Home

About Us

IT Services

Understanding IT

Events

Blog

Contact Us

Support

Accucom Blog

Accucom has been serving the Norwest Business Park area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Story Behind CrowdStrike’s “Largest IT Outage of All Time”

The Story Behind CrowdStrike’s “Largest IT Outage of All Time”

On Friday, July 18th, a global update—codenamed “Falcon”—to cybersecurity company CrowdStrike’s software triggered events that brought major infrastructures and societal needs to their knees… despite affecting less than one percent of all Windows systems.

Now that about one and a half weeks have passed, let’s check in and see what happened, both leading up to this event and in the days since.

0 Comments
Continue reading

Windows Defender Vs. Microsoft Defender for Business

Windows Defender Vs. Microsoft Defender for Business

Sometimes, it seems like the most complex aspect of modern technology is the naming conventions used by big vendors for all of their products. It’s a problem with consumer electronics, it’s a problem with enterprise products, and sometimes it feels like some companies make their products as confusing as possible on purpose… I’m looking at you, Microsoft.

When it comes to protecting your PC from viruses and malware, there should be zero confusion. Hopefully after this article you’ll have the confidence to make the right choice for your business.

0 Comments
Continue reading

Ticketmaster Got Hacked, and It’s One of the Biggest We’ve Ever Seen

Ticketmaster Got Hacked, and It’s One of the Biggest We’ve Ever Seen

You’ve more likely than not purchased a ticket through Ticketmaster at some point in your lifetime, so you might be interested to find out that Live Nation Entertainment—Ticketmaster’s parent company—has had to file an 8-K with the Security and Exchange Commission to admit that 1.3 terabytes of data had been hacked. The result is that more than 560 million customers’ personal information was stolen from company servers.

0 Comments
Continue reading

You’d Be Surprised What Can Be an Unsafe Google Search

You’d Be Surprised What Can Be an Unsafe Google Search

The Internet is pretty awesome. Unfortunately as much as it provides individuals and businesses, alike, it poses significant risks. Today, we thought we would discuss a security issue that not many people consider, Google searches, and how they can lead to cybersecurity problems. 

0 Comments
Continue reading

Mobile Malware is a Guaranteed Bad Time

Mobile Malware is a Guaranteed Bad Time

More often than not, the malware you encounter will target a desktop computer. Despite this, there are indeed some threats that target mobile devices, including one which Google had to remove from the Play Store for infecting smartphones with malware and adware. We recommend that you take immediate action to uninstall these apps if you were one of the unfortunate folks who accidentally installed them.

0 Comments
Continue reading

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft generally takes security very seriously, and for the most part, if you keep your Windows and Server operating systems updated, you can generally depend on some base-level security and stability. Unfortunately, it was recently discovered that, for almost two years, a very critical defense mechanism within Windows wasn’t being properly secured.

0 Comments
Continue reading

Dealing with Bloatware Can be a Giant Pain in the Neck

Dealing with Bloatware Can be a Giant Pain in the Neck

Purchasing new technology sure is exciting… until you realize that it comes preloaded with loads of software that not only slows your device down but could also be harmful or irritating to deal with. What can you do about this unneeded and unwanted software? We recommend that you read this blog to find out.

0 Comments
Continue reading

All You Need to Know About the Raspberry Robin Worm

All You Need to Know About the Raspberry Robin Worm

Using USB drives to spread threats is certainly not a novel concept, and you should always be wary of potential threats using USB drives to make their rounds. In particular, a new and emerging threat called the Raspberry Robin worm could shake things up in the world of cybersecurity. What is this threat, and how can you keep yourself and your business safe from its attacks?

0 Comments
Continue reading

Greedy New Android Malware Can Empty Your Wallet

Greedy New Android Malware Can Empty Your Wallet

A new type of Android malware called “toll fraud malware” has been discovered, leading many individuals to question why they are being signed up for services that they do not want. In other words, there is malware out there that is spending users’ money without their permission. How rude!

0 Comments
Continue reading

The Threat Landscape and What You Can Do to Navigate It

The Threat Landscape and What You Can Do to Navigate It

Cybercrime is up, way up. This is problematic for businesses in general, but can be a really serious issue for those companies that don’t have security measures in place that can thwart potential attacks. Today, we’ll talk briefly about how big of a problem cybercrime is and some steps your business can take to keep from becoming a statistic. 

0 Comments
Continue reading

What Data is Stolen During a Ransomware Attack?

What Data is Stolen During a Ransomware Attack?

You can’t check the news without seeing the word “ransomware” plastered across the screen. It’s a major threat for businesses in just about any industry and of any size. In order to keep your business safe both now and into the future, you’ll have to implement adequate security measures that can put a stop to these types of threats. Of course, it’s easier said than done, especially when certain data is more likely to be targeted than others.

0 Comments
Continue reading

Just Because You’re Sick of Ransomware Doesn’t Mean It’s Gone Away

Just Because You’re Sick of Ransomware Doesn’t Mean It’s Gone Away

Ransomware is perhaps one of the most difficult types of malware to handle, and it has enabled cyber-extortion to flourish over the past several years. As a business owner, you need to know what ransomware is, how it should be addressed, and how to protect against it.

0 Comments
Continue reading

Ads Can Carry Malicious Code

Ads Can Carry Malicious Code

Sometimes you might be browsing the Internet and come across an advertisement for free downloads of Windows applications. Obviously, this is too good to be true, and hackers tend to exploit advertisements to spread their influence across devices. Malvertising is used to deliver various types of threats, all of which can cause considerable harm to unprepared businesses.

0 Comments
Continue reading

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

Ransomware Is Really Scary, Even If You Don’t Have Ransomware

If you look at all of the security-related headlines from the past year, what do you think the biggest trend is? Perhaps it was the plethora of large-scale ransomware campaigns that struck both individuals and businesses in spades. Even now, ransomware continues to make headlines by changing its tactics, with one of the more recent ones being in regards to fake ransomware.

0 Comments
Continue reading

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

McDonald’s Data Breach Is the Latest In a Disturbing Cyberattack Trend

Major cyberattacks seem a dime a dozen these days, especially with businesses that might not seem like possible targets. For example, McDonald’s restaurants recently suffered a data breach. Let’s take a look at the situation, how it played out, and what we can learn from it.

0 Comments
Continue reading

What Threat is a Small Business Really Under?

What Threat is a Small Business Really Under?

Small businesses face a lot of risks, one obvious one being the threat of potential cybercrime and how its influence can impact their businesses. Let’s consider how these influences have taken shape, and the challenges that small and medium-sized businesses must now face as a result.

0 Comments
Continue reading

Tip of the Week: Mobile Malware’s Warning Signs

Tip of the Week: Mobile Malware’s Warning Signs

Chances are, you own a smartphone, and that device helps you to manage quite a bit, both personally and professionally. As smartphones have risen in importance, they have also drawn the attention of hackers who attack via malicious applications. Here, we wanted to offer some tips that can help you spot these malicious apps before falling victim.

0 Comments
Continue reading

Watch Out for All Different Kinds of Ransomware

Watch Out for All Different Kinds of Ransomware

Ransomware has become infamous in the past few years, largely due to its involvement in a growing number of cyberattacks during this time. Of course, not all ransomware works in the same way, and recognizing the difference could prove to be useful. Therefore, we’ve taken a few moments and assembled a brief description of the four most common ransomware varieties.

0 Comments
Continue reading

Coronavirus Anxiety Causing Expanded Phishing Threats

Coronavirus Anxiety Causing Expanded Phishing Threats

The COVID-19 pandemic has certainly changed the way we do things in a very short period of time. Unfortunately, in times of absolute crisis and anxiety, cybercriminals use it as camouflage to steal data and infiltrate normally-secure networks. Let’s take a look at some of the ways hackers are able to exploit your employees and how you can work to protect your business. 

0 Comments
Continue reading

A Guide to Help You Understand All the Digital Threats You Face

A Guide to Help You Understand All the Digital Threats You Face

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

0 Comments
Continue reading

Latest Blog

There has been a good deal of controversy about how personal data has been collected, sold, and used over the past few years. Companies of all types package and sell data to create a valuable extra revenue stream for their business, and whi...

Contact Us

Learn more about what Accucom
can do for your business.

(02) 8825-5555

Accucom
Unit 25, 11 Brookhollow Avenue
Norwest Business Park, New South Wales 2153

Account Login