Blog

BREAKING NEWS! Petya Ransomware Spreading Like Wildfire

On June 27 at approximately 10:30 UTC, a new ransomware family began propagating across multiple countries. The family, referred to as PetrWrap, is noteworthy because it combines traditional ransomware behavior with stealthy propagation techniques and a destructive attack element. This is PetrWrap, a new ransomware tool built from the bones of Petya, which held users’ files for “ransom” and demanded usually egregious payment in exchange for the encryption key earlier this spring. Without getting too deep in the weeds, PetrWrap [...]

Backlit_keyboard

IT Security – Survey Says A Third of SMBs Ready

A new report put out by webroot, in partnership with wakefield research, shows that small to medium businesses are not prepared to tackle their own it security. The report states that the IT security issues plaguing most SMBs are:LIMITED MANPOWER. Many small to medium business have a limited IT department at best. This spreads what IT team you may have too thin. It also doesn’t allow for proper attention to every aspect of security. In today’s world of ever-evolving security attacks, this [...]

YouTube DOWN – Not Working for Thousands of Streamers

YouTube is down for thousands and it seems that it is rolling through other parts of the country….Here in Southwest Florida. It just went down at 9:38am and has been down during the writing of this article. We will keep you posted on the outcome. But we are sure it will be resolved in a few minutes. Independent website Down Detector, which measures social mentions around a certain topic to track outages across the globe, shows problems throughout the UK [...]

Cryptowall – A new threat for 2017

CryptoWall 4.0 hitting Southwest Florida hardWhile we’ve been hard at work servicing the IT needs of Southwest Florida (and redesigning the website), hackers have been hard at work. Around mid December, a new threat was released that’s been creating havoc for anyone who catches it. This piece of malware is called CryptoWall 4.0. It’s the newest update to a particularly nasty trojan — a class of malware that convinces the user to download and run it. CryptoWall is part of [...]

Three ways to speed up your computer

We get several calls every week that someone’s computer is running slowly.  Usually, there’s a few things that we do that aren’t difficult for any end user to do.  In fact, some need the end user to do them because we can’t.  This article will cover some of the basic steps we take to speed up a computer; its not complete and if you don’t feel comfortable, always consult a professional. The first is universal: clean up your desktop.  If [...]

The Best Email Apps for your Smartphone

For a lot of us, our smartphone is our main interface for checking emails, but the mail app that comes with our phones is not often the best to deliver the features that we need. Luckily for us, there is plenty of alternatives. Just recently, Google came out with an app that was meant to make managing Gmail easier. It is a very pretty looking app but Inbox has yet to find flavor with all of its users. I have created [...]

From Werk’s Desk: Have you heard of our new gizmo and gadgets?

Have you heard of our new gizmo and gadgets? Good day everyone! I hope you all are having a fabulous day as I am. Today, I would love to share with you the new gizmo and gadgets we have here at Computers That Werk and how it is helping our customers. Bomgar Remote Support Assistance This year we have added Bomgar into our line of remote support assistance. We have always had remote support software in order to help all of our [...]

WannaCry Ransomware Cyberattack Screenshot - Computers That Werk

Keeping Up with the WannaCry Ransomware Attack

Video Courtesy of C|Net What is WannaCry?  WannaCry is classified as ransomware. Ransomware is a type of hacking attack known for holding user’s computers hostage until some ransom has been met. The ransom usually asks for Bitcoin, a type of currency that is untraceable.   How does WannaCry ransomware work? Upon infecting a computer, it encrypts all the data on a computer. This locks the computer down. The attack then posts a screen demanding you pay to regain access to your files. According to CNet’s [...]

website-recovery

How Do I Get My Website Back?

Sadly, while working in the web design & hosting industry, we have heard our fair share of horror stories from clients about previous encounters with designers or hosting companies not delivering on promises and even “locking” clients out of their websites. While we won’t give you legal advise, we can tell you how to get the keys BACK in your pocket and, with some foresight and due diligence, how to keep the keys to your castle. Regaining access to a hostage or [...]

Cybersecurity-Word-Cloud

Small Businesses are Big Fish

The high cost of recovery from a Security Breach Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub-par IT services that in the long run can end up costing the company even more money. Reacting to; and the recovery from, a security breach or [...]