ES Consulting Blog

ES Consulting, based out of Ohio, has been serving the US since 2001, providing IT Support services such as technical helpdesk support, computer infrastructure support, and IT consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

0 Comments
Continue reading

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

Windows is perhaps the most widely-used computing tool in the workplace, and as such, it remains a huge target for hackers of all kinds. Criminals are always trying to uncover vulnerabilities in the operating system, but this time around, Microsoft has truly outdone themselves. Windows 10’s built-in security, according to hackers at the Black Hat conference in Las Vegas, allows for the most secure Windows operating system in several years.

0 Comments
Continue reading

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

0 Comments
Continue reading

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

0 Comments
Continue reading

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Wearable Technology Software Search intranet IT solutions Computers Data Browser Administrator IT Services Passwords Money Files Office Teamwork Hackers Social Engineering App Human Resources SharePoint eWaste Cybercrime Relocation Congratulations The Internet of Things Legal Password Applications Tablet Disaster Recovery Scalability Microsoft Government Saving Time Windows Bluetooth Benefits communications How To Storage Innovation DDoS Privacy Saving Money Firewall Internet Exlporer Cloud Meetings Internet Analytics Phishing IT Support Miscellaneous Uninterrupted Power Supply Facebook Office 365 Office Tips Flexibility Managed IT Services Excel Productivity Current Events Biometrics Mouse Security Running Cable Microsoft Office Save Money Apps Gmail Hard Drives Managed Service Provider Wireless Budget Thank You Chromecast PDF Hacking Hosted Solution Transportation BYOD Best Practice Update Best Practices Touchpad Employer-Employee Relationship Collaboration Big Data Business Management Risk Management Fax Server Law Enforcement Unified Threat Management Text Messaging Mobility Mobile Devices Operating System Android Education Mobile Office Virtualization Bloatware Black Market Mobile Device Management Social Media Hardware Backup Spam Laptop Router VOIP Bandwidth Telephone Systems Computer Accessories Trending VPN Alert Tip of the Week Information Technology Smartphones iPhone Smartphone Application Maintenance Robot Going Green Networking Social Apple Private Cloud Remote Computing Shortcut Upgrade Small Business Technology HaaS Network Security Cost Management Holiday Humor Lithium-ion battery Science Efficiency Customer Relationship Management Proactive IT Television Mobile Computing Reputation Marketing Hosted Solutions History Access Remote Monitoring Computer End of Support Workplace Tips Chrome Advertising Distributed Denial of Service Disaster Retail Antivirus User Telephony Business Continuity Network Streaming Media Two-factor Authentication Business Computing Artificial Intelligence Internet of Things Business Email Malware Server Customer Service Google Avoiding Downtime Gadgets Data Management Personal Information Wireless Technology User Error Communication User Tips Windows 10 Quick Tips Best Available Ransomware Tech Support Recovery Sports Automation Virtual Reality Google Drive Data storage Branding Network Congestion Health Bring Your Own Device WiFi

Blog Archive

2016
February
March
April
May
June
July
October
November
December
2014
January
February
March
April
May
June
August
September
October
November
December