from people who pretend to be representatives of big-name firms like Microsoft or Facebook. These calls originate from various countries, including the U.S., and there are things you should be aware of to avoid falling victim to scammers.

by Conrad Sallian, Nov 13, 2014

Continue reading

When a Computer Virus Infects a Remote Network

When a Computer Virus Infects a Remote Network

What happens when, no matter how careful you are, a large-scale virus hits your network? Computer security is one of the most important things you can focus on in any business, but even the best security can get compromised. Just as important as knowing how to prevent computer viruses is knowing what you can do when your network becomes infected. With remote networking, where many different devices can be affected, this becomes even more important.

by Antony , May 14, 2014

Continue reading

How Does Heartbleed Affect your Business Network?

How Does Heartbleed Affect your Business Network?

The Heartbleed virus has struck websites across the world and put people's online security at risk. While the phenomenon has created a mass panic, there are still a lot of people who don't know what Heartbleed is or how it might affect them. Here's a quick description of what the virus does, how it might affect your network, and what you can do to make sure your business network remains as safe as possible with a minimum of risk moving forward.

by Antony , Apr 23, 2014

Continue reading

Evaluating your Cloud Security

Evaluating your Cloud Security

So you’ve made the move to cloud computing, but you’re hearing all sorts of rumbles about security issues. What do you do? Because cloud storage involves making access to the information you’re storing easier for employees on the goal and because most people who use cloud computing go through a third-party managed services provider, there is always a concern about data security. To make sure your information is secure, follow these tips when getting onto the cloud.

by Antony , Apr 9, 2014

Continue reading

Protecting your Network with a Business Continuity Plan

Protecting your Network with a Business Continuity Plan

Where would your business be if disaster struck tomorrow? If the physical servers are destroyed in a fire or other disaster, how would you get your network back up and running? To protect your business in a worst-case scenario, you should have a Business Continuity Plan, or BCP for short. A BCP will make sure that you are prepared to reassemble your network and get things running again when other businesses would be crippled by a major disaster.

by Antony , Dec 4, 2013

Continue reading

Know Thy Enemy: Common Computer Viruses and how to Avoid Them

Know Thy Enemy: Common Computer Viruses and how to Avoid Them

Nothing can cripple a network as thoroughly as a computer virus can. Having good firewall and virus protection software can help prevent your network from picking up these viruses, but it also helps to know more about the dangers out there. If you can recognize the behavior of specific types of viruses, that can help you avoid more dangers and find a cure faster in the unfortunate case that you wind up with this type of malware on your computer.

by Antony , Oct 30, 2013

Continue reading

5 Tips that will Boost your Network Security

5 Tips that will Boost your Network Security

How good is your network security? Many people assume that it’s fine because they haven’t had to deal with viruses or malicious attacks, but you might be more unprotected than you think. If you use remote utilities and require a functional network at all times, you should take the steps outlined below to protect yourself. Not only will this keep you safe from viruses, but it will also protect against other malicious attacks that might slow your network down.

by Antony , Aug 29, 2013

Continue reading

Backing up Data on a Small Network: Dos and Don’ts

Backing up Data on a Small Network: Dos and Don’ts

Backing up your data is important, and handling data on a small network presents unique challenges. Rather than try to handle a small network in a way that isn’t custom tailored to your needs, it’s better to put together a customized protocol. When you’re planning out the data backup on your small network, keep the follows dos and don’ts in mind. This advice will help save you a lot of headaches in the long run.

by Antony , Jul 24, 2013

Continue reading

Guide to Virtual Private Networks

Guide to Virtual Private Networks

Imagine leaving your home wearing a clearly legible sign around your neck that provides all of your most important and private information: your name, address, contact information, banking and other financial data, all of your shopping habits, places you frequent and what you do while you are there. Most of us would not want to share this information with complete strangers, for many obvious reasons. This data can put you at risk in any number of ways, including potential theft and physical harm. Yet, that is exactly what many people do every time they use internet.

by Conrad Sallian, Jun 19, 2013

Continue reading

A Brief Overview of the Windows Built In Firewall

A Brief Overview of the Windows Built In Firewall

Windows has had a built in firewall since Windows XP, and maintained that feature during transitions to Vista, Windows 7, and Windows 8. The goal of the firewall is to enhance security for users, particularly those who are not thoroughly experienced with potential online hazards. Some more advanced users consider the Windows firewall to be a bit too cumbersome. This guide will give you a quick rundown on the firewall and when it should and should not be used.

by Antony , Jun 5, 2013

Continue reading

7 Tips to Secure Your Network

7 Tips to Secure Your Network

The Internet has created a vast network for business that has improved communications and operations exponentially. Unfortunately, the Internet has also created a new environment primed for security threats and cybercrime. A network attack can result in consequences that may range from being mildly troublesome to completely debilitating. Businesses have faced the loss of important data, privacy violations, and hours or sometimes days, of network downtime.

by Conrad Sallian, Jun 1, 2013

Continue reading

Potential Storms on the Cloud

Potential Storms on the Cloud

Cloud computing, the delivery of computer hardware and software services over the internet, is being hailed as THE solution for many business IT challenges. There are many advantages to Cloud computing, including data storage, mobile access, potential savings in system hardware and more. However, there are many disadvantages to Cloud computing as well. Depending on your needs, the best solution for your business may be to stick with a more traditional product delivery. Before you throw caution to the winds and dedicate your IT needs to the Cloud, it is important to understand the weaknesses of the Cloud and how these may affect your business.

by Conrad Sallian, Apr 16, 2013

Continue reading

RATs Pest Control

RATs Pest Control

Throughout history, rats have been regarded as filthy vermin responsible for damaging property, destroying food, and spreading parasites and diseases that have caused great devastation. At the slightest sign of a rat infestation, most people act immediately to eliminate the invading pests and prevent future intrusion, damage and risk.

by Conrad Sallian, Mar 26, 2013

Continue reading