About admin

This author has not yet filled in any details.
So far admin has created 22 blog entries.

10th Annual MSP 501 Ranking Results Are In

By |2017-07-26T13:58:19-05:00June 22nd, 2017|Categories: Creative|Tags: , , |

Rouse Consulting Group, Inc. Ranked Among Top 501 Managed Service Providers in the World by MSPmentor 10th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology June 21, 2017: Rouse Consulting Group, Inc. ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 [...]

Yahoo Hack – What you and your users need to know

By |2016-10-10T12:22:17-05:00October 10th, 2016|Categories: Cyber Security, Network|

Yahoo announced that 500 million of their accounts were hacked and are sold by internet criminals. Bad guys are going to use this information in a variety of ways. For instance, they will send phishing emails claiming you need to change your Yahoo account, looking just like the real ones.   Here is what I [...]

Cyber Security Scam of the Week Alert: New Social Security Account Fraud

By |2016-09-12T12:45:53-05:00August 15th, 2016|Categories: Cyber Security|Tags: |

There are two Social Security scams you need to watch out for at the moment. The first one is where you receive an official-looking email from the Social Security Administration with an invite to create an account so you can receive your benefits.  You land on a webpage where the scammers hope you will fill [...]

Why is content filtering important?

By |2016-10-27T15:52:34-05:00August 12th, 2016|Categories: Network|Tags: , |

by:  Matthew Haring Content filtering is a program that help system administrators decide which content is acceptable for viewing and accessing. The content filters prevent people in the network from accessing certain types of material (content) on the internet. Content filters are majorly used by businesses and organization to block access non-work related websites including [...]

What is Your Biggest Security Threat?

By |2018-11-28T11:34:11-06:00July 13th, 2016|Categories: Security|

  by: Matt Haring There’s a lot of talk about hackers gaining access to computers, mobile devices, and networks. This talk should not be ignored, but one of the biggest security threats is small businesses using poor passwords. Keeping an organization secure is no longer just the IT team’s job. Today’s digitally connected workplace requires [...]

Backing Up Your Data at Home

By |2016-10-31T15:00:33-05:00June 8th, 2016|Categories: Backup|

by: Matt Haring Everyone loses data at some point in their lives. Your computer’s hard drive could fail tomorrow, ransomware could hold your files hostage, or a software bug could delete your important files. If you are not regularly backing up your computer, you could lose those files forever. Backups don’t have to be hard or confusing, though. You’ve probably heard [...]

Cryptoworms: The Future of Ransomware

By |2016-10-27T15:52:34-05:00May 13th, 2016|Categories: Uncategorized|

by: Matt Haring   If you haven’t embraced backups yet because you think you are so tech savvy that you wouldn’t open spam email or fall for social engineering tricks, then brace yourself for cryptoworms. Security researchers warned that self-propagating ransomware, the semi-autonomous kind that doesn’t need any help from humans to spread, is coming [...]

How to Avoid Infections

By |2016-10-27T15:52:34-05:00April 11th, 2016|Categories: Uncategorized|

by: Matt Haring Malware is used when describing software that can cause issues ranging from computer crashes to identity theft. While this is a two-part strategy, you are the biggest factor in keeping yourself safe. Keeping Yourself Safer with Smarter Behavior You are the single biggest factor in preventing a malware infection on your PC. [...]

Counter Terrorism and Fraud Prevention

By |2016-10-27T15:52:34-05:00March 17th, 2016|Categories: Uncategorized|

The world of fraud prevention (and information security in general), is characterized by an arms race between the good guys and the bad guys. Security companies and financial institutions develop solutions, procedures and policies to thwart fraud attempts, while fraudsters develop the tools and techniques to circumvent these systems. If a certain fraudulent activity is [...]