707-258-1492    Get SUPPORT

FormaTech IT Services Blog

FormaTech IT Services has been serving the Napa area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Foil the Plans of Cybercriminals

How to Foil the Plans of Cybercriminals

We all understand that there are things we need to lock up in order to protect them. Houses, cars, businesses, all are protected with locks to keep those who shouldn’t be in them, out. Shouldn’t your network receive the same consideration?

0 Comments
Continue reading

Misconfigured Database Almost Suplexes the WWE

Misconfigured Database Almost Suplexes the WWE

If you’re a fan of the spectacle put on by World Wrestling Entertainment, Inc., you may find yourself pinned thanks to an error made in some of their databases. This error allowed personal information from three million users to be accessed by anyone who knew where to look.

0 Comments
Continue reading

Keep Your Guard Up Against VoIP Fraud

Keep Your Guard Up Against VoIP Fraud

As with all innovative technology, there is only a certain amount of time you’ll have until someone inevitably finds ways to exploit it. One such exploitation of a common technology that has flown under the radar and avoided widespread knowledge by users is VoIP fraud. VoIP fraud is no different than other cybercrime - the exploitation of a network or data to procure ill-gotten gains.

0 Comments
Continue reading

Why Both Halves Of Your Security Are Equally Important

Why Both Halves Of Your Security Are Equally Important

We talk about network security a lot, and for good reason. The majority of today’s businesses rely heavily on their information systems and there is plenty of danger presented by Internet-based threats. However, some organizations spend so much time worrying about cyber threats that they forget that physical threats exist outside the technology plane. Your organization needs to take steps toward securing its on-site premise, as well as the digital space in which your business exists.

0 Comments
Continue reading

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

When it comes to hacking and cybercrime, it can literally be a few seconds that will ruin your business. One single chink in your network’s armor is all it takes for your data to be compromised. Modern SMBs need to take every opportunity to ensure they’re using best practices to help keep their network safe and secure. Here’s a look at four network security bad habits that you and your team can fix today.

0 Comments
Continue reading

A Thorough Cybersecurity Strategy Begins with Knowing What You Are up Against

A Thorough Cybersecurity Strategy Begins with Knowing What You Are up Against

Since many modern businesses rely on technology, it becomes mandatory that they have an idea on how to best protect themselves against the myriad of threats that can be found online. Knowing what kind of threats that you may encounter is key to concocting a thorough cybersecurity strategy.

0 Comments
Continue reading

Are You Guilty of These Careless Security Flaws?

Are You Guilty of These Careless Security Flaws?

Did you know that a surprising number of data breaches are the result of insider threats? Insider threats are defined as data exposure, either malicious by nature or unintentional, that results from the actions of an employee in your workforce. With so many threats out there, it’s easy to forget that some of the most dangerous are right within your walls. How can you keep insider threats from becoming a major problem for your organization?

0 Comments
Continue reading

Are You Prepared for Cyber Threats? Many Businesses Aren’t

Are You Prepared for Cyber Threats? Many Businesses Aren’t

With so many breaches showing up in the headlines and their impact being felt across the world, one would think that businesses of all sizes would do more to protect their data against cybersecurity threats. A recent study has shown that this is unfortunately not the case.

0 Comments
Continue reading

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

0 Comments
Continue reading

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

0 Comments
Continue reading

Businesses Expected to Spend $96 Billion this Year on IT Security

Businesses Expected to Spend $96 Billion this Year on IT Security

A report by Gartner has provided evidence that security considerations are anticipated to see investments in 2018. So, if you were planning on focusing on your business’ information security this year, you certainly aren’t the only one.

0 Comments
Continue reading

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

0 Comments
Continue reading

IT Security Starts and Ends With Your Staff

IT Security Starts and Ends With Your Staff

We wish IT security was as simple as setting up a good firewall and installing an antivirus. We talk a lot about security solutions that cover a lot of your bases, such as our Unified Threat Management (UTM) system. While these enterprise-level solutions are important, any investment in protecting your network can be upended by a single act of user error.

0 Comments
Continue reading

Are You Able to Identify Malicious Links?

Are You Able to Identify Malicious Links?

The Internet is gaining quite the reputation as a dangerous place. It hosts countless threats, many of which hide behind links that shield their intentions. Considering how much is on the line for your business, you need to make sure that you know which links are safe to click on, and which ones are best left ignored.

0 Comments
Continue reading

There’s a New Internet Explorer Zero-Day Threat in Town

There’s a New Internet Explorer Zero-Day Threat in Town

Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.

0 Comments
Continue reading

How to Avoid Becoming the Next Data Security Cautionary Tale

How to Avoid Becoming the Next Data Security Cautionary Tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.

0 Comments
Continue reading

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

0 Comments
Continue reading

Understanding a Government’s Approach to IT

Understanding a Government’s Approach to IT

IT is important for more than just businesses. Governments and other similar organizations that handle top-secret information or important operations should also dedicate considerable resources to guaranteeing security and efficiency to the best of their ability. In the wake of so many dangerous entities, governments are having trouble keeping up with the latest trends, often at their own expense. What can your business learn from this development?

0 Comments
Continue reading

What to Expect of Ransomware this Year

What to Expect of Ransomware this Year

Ransomware exploded in 2017, and after a year with as much success as these attacks saw, it is no wonder that 2018 is expected to see more. However, in order to remain successful, ransomware will have to change and improve. In today’s blog, we explore a few predictions as to how this threat will do so.

0 Comments
Continue reading

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading