Ophtek
  • Office IT Services
    • Total IT Coverage
    • Office IT Security
    • HIPAA Compliant IT Services
    • Data Backup and Recovery
    • Office Network
    • Cloud Services for Business
    • Repairs and Support
    • IT Asset Management and Reporting
    • Microsoft 365 Consulting
  • Company
    • About
    • Team
    • Computers 4 Classrooms
  • Contact
  • Blog
  • Client Portal
    • Request Help
Select Page
The Best Ways to Create a Unique Password

The Best Ways to Create a Unique Password

by Ophtek, LLC | Nov 12, 2019 | Ophtek, Password Security, Security, Security Threats

We use passwords for so many different services and websites that we often resort to using the same password. But this approach is very dangerous. Think about it for a second. If your one and only password is compromised then every account you use is at risk. This...
How to Identify Fake and Scam Websites

How to Identify Fake and Scam Websites

by Ophtek, LLC | Nov 5, 2019 | fake websites, Hacking, malicious code, malicious websites, malware, Ophtek, scam websites

We use the internet on a daily basis and visit countless websites along the way. But they’re not always the real deal. And sometimes they can be malicious. The internet is a wonderful place and the websites that make it up can make a real difference to your business....
Healthcare Data Leak: The Cloud is still Not Secure

Healthcare Data Leak: The Cloud is still Not Secure

by Ophtek, LLC | Oct 29, 2019 | Cloud, Cloud Backup, Cloud Storage, Ophtek, Password Security, Security, Security Threats

Cloud computing is seen as the future of IT, but concerns regarding its security remain. A case in point is the Freedom Healthcare Staffing leak. Compromised data is always associated with various dangers and problems, but these are always magnified when the data at...
Reductor Malware Brings a New Threat to Data Security

Reductor Malware Brings a New Threat to Data Security

by Ophtek, LLC | Oct 22, 2019 | Data Security, Internet, malware, Ophtek, Security

Each time that malware evolves it becomes more dangerous. And our data becomes less secure. A case in point is the Reductor malware. We’re used to malware being used to download malicious files and open up remote access to infected PCs, but Reductor is different. It’s...
How Do Cookies Affect Your Cyber Security?

How Do Cookies Affect Your Cyber Security?

by Ophtek, LLC | Oct 15, 2019 | cookies, Ophtek, Security, Tracking

We’ve all seen a pop up on a website which asks you to accept cookies. And we tend to click yes. But do we know what we’re agreeing to? Cookies have been part of the internet since the dawn of the world wide web, but most internet users are unclear on what they are....
« Older Entries
Next Entries »

Latest IT Articles

Hello XD Ransomware is no Laughing Matter

Hello XD Ransomware is no Laughing Matter

Follina Exploit: A New Microsoft Office Vulnerability

Follina Exploit: A New Microsoft Office Vulnerability

Malicious Extension Found Being Injected into Chrome

Malicious Extension Found Being Injected into Chrome

How We Help Businesses

Get the Latest IT News

Success!

Subscribe

  • Follow
  • Follow
  • Follow