New Major CPU Security Flaws Earlier this week, computer security experts announced the discovery of two major security flaws found in the processors of most of the world’s computers, smartphones, and cloud servers. These flaws affect nearly every processor manufactured by Intel since 1995. These defects encompass all modern processors capable of a performance […]
*IN HOUSE POSITION – SONOMA COUNTY, CALIF. * to apply, email email@example.com We are seeking a talented Front-End Web Developer to become a cornerstone of our development team. The chosen developer will be comfortable working alongside both creative designers and seo-specialists to ensure a successful project. The position requires a truly seasoned developer who is […]
Position: Accounting Manager, full time. West County Net, a digital agency in the heart of Sonoma County, is looking for an ambitious AR/AP Manager to drive our accounting and support our local headquarters located in Santa Rosa. This is a great opportunity to become part of a successful and growing tech company. Job Duties include […]
Apple will no longer be issuing security patches for QuickTime on Windows computers.
A new variant of ransomware called Locky can encrypt your files and hold them ransom until payment is delivered. Learn more from IT experts West County Net!
This past year, a particularly nasty malware infection known as TeslaCrypt has come into the spotlight. If you’re infected, there are steps to take before paying the ransom!
Microsoft issued an update for Outlook 2010 on Tuesday, December, 8, which was supposed to fix a set of issues, including preventing the program from mistakenly entering safe mode on startup.
Adobe Flash is once again broken and vulnerable to virus attacks. PROTECT YOUR FILES Mozilla is temporarily blocking Adobe Flash from their web browser, Firefox. Any content that requires Flash to work will be disabled by default. You might see warnings that flash is out of date or blocked. Currently, no fix is available from […]
Getting infected with CryptoWall can be a very scary, damaging, and even costly experience. If you’re infected, West County can help.
The internet is open to anyone at anytime from anywhere in the world (for the most part). Is your business protected in the cloud?
In less than a year, Microsoft will end support for the popular Windows Server 2003. Hailed by many as the most stable, reliable Windows-based server OS, many are not looking forward to leaving Win2k3. However, compromised security is forcing the issue.
Cloud computing is quickly becoming the standard for cost-effective web hosting, data backup, and information technology services. Businesses of all sizes (including giants like Netflix) use some form of cloud service for their integral day-to-day operations. When you consider the money that businesses can save by avoiding purchasing their own servers, it’s no wonder there […]
A security flaw has been discovered for the hugely popular web browser, Internet Explorer. The vulnerability affects all versions of IE, from version 6 through the most recent release, IE 11. Though the number of reported attacks has been few so far, the shear potential for serious breaches in security is staggering. Over 50% of […]
Time to say goodbye Microsoft has finally ended its support for the Windows XP operating system. Sustaining 13 years on the market, the extremely popular operating system was used the world over. In the end, XP weighed in at just under 28% of the global OS market share. To be so popular even at the […]
Recently, news of a major security issue known as the Heartbleed Bug has been circulating around the internet. The security flaw affects all systems that use OpenSSL, a security protocol that is utilized by a large portion of websites on the internet. In the most basic terms, the Heartbleed Bug may have exposed a bunch […]
The recent credit card information breach at Target has a lot of people thinking about big business security issues again. What kind of information do the businesses we trust so much have and how easy is it exactly to access by some anonymous hacker? The problem that the Target credit card breach highlights is that—no […]