WannaCry Will Likely Hit U.S. Companies Next

Posted by on May 19, 2017

Having a managed services provider, such as Hungate Business Services, is one way to ensure your office’s operating systems are adequately protected against malware attacks – such as those perpetrated by WannaCry, the ransomware that hit on May 12, 2017. Ransomware is a type of malicious software that infects and restricts access to a computer…

The Short Story on Encryption

Posted by on May 1, 2017

Up until now, companies have relied on such security methods as firewalls, strong passwords, two-factor authentication and anti-malware to block hackers. However, at Hungate Business Services, we feel application of encryption may be the only true way to protect important or proprietary data from hackers. Encryption is the process of taking a file and scrambling…

Does Public Wi-Fi Put You at Risk?

Posted by on Apr 5, 2017

Ever been waiting for a flight connection in an airport and killed time by viewing Facebook or checking email on your laptop or smart phone? Then you may have put yourself at high risk for being hacked. Hungate Business Services wants to let clients know that open or public Wi-Fi often isn’t well encrypted and…

Now, About Those Backups …

Posted by on Mar 2, 2017

Many, many hours of grief, pain and financial loss can occur if data backups take a backseat. That’s why Hungate Business Services wants to remind everyone that March 31, 2017, is World Backup Day (WBD). That’s the one day each year when people globally should critically examine just how safe their personal and business data…

What Is Cloud Computing Exactly, and Is It for You?

Posted by on Feb 1, 2017

Generally speaking, when individuals or organizations choose to “work in the cloud,” it means they’ve moved all applications and stored data outside their firewalls onto shared systems that are managed by a cloud provider. Those programs and data are accessible via the internet, instead of through office hard drives, and the provider maintains the network…

Help Avoiding Network Downtimes

Posted by on Jan 20, 2017

Never before have backups and implementing disaster recovery been so important for sustaining businesses and organizations. This need was underscored a few months ago (Oct. 21, 2016), when multiple DDoS attacks took place rendering major Internet platforms and services unavailable to large numbers of users in Europe and North America. The attacks were viewed as…

Avoid Getting “Doxed”: It’s Not Good for You

Posted by on Dec 1, 2016

On the national front, we’ve recently seen some shocking breaches in cyber security. The repeated hackings of Democratic National Committee computers – suspected, no less, to have been accomplished by Russian perpetrators – are all cases in point. Notably, after the DNC’s troubles, Lisa Monaco, the current U.S. homeland security and counter terrorism adviser, issued…

Ransomware Is Growing: Don’t Be a Victim

Posted by on Nov 1, 2016

HBS wants clients and anyone reading this blog to understand the growing seriousness of ransomware in the workplace – particularly for healthcare entities that depend on safeguarded patient data to guide daily, life-and-death decisions. Indeed, the problem is so severe that the U.S. Department of Homeland Security and FBI recently (2016) distributed a number of…

Three Steps to Making Your PC Speedier

Posted by on Oct 17, 2016

At Hungate Business Services (HBS), we like to see clients gain a competitive edge by having superior systems operations. It’s exciting to know that Windows 10 provides the fastest operating system yet, but there are still things you can do to “up the ante.” Below are three quick steps you can take yourself to improve…

Phishing and Other Things to Fear on the Internet

Posted by on Jul 1, 2016
Hungate Business Services

Few things are scarier on a busy work day than having your personal or office computer suddenly be “at risk.”  We’ve all heard of viruses, worms, Trojans and malware. Each one is different, but all are equally scary. As the term implies, viruses are pieces of programming-code that get attached to data files introduced via…