croom new

Amaxx Blog

Amaxx has been serving the Dublin area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

Continue reading
0 Comments

20% of Customers and Revenue are a Lot to Lose From a Single Data Breach

20% of Customers and Revenue are a Lot to Lose From a Single Data Breach

Data breaches are common problems for businesses of all shapes and sizes. In fact, they often have huge repercussions that aren’t initially seen in the heat of the moment. How can you make sure that a data breach won’t negatively impact your business, even well after you’ve fixed the initial problem?

Continue reading
0 Comments

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your security.

Continue reading
0 Comments

Rootkit Hacks are Nasty, But Preventable

Rootkit Hacks are Nasty, But Preventable

The challenge for business owners is that there are so many different types of online threats, it borders on impossible to protect themselves from all of them. All of these threats hold limitless possibility to ruin your organization’s operations, either short-term or long-term. One of the most common threats out there is called a rootkit hack, and it’s one that you certainly don’t want to mess around with.

Continue reading
0 Comments

The “S” in HTTPS is More Important Than You May Think

The “S” in HTTPS is More Important Than You May Think

It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website security certificate.

Continue reading
0 Comments

Let the 80/20 Rule Be Your Guide for IT Security

Let the 80/20 Rule Be Your Guide for IT Security

IT security is something that businesses of all shapes, sizes, and varieties have to be concerned about. You’ll be faced with the question of whether you have adequate security practices on a daily basis. For help with understanding why the smallest vulnerabilities often result in the most data loss, look no further than the 80/20 rule.

Continue reading
0 Comments

From Heart Attack to Hack Attack: Hackers Can Now Control Pacemakers

From Heart Attack to Hack Attack: Hackers Can Now Control Pacemakers

Medical technology has allowed for vast improvements in the way that conditions are treated. For example, the pacemaker allows some people with heart conditions to live longer and more comfortably. However, a European research team has concluded that even pacemakers are susceptible to being hacked, with deadly results.

Continue reading
0 Comments

Helpful Suggestions to Improve Password Security

Helpful Suggestions to Improve Password Security

Passwords are important for any online account (and for most accounts in general). Sometimes they might feel like inconveniences, but it’s crucial to remember that these passwords are often the first line of defense, if not the only line of defense, that stands between your data and hackers. We’ll discuss ways that you can augment password security with other powerful measures.

Continue reading
0 Comments

How 2 Keystrokes Can Bypass the Security of Windows

How 2 Keystrokes Can Bypass the Security of Windows

Usually, when a troubleshooting feature is put in place, it is meant to assist the user in resolving an issue. However, one such feature in Windows 10 could ultimately lead to more problems, as it also can serve as a free-ride vulnerability for an opportunist bystander.

Continue reading
0 Comments

Even Small Businesses Need a Big Security Solution

Even Small Businesses Need a Big Security Solution

One of the main benefits of a small business is that it’s small. You can make decisions quickly regarding all sorts of matters. Your workforce isn’t nearly as large as other organizations, meaning that you’re a closer, tight-knit group. However, one of the misconceptions of small business is that they’re not as susceptible to hacking attacks, which can be a dangerous assumption to make.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Latest Blog Entry

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer. ...

Latest News

Amaxx launches new website!

Amaxx is proud to announce the launch of our new website at www.amaxx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account login