Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

0 Comment
Continue reading

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

0 Comment
Continue reading

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

0 Comment
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comment
Continue reading

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Data Network Security Privacy IT Services Email Malware Data Backup Internet Hackers Software Outsourced IT Microsoft Innovation Business IT Support Computer Productivity Managed IT Services Data Recovery Efficiency Mobile Devices IT Support Hardware Upgrade Cloud Computing Ransomware Google Backup Phishing Small Business Tech Term User Tips Business Continuity Communication Collaboration Cybersecurity Windows 10 Managed IT Services Workplace Tips Managed Service Provider Internet of Things Business Management VoIP Smartphone Smartphones Android Disaster Recovery Data Management Remote Monitoring Paperless Office Social Media communications Facebook Managed IT Save Money Artificial Intelligence Windows 10 Server Managed Service Windows Office 365 Encryption Quick Tips Mobile Device Miscellaneous BDR Network Browser Virtualization Saving Money Holiday Help Desk Wi-Fi Risk Management BYOD Passwords Government Document Management Healthcare Compliance Apps Business Technology Vendor Management App Password Automation Mobile Device Management Bandwidth Firewall Avoiding Downtime Unified Threat Management Employer-Employee Relationship Robot Gmail Bring Your Own Device Going Green Training Microsoft Office Big Data Windows 7 Recovery Chrome Analytics Laptops Applications Redundancy Tip of the week Apple Scam Hosted Solution Project Management Antivirus Website Infrastructure Money SaaS Data storage Telephone Systems Content Filtering Data loss Vulnerability Blockchain Information Wireless Computers Processor File Sharing Users IT Management Downtime Customer Service Software as a Service Router Social Two-factor Authentication Politics Virtual Reality Maintenance Work/Life Balance VPN Customer Relationship Management Computing Data Security Regulations Office IT Service IoT Access Control Information Technology Machine Learning Mobility Operating System Printing Gadgets OneDrive Storage Tablet RMM Unified Communications Remote Computing Settings Files Chromebook WiFi Dark Web Flexibility YouTube Augmented Reality Business Growth Private Cloud Proactive Tech Support The Internet of Things Mobile Computing Managed Services Provider Administration Employee-Employer Relationship Hacker Education Smart Technology Digital Payment Solid State Drive Remote Monitoring and Management Upgrades LiFi Management Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality Current Events Patch Management Social Network IT solutions Licensing Remote Workers Display File Management Virtual Private Network Network Management Internet Exlporer Hard Drive End of Support Health Budget Assessment Sports Payment Cards HIPAA Monitors Bitcoin Server Management Cooperation How To Co-Managed IT Alert Mobile Security Electronic Health Records Electronic Medical Records Mouse Employees Consultation Outlook Monitoring Uninterrupted Power Supply Professional Services Company Culture Google Drive How To Samsung Meetings Recycling Spam Utility Computing Consulting Word Search Instant Messaging Employer/Employee Relationships IT Assessment Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads Taxes Google Wallet Managing Stress Hard Disk Drives Virtual Machines Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language eWaste Read Only Spyware Course Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Shortcut Cyber security Migration Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Digitize Data Warehousing Backups Wasting Time Smart Devices Operations Drones Solid State Drives Credit Cards Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Deep Learning Network Congestion Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Computer Repair Teamwork Virtual Desktop Technology Tips Vulnerabilities Authentication Retail Cortana Database Management Shadow IT Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Sensors Multi-Factor Security Wearable Technology Telephony Alt Codes Options Holidays Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Comparison Identity Botnet Permission Processors Active Directory Travel Features Shared resources Windows Server 2008 Typing Geography Authorization GDPR Outsourcing Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Mail Merge Update Marketing 5G IT Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Gadget Best Practice Mobile Favorites Specifications Test Touchscreen Techology Buisness Windows Server Cache VoIP Sponsor High-Speed Internet Lenovo Social Engineering USB Video Conferencing Permissions Nanotechnology Star Wars Telephone Legislation IT Technicians GPS Address Wireless Internet Business Telephone Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Conferencing Manufacturing Optimization Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Cyberattacks Digital Obstacle Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Dark Data Personal Information Transportation Mobile VoIP Mirgation Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation