Petronella Blog Archive

Visit our New Blog

Blog Post

Cybercrime has reached an all-time high

Cybercrime has reached an all-time high, affecting business, the government and everyday people. And security experts say it’s going to take a concerted effort to get ahead of cyber criminals.

Read More

Tags: Security

Blog Post

Six Signs That You Have Been Hacked

Check out our many pages on keeping your information safe, such as Data Recovery Services, Anti-Virus Filtering, and Network Security & Monitoring or call 919-355-5545 to speak with a specialist. Petronella Computer Consultants wants your business to succeed and we know that means keeping your hardware and data secure. Contact us today to learn more on how we can help. You have enough on your plate; let Petronella give you peace of mind now.

Read More

Tags: Virus, Ransomware, Data Protection, Data Backup, Disaster Recovery, Data Recovery Services, Anti-Virus Filtering, Network Security & Monitoring, Malware

Blog Post

eBay Hacked: Why You Should Consider a Password Tool

On May 21, 2014, eBay reported that they were hacked and have asked users to change their passwords. A password management tool can help you stay more secure.

Read More

Tags: Security

Blog Post

Security Alert: Hackers Exploiting Newly Discovered Flaw in Internet Explorer

Over the weekend, Microsoft revealed that there is a newly discovered security flaw in Internet Explorer that hackers are exploiting. It is called a “zero day” exploit because there was zero time between the discovery of the flaw and the first known exploits by hackers.

Read More

Tags: Windows, Windows XP, Internet, Security

Blog Post

Prevent Your Company from Experiencing Cloud Sprawl

If your company is using a cloud or is interested in using one, it is important to know the risks. While the cloud can deliver major benefits, some of its advantages also introduce complications such as cloud sprawl. Cloud sprawl is the uncontrolled spreading of application and services into the cloud for a company or organization. Unmanaged cloud sprawl is introducing risk with threats from unmanaged sources.

Read More

Tags: Cloud Computing, Cloud Sprawl

Blog Post

Heartbleed

The "Heartbleed Bug" is an especially severe security issue because it allows anyone on the Internet access to your encrypted data sent using SSL/TLS and HTTPS technologies.

Read More

Tags: Security, Internet

Blog Post

Green IT: Is Your System Environmentally Friendly?

Did you know when your company uses a virtual desktop you are not only saving time and money for your business, but you are also helping the environment as well? With virtual desktop, you use less power and fewer resources, saving tons of energy and thus reducing your company’s carbon footprint.

Read More

Tags: Virtual Desktops, Managed IT, Green IT