Follow Us
248-786-6100   |   Remote Support
blueRock Technologies
  • Home
  • Why BlueRock?
    • Testimonials
    • Partners & Certifications
    • Core Values
  • Services & Solutions
    • IT Managed Services in Michigan
    • IT Project Design and Delivery
      • Virtualization
    • Cloud Services
      • Private Cloud
      • Virtual Desktop (VDI)
      • Hosted Exchange
      • Hosted Servers
  • Industry Solutions
    • Hospitality
    • Healthcare
    • Financial
    • Manufacturing
  • About Us
    • blueRock Services Agreement
    • Contact Us
    • Support Center
    • Blog
    • Careers

Phishers use encrypted sites to scam

December 22nd, 2017 sdjones Security 2017december22security_a, cyber security, encryption, https, phishing scam
Phishers use encrypted sites to scam

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes.

Read more

A keylogger found in HP laptops

December 20th, 2017 sdjones Hardware 2017december20hardware_a, antivirus, cyber security, Hardware, hp, keylogger, laptop, security, software
A keylogger found in HP laptops

You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are -- if the computer you’re using doesn’t have a keylogger installed.

Read more

Key points from Protenus’ new report!

December 4th, 2017 sdjones Healthcare 2017december4healthcare_a, cyber security, emrs, healthcare, protenus, security report
Key points from Protenus’ new report!

Security breaches are becoming an all-too-common occurrence in the healthcare industry. Due to a sever lack of competent security measures to protect extremely vital patient records, healthcare organizations have become a prime target for hackers and malicious insiders alike.

Read more

Watch out! More ransomware attacks incoming

September 4th, 2017 sdjones Healthcare 2017september4healthcare_a, backup, cyber security, healthcare it, ikarus, locky, ransomware
Watch out! More ransomware attacks incoming

In the world of cybersecurity, there’s no time to rest. Hackers are constantly developing malware, and reusing attacks that were successful in the past. Recently, hackers have revived the Locky ransomware, and it has already infected thousands of computers worldwide.

Read more

What you need to know about malware

July 28th, 2017 sdjones Security 2017july28security_a, adware, cyber security, cyber threats, malware, ransomware, spyware, trojan
What you need to know about malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.

Read more

Why Nyetya is more threatening than WannaCry

July 13th, 2017 sdjones Security 2017july13security_a, cyber security, malware, Microsoft, nyetya, ransomware, wannacry
Why Nyetya is more threatening than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.

Read more

Firmware: the threat most users overlook

April 18th, 2017 sdjones Hardware 2017april18hardware_a, cyber security, firmware, Hardware, managed services, routers
Firmware: the threat most users overlook

As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack.

Read more

Are your printers safe?

February 23rd, 2017 Hardware 2017february23_hardware_a, cyber security, cyber threats, Hardware, printer, vulnerabilities
Are your printers safe?

Do you have security measures in place for your office’s printers? By “security,” we don't mean locked doors or watchful guards; we're referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices.

Read more

3 Reminders for HIPAA compliance in 2017

January 30th, 2017 Healthcare 2017january30_healthcarearticles_a, compliance, cyber security, emrs, healthcare, hipaa
3 Reminders for HIPAA compliance in 2017

Although totally necessary, data privacy regulations are often a gigantic headache. And king among the various compliance standards is HIPAA. Despite the legislation’s enactment back in 2003, the rules governing electronic medical records and protected health information continue to change and evolve every year.

Read more

Ransomware demands more victims for freedom

December 28th, 2016 Security 2016december28_security_a, cyber security, malware, popcorn time, ransomware
Ransomware demands more victims for freedom

Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need.

Read more
  • 1
  • 2

Recent Posts

  • A step-by-step guide to building your own PC
  • Essential strategies to defend your VoIP system against TDoS attacks
  • Beyond the basics: Mastering essential Excel features in Microsoft 365
  • How hybrid cloud solutions drive resilience and competitive edge
  • Effective video marketing ideas that elevate and promote your brand

Categories

Archives

Footer_logo

BlueRock Technologies

  • 560 Kirts Blvd
    Suite 122

    Troy, MI 48084
  • Phone: 248-786-6100
  • Fax: 248-786-6101

Follow Us


©2025 blueRock Technologies
All Rights Reserved.
blueRock Services Agreement
  • Privacy Policy
  • Privacy Policy