• Yahoo Data Theft – A Good Reason to Regularly Change Passwords

    Yahoo Data Theft – A Good Reason to Regularly Change Passwords

    In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]
  • Is Your Antivirus Protection Up to Speed?

    Is Your Antivirus Protection Up to Speed?

    It’s become an all-too-common occurrence: Cyberattack in the form of ransomware, resulting in major payouts to both hackers and in potential HIPAA fines. Ultimately, many of these increasing ransomware attacks are caused by a convincing-looking link embedded in official-looking emails. A healthcare employee or Business Associate (BA) of the hospital or healthcare facility casually clicks […]
  • Rogers.com Phishing Scam Highlights Website and Link Safety

    Rogers.com Phishing Scam Highlights Website and Link Safety

    A recent phishing, or click-bait scam involving an expired domain of a popular wireless tech website underscores once again how vigilant we all need to be when navigating the web and clicking on URLs. The “popular” website is Rogers.com (the safe domain!), which sells a variety of wireless technology goods and services, and which, in […]
  • Compunet Infotech Inc. Excited to be Named to CRN’s Fast Growth 150 List

    Compunet Infotech Inc. Excited to be Named to CRN’s Fast Growth 150 List

    North Vancouver IT Provider Receives Distinguished Accolade from Leading Industry Publication NORTH VANCOUVER, BC – September 19th 2016 – Compunet Infotech Inc. has been named to CRN’s Fast Growth 150 List for 2016. Published by the highly respected CRN Magazine, the list ranks the fastest growing solution providers, resellers, technology integrators and IT consultants in North […]
  • IT Services That Meet Your Business Computing Needs

    IT Services That Meet Your Business Computing Needs

    In our ever-changing world, you need IT services that match up to the rapid-fire changes in telecommunications and business computing interconnectivity. And, you want those services to be flexible, yet pro-active and responsive to your IT network’s particular design and demands. That’s why Compunet InfoTech is in business – to deliver you and your enterprise the […]
  • USB “Kill Drive” Will Literally Meltdown Any Computer It’s Plugged Into

    USB “Kill Drive” Will Literally Meltdown Any Computer It’s Plugged Into

    It sounds like the premise for a bad horror movie, but it’s not. The USB Kill Drive can reportedly fry an entire laptop or PC utilizing some kind of “worse-than-ransomware” nightmare program. It’s also known colloquially as a “kill stick,” and there are verified reports of this malicious USB drive being able to kill any […]
  • 5 Ways to Get Cyber Risk Assurance and Protects Your Assets

    5 Ways to Get Cyber Risk Assurance and Protects Your Assets

    Proper and careful cyber risk assessment and management allows you and your SMB enterprise the long-range assurance needed in order to plan and fulfill your business goals. Optimum security as well as performance tend to walk hand in hand with most IT networks, either because one is an outgrowth of the other, or because it […]
  • Useful Tips for Fighting Mac Malware

    Useful Tips for Fighting Mac Malware

    Mac owners have perhaps grown a bit complacent with cybersecurity over the years, the general thinking in the Apple-user camp being that Macs are safer from cyberattack than PCs. Though it may be true that Apple’s OS X has for the most part kept Mac users safer from cyberattack than their Windows/PC counterparts, that state […]
  • Black Hat Conference Discloses “Best” New Hacking Ideas to Be Afraid Of

    Black Hat Conference Discloses “Best” New Hacking Ideas to Be Afraid Of

    A Black Hat conference that took place in August in Las Vegas further underscored the need for everyone everywhere to have cutting-edge cybersecurity. Attendees consisted of more than 11,000 (well-meaning) hackers, who were there to display their best hacking skills and tricks in the name of better network security. The overall goal of the show […]
  • Is It Still Possible to Get a Free Windows 10 Upgrade?

    Is It Still Possible to Get a Free Windows 10 Upgrade?

    According to an August 3rd, 2016 article in ZDNet.com you can still reportedly get a free Windows 10 upgrade by using your Windows 7 or 8 product keys. Apparently Microsoft is so gung-ho about having all Windows users on board with their latest iteration of the Universally-popular operating system that they are willing to take […]
  • Preparing For World Architecture Day In 2016

    Preparing For World Architecture Day In 2016

    World Architecture Day is celebrated each year on the first Monday of October. According to the Union International des Architects (UIA), the day is to “remind the world of its collective responsibility for the future of the human habitat.” While many architects look forward to a day that celebrates their architectural achievements, not many as […]
  • The IT Implications of Hijacked Texas Traffic Signs

    The IT Implications of Hijacked Texas Traffic Signs

    In May of 2016, someone repeatedly hacked digital traffic information signs on a freeway under construction in North Dallas, Texas, infuriating TX DOT officials and entertaining motorists with such perplexing tidbits as: “Donald Trump is a shapeshifting lizard” and “Bernie Sanders for President”. The hacker-induced messages also included, “Party Hardy, Y’All” and “Work is Cancelled”. […]