Meltdown and Spectre: CPU Security Flaws

  New Major CPU Security Flaws Earlier this week, computer security experts announced the discovery of two major security flaws found in the processors of most of the world’s computers, smartphones, and cloud servers. These flaws affect nearly every processor manufactured by Intel since 1995. These defects encompass all modern processors capable of a performance […]

Front-End Web Developer Wanted

*IN HOUSE POSITION – SONOMA COUNTY, CALIF. * to apply, email hiring@westcounty.com We are seeking a talented Front-End Web Developer to become a cornerstone of our development team. The chosen developer will be comfortable working alongside both creative designers and seo-specialists to ensure a successful project. The position requires a truly seasoned developer who is […]

Accounting Manager Wanted

Position: Accounting Manager, full time. West County Net, a digital agency in the heart of Sonoma County, is looking for an ambitious AR/AP Manager to drive our accounting and support our local headquarters located in Santa Rosa. This is a great opportunity to become part of a successful and growing tech company. Job Duties include […]

Locky - Encrypted Data

Locky Ransomware

A new variant of ransomware called Locky can encrypt your files and hold them ransom until payment is delivered. Learn more from IT experts West County Net!

Flash Vulnerability

Adobe Flash is once again broken and vulnerable to virus attacks. PROTECT YOUR FILES Mozilla is temporarily blocking Adobe Flash from their web browser, Firefox. Any content that requires Flash to work will be disabled by default. You might see warnings that flash is out of date or blocked. Currently, no fix is available from […]

Windows Server 2003 End of Life

End of Support for Windows Server 2003

In less than a year, Microsoft will end support for the popular Windows Server 2003. Hailed by many as the most stable, reliable Windows-based server OS, many are not looking forward to leaving Win2k3. However, compromised security is forcing the issue.

The Cloud

Implementing a Cloud Service

Cloud computing is quickly becoming the standard for cost-effective web hosting, data backup, and information technology services. Businesses of all sizes (including giants like Netflix) use some form of cloud service for their integral day-to-day operations. When you consider the money that businesses can save by avoiding purchasing their own servers, it’s no wonder there […]

Internet Explorer Vulnerability Discovered

New Internet Explorer Vulnerability Discovered

A security flaw has been discovered for the hugely popular web browser, Internet Explorer. The vulnerability affects all versions of IE, from version 6 through the most recent release, IE 11. Though the number of reported attacks has been few so far, the shear potential for serious breaches in security is staggering. Over 50% of […]

Windows XP is dead

The Demise of Windows XP

Time to say goodbye Microsoft has finally ended its support for the Windows XP operating system. Sustaining 13 years on the market, the extremely popular operating system was used the world over. In the end, XP weighed in at just under 28% of the global OS market share. To be so popular even at the […]

IT Security

Password Security & Best Password Practices

The recent credit card information breach at Target has a lot of people thinking about big business security issues again. What kind of information do the businesses we trust so much have and how easy is it exactly to access by some anonymous hacker? The problem that the Target credit card breach highlights is that—no […]