ES Consulting Blog

ES Consulting, based out of Ohio, has been serving the US since 2001, providing IT Support services such as technical helpdesk support, computer infrastructure support, and IT consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

0 Comments
Continue reading

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

Windows is perhaps the most widely-used computing tool in the workplace, and as such, it remains a huge target for hackers of all kinds. Criminals are always trying to uncover vulnerabilities in the operating system, but this time around, Microsoft has truly outdone themselves. Windows 10’s built-in security, according to hackers at the Black Hat conference in Las Vegas, allows for the most secure Windows operating system in several years.

0 Comments
Continue reading

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

0 Comments
Continue reading

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

0 Comments
Continue reading

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Saving Money Malware Tablet VPN Managed Service Provider App Internet Network Security Mobile Office Teamwork Health Big Data Managed IT Services User Mobility Hard Drives Wireless Innovation Update Internet Exlporer Touchpad Social Engineering Unified Threat Management Wireless Technology Legal Holiday Mouse Humor iPhone Two-factor Authentication Productivity Cybercrime Avoiding Downtime Disaster Spam Maintenance Efficiency Remote Monitoring Remote Computing User Tips WiFi Analytics Lithium-ion battery Proactive IT Bloatware Hosted Solution Robot Tip of the Week Workplace Tips Shortcut IT Support Going Green Internet of Things IT Services Data Disaster Recovery IT solutions Science Hacking Cloud SharePoint Virtual Reality End of Support Ransomware Benefits Upgrade Gadgets Excel Hardware Hosted Solutions Browser Information Technology Text Messaging Smartphones Apple Passwords Laptop Small Business Applications Storage Server Scalability User Error Apps Human Resources Business Management Business Computing Privacy Advertising BYOD VOIP Collaboration Reputation Router Trending Law Enforcement Wearable Technology Money Streaming Media Mobile Devices Network Personal Information Private Cloud Firewall Bring Your Own Device Education Cost Management Office 365 Computer Security Administrator Network Congestion Microsoft Best Practice Mobile Device Management Password Best Available Access Data Management Uninterrupted Power Supply HaaS Communication Fax Server History Telephony Computers Windows 10 Congratulations Social Customer Relationship Management Software Risk Management Relocation Tech Support The Internet of Things Files How To Gmail Android Office Tips Smartphone Alert Bluetooth Office Chrome Current Events Recovery Biometrics Bandwidth Retail Saving Time Automation intranet Budget Meetings Google communications Employer-Employee Relationship Flexibility Save Money Backup Customer Service Computer Accessories Government Marketing Thank You Social Media Windows Chromecast Facebook Television PDF Sports Phishing DDoS Hackers Telephone Systems Google Drive Mobile Computing Best Practices Data storage Search Miscellaneous Antivirus Black Market Email Transportation eWaste Business Operating System Running Cable Quick Tips Artificial Intelligence Application Business Continuity Networking Technology Branding Distributed Denial of Service Virtualization Microsoft Office

Blog Archive

2016
February
March
April
May
June
July
October
November
December
2014
January
February
March
April
May
June
August
September
October
November
December