Will Your Website Be Hacked Next?

At ExcalTech we design, host, update and secure websites.  We constantly stress to our clients the importance of keeping their websites up to date in the following ways: Ensure that your CMS (content management system) is running on the latest version Ensure that your website software and plug-ins are running on the latest version Ensure …

Will Your Website Be Hacked Next? Read More »

5 Steps You Can Take to Foil the Plans of Hackers

Hackers have the ability to cripple systems and steal important (or sensitive) data, and if you’re not careful your business could become their latest victim. Here are five ways that you can make it more difficult for hackers to infiltrate your systems and steal your data. Protect Important Security Credentials Hackers naturally target the credentials …

5 Steps You Can Take to Foil the Plans of Hackers Read More »

Prevent Being Taken By Familiarizing Yourself With These 4 Social Engineering Scams

Did you know that some of the most successful hackers actually know very little about computer coding? In many cases, a hacker simply tricking someone into handing over their personal information works out even better for them. This is a tactic known as social engineering, and the only way to defend against it is to …

Prevent Being Taken By Familiarizing Yourself With These 4 Social Engineering Scams Read More »

Hospital Pays $17,000.00 To Get Encrypted Data Back

A hospital in CA had to pay hackers a sum of over $17,000.00 in ransom money to get their encrypted data back. http://bit.ly/1KsQaS2 This is just another example of the proliferation of cyber crime and how easily it is to fall victim to hackers.  Don’t let this happen to you – call ExcalTech today!  We …

Hospital Pays $17,000.00 To Get Encrypted Data Back Read More »

Man-In-the-Middle Attacks Find App Users Off Guard

The Internet of Things is practically omnipresent in today’s environment, and many commercial products not only connect to the Internet, but they also come with an app. Due to this type of integration growing more popular, the world is starting to see Internet-connected products that really don’t have much to gain from their connectivity. One …

Man-In-the-Middle Attacks Find App Users Off Guard Read More »

Scroll to Top