Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Innovation Microsoft Mobile Devices Data Recovery Productivity Computer Hardware Managed IT Services IT Support Small Business Google Upgrade Business Continuity Cloud Computing Backup Cybersecurity Collaboration Ransomware Phishing Tech Term User Tips Communication Disaster Recovery Smartphone Managed Service Provider Managed IT Services Workplace Tips Business Management Windows 10 Smartphones Internet of Things Mobile Device VoIP Android Paperless Office Data Management Remote Monitoring Social Media Quick Tips Managed Service communications Facebook Browser Encryption Managed IT Office 365 Windows Artificial Intelligence Network Saving Money Server Save Money Windows 10 Business Technology Virtualization BDR Miscellaneous Passwords Holiday BYOD Help Desk Wi-Fi Risk Management Compliance Health App Government Microsoft Office Document Management Automation Windows 7 Users Vendor Management Training Password Healthcare Apps Remote Work Mobile Device Management Gmail Employer-Employee Relationship Firewall Office Data Security Applications Unified Threat Management Big Data Recovery Bring Your Own Device Chrome Going Green Avoiding Downtime Bandwidth Laptops Robot Analytics Telephone Systems Content Filtering SaaS Regulations Apple Infrastructure Covid-19 Information Computers Data loss Vulnerability Storage Money Computing Data storage Processor Two-factor Authentication Information Technology IT Management Wireless Hosted Solution Website Redundancy Tip of the week Scam Mobility Antivirus Blockchain File Sharing Project Management Tablet VPN Access Control Meetings Customer Relationship Management Files IT Service Hard Drive Social IoT Virtual Private Network Gadgets Politics OneDrive Unified Communications Company Culture Work/Life Balance Software as a Service RMM Flexibility Budget Router Downtime Maintenance Customer Service Operating System Proactive Printing Virtual Reality Employee-Employer Relationship Machine Learning Remote Computing Settings Cooperation Business Growth Display Social Network Remote Workers Time Management Networking End of Support Patch Management Mobile Security File Management Sports Mobile Computing Hacker Data Breach Monitors Network Management Payment Cards Electronic Medical Records Solid State Drive Private Cloud Alert Assessment Wireless Technology Legal Tech Support Current Events Electronic Health Records Augmented Reality Employees Server Management Dark Web Co-Managed IT Monitoring How To Mobile Office Digital Payment How To Samsung Consultation Professional Services Managed Services Uninterrupted Power Supply The Internet of Things Websites Identity Theft Spam Recycling Licensing YouTube Chromebook WiFi Utility Computing Consulting Smart Technology Bitcoin Word Search Net Neutrality Remote Worker Mouse Data Storage Administration Outlook Managed Services Provider Upgrades LiFi Education Google Drive Remote Monitoring and Management Internet Exlporer Twitter Management HIPAA IT solutions Return on Investment 3D Printing Google Wallet Vulnerabilities Authentication Heating/Cooling IT Consulting Remote Working Managed IT Service San Diego Teamwork Connectivity Enterprise Resource Planning Bookmarks Specifications Crowdsourcing Database Sensors Hard Drives Google Docs WPA3 Financial WannaCry Database Management Supercomputer Shadow IT Processors Legislation IT Technicians Notes G Suite Office Tips History Permission Hacking Permissions Nanotechnology Options Tracking Holidays Humor Features SharePoint Staff Active Directory Google Maps Unsupported Software Virus Drones Geography Authorization Servers Break Fix Social Networking Shared resources Taxes Windows Server 2008 Update Marketing Backups Deep Learning Mobile Favorites Black Friday Roanoke — Central Technology Solutions Voice over Internet Protocol Fleet Tracking Procurement Unified Threat Management Hotspot GDPR IT Budget Outsourcing Buisness Mirgation PowerPoint Value of Managed Services Cabling Test Disaster Trending Fraud Screen Reader 5G Social Engineering IT USB Cache Downloads Windows Server Mobile Data Alt Codes High-Speed Internet Technology Laws Peripheral Motherboard Star Wars Mail Merge Conferencing Touchscreen Techology Cyber Monday technology services provider Point of Sale Telephone Cryptocurrency Asset Tracking VoIP Sponsor User Error Language Video Conferencing Lenovo Migration Cybercrime Dark Data Personal Information MSP Smart Tech Wireless Internet Safety Business Telephone Cyberattacks Operations Security Cameras Sync User Management Typing Development Zero-Day Threat Statistics PCI DSS Data Warehousing Telephony Manufacturing Optimization Hacks Address Biometric Notifications Best Practice Managing Stress Instant Messaging Disaster Resistance Outsource IT Technology Assurance Group ’s 18 Law Enforcement Transportation Mobile VoIP OneNote Digital Obstacle Computing Infrastructure Public Cloud Superfish Technology Tips Chatbots Virtual Assistant Travel Vendor Tech Terms Botnet Employer/Employee Relationships IT Assessment Black Market eWaste Read Only Multi-Factor Security Wearable Technology Mobile Device Managment Batteries Software Tips Cables Backup and Disaster Recovery Bluetooth Microsoft Excel Modem Hard Disk Drives Writing Virtual Machines Emoji Projects Computer Care Gamification Enterprise Content Management Finance Proactive IT Laptop Distributed Denial of Service Annual Convention Gadget Network Congestion Cyber security Windows 8 Save Time Spyware Course Printer Alerts Automobile Comparison Identity Wasting Time Smart Devices Computer Repair Virtual Desktop Identities Theft Shortcut Proactive Maintenance Digitize Google Calendar ROI Physical Security Wires Human Error Cookies Solid State Drives GPS Retail Credit Cards Cortana Cost Management E-Commerce Firefox Administrator CCTV Relocation Emergency CrashOverride Webcam Regulation IT Consultant Error Web Server Students Cameras Printers Motion Sickness Hard Disk Drive CRM