Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

0 Comment
Continue reading

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

0 Comment
Continue reading

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

0 Comment
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comment
Continue reading

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Innovation Microsoft Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services IT Support Small Business Google Upgrade Business Continuity Cloud Computing Ransomware Backup Cybersecurity Phishing Collaboration User Tips Communication Tech Term Smartphone Managed Service Provider Managed IT Services Disaster Recovery Business Management Workplace Tips Windows 10 Smartphones Internet of Things Mobile Device VoIP Android Data Management Paperless Office Social Media Remote Monitoring Quick Tips communications Facebook Browser Encryption Managed IT Managed Service Artificial Intelligence Windows Office 365 Network Server Save Money Windows 10 Miscellaneous Virtualization Saving Money BDR Compliance Passwords BYOD Holiday Business Technology Risk Management Help Desk Wi-Fi App Health Government Windows 7 Microsoft Office Healthcare Document Management Users Automation Vendor Management Password Remote Work Training Apps Mobile Device Management Robot Gmail Firewall Employer-Employee Relationship Applications Office Big Data Unified Threat Management Data Security Bring Your Own Device Chrome Going Green Laptops Recovery Bandwidth Avoiding Downtime Analytics Content Filtering Scam File Sharing Project Management Antivirus Telephone Systems Apple SaaS Regulations Infrastructure Processor Data loss Vulnerability Two-factor Authentication Money Computers Computing Storage Data storage Information Technology Wireless Hosted Solution Website Blockchain Information IT Management Redundancy Tip of the week Mobility Tablet Company Culture VPN Meetings RMM Files Social Customer Relationship Management Gadgets OneDrive IT Service Virtual Private Network Software as a Service Proactive Router Unified Communications Employee-Employer Relationship Politics Maintenance Work/Life Balance Covid-19 Budget Downtime Printing Flexibility Operating System Hard Drive Access Control IoT Customer Service Remote Computing Settings Virtual Reality Machine Learning Twitter Monitoring Business Growth File Management Employees Mobile Computing Data Storage Recycling Payment Cards Display Sports Patch Management Augmented Reality Utility Computing Consulting Hacker Time Management Networking End of Support Dark Web Solid State Drive Co-Managed IT Private Cloud Current Events Wireless Technology Legal Data Breach Monitors The Internet of Things Alert Managed Services Provider Professional Services Managed Services Network Management Electronic Medical Records Tech Support Assessment Smart Technology Remote Monitoring and Management Digital Payment How To Management Server Management Net Neutrality Spam How To Samsung YouTube WiFi Websites Identity Theft Remote Workers Licensing Remote Worker Consultation Bitcoin Uninterrupted Power Supply Chromebook Internet Exlporer Outlook HIPAA Mouse Administration Cooperation LiFi Mobile Office Education Word Search Google Drive Social Network Mobile Security Upgrades Electronic Health Records IT solutions Shortcut SharePoint Staff Outsource IT Star Wars Google Wallet Notes Computer Repair Break Fix Social Networking High-Speed Internet GPS Options Holidays Asset Tracking Active Directory Firefox Physical Security Black Friday Roanoke — Central Technology Solutions Conferencing Hard Drives Google Docs Shared resources Windows Server 2008 Retail Cortana Unified Threat Management Hotspot Supercomputer Humor GDPR Outsourcing 3D Printing Mirgation Cyberattacks Crowdsourcing Voice over Internet Protocol Heating/Cooling IT Consulting Fraud Screen Reader MSP IT WannaCry Processors Downloads Laptop G Suite History Drones PowerPoint Value of Managed Services Marketing Motherboard Development Zero-Day Threat Tracking Backups 5G OneNote Deep Learning Google Maps Windows Server Office Tips Cyber Monday technology services provider Managing Stress Instant Messaging Taxes Hacking User Error Language Buisness IT Budget Video Conferencing Unsupported Software Virus Migration eWaste Read Only Telephone Servers Update Smart Tech Tech Terms Wireless Internet Business Telephone Operations Remote Working Alt Codes Cabling Data Warehousing Cables Backup and Disaster Recovery Security Cameras User Management Technology Assurance Group ’s 18 Enterprise Content Management Finance Cryptocurrency Manufacturing Optimization Disaster Trending Social Engineering USB Computing Infrastructure Theft Biometric Mail Merge Mobile Data Technology Tips Chatbots Point of Sale Transportation Mobile VoIP Technology Laws Employer/Employee Relationships IT Assessment VoIP Sponsor Multi-Factor Security Wearable Technology Cost Management E-Commerce Cybercrime Typing Virtual Assistant Vendor Touchscreen Techology Microsoft Excel Modem Wires Human Error Hacks Printer Alerts Connectivity Sync Best Practice Batteries Lenovo Dark Data Personal Information Distributed Denial of Service Annual Convention Vulnerabilities Authentication Telephony Hard Disk Drives Virtual Machines Safety WPA3 Financial Public Cloud Projects Gamification Address Comparison Identity Enterprise Resource Planning Bookmarks Law Enforcement Cyber security Statistics Proactive Maintenance Digitize Digital Obstacle Notifications Google Calendar Peripheral Features Travel Wasting Time Smart Devices Disaster Resistance Cookies Permission Botnet Black Market Mobile Device Managment Software Tips ROI Superfish Managed IT Service San Diego Geography Authorization Windows 8 Save Time Solid State Drives Credit Cards Fleet Tracking Procurement Automobile Computer Care Return on Investment Specifications Virtual Desktop Mobile Favorites Gadget Identities Teamwork Bluetooth Writing Emoji Database Management Shadow IT Spyware Course Legislation IT Technicians PCI DSS Cache Database Sensors Proactive IT Network Congestion Permissions Nanotechnology Test Hard Disk Drive Administrator CCTV Relocation Emergency CrashOverride CRM Webcam IT Consultant Error Printers Web Server Students Cameras Motion Sickness Regulation