Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

0 Comments
Continue reading

Believe it or Not, Too Much New Technology Can Put Your Network at Risk

Believe it or Not, Too Much New Technology Can Put Your Network at Risk

Is your organization using the latest technology solutions? If so, that’s great--you’ve taken the first step toward achieving maximum productivity and efficiency. However, you need to realize that no technology solution comes without its quirks that need to be addressed. Here are two ways that your new technology solutions could potentially be putting your business’s infrastructure at risk.

0 Comments
Continue reading

Firewalls and Web Filtering, Why Your Business Needs Both

Firewalls and Web Filtering, Why Your Business Needs Both

One of the biggest benefits to the modern business is the scope and breadth of the Internet that connects them with potential and current clients and allows them to communicate their goods and services. This scope and breadth are also one of its biggest pitfalls, as there is plenty of room for the multitude of threats and other potential issues to reside as they menace businesses everywhere.

0 Comments
Continue reading

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

0 Comments
Continue reading

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

USB is a popular technology in all modes of today’s society. You’d be hard-pressed to find a modern piece of technology that’s not compatible in some way, shape or form with USB. Thumb drives, chargers, and even portable drives all use this common technology. However, this also means that hackers can take advantage of its popularity to spread malware and other problems.

0 Comments
Continue reading

Tip of the Week: 5 Best Security Practices Hackers Hate

Tip of the Week: 5 Best Security Practices Hackers Hate

Hackers are always trying to come up with new ways to steal or corrupt sensitive data. If you don’t take the opportunity to protect your systems, you could be staring down a major data loss incident or security discrepancy. Here are five ways that you can protect your business’s infrastructure from hackers waiting to steal your data.

0 Comments
Continue reading

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

0 Comments
Continue reading

An SMB’s Guide to Understanding HIPAA

An SMB’s Guide to Understanding HIPAA

Security has never been easy for any business that deals with sensitive information. Nowadays, even a small business that uses an Internet connection has to worry about hackers and malware of all types. This is especially problematic for small healthcare offices that need to keep sensitive information secure and safe from online threats.

0 Comments
Continue reading

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

0 Comments
Continue reading

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportunity to do some real damage. With the right preventative measures, your business can catch these threats in the act before they can accomplish their goals.

0 Comments
Continue reading

Be on the Lookout Executives, Hackers are Targeting You!

Be on the Lookout Executives, Hackers are Targeting You!

Let’s say that you’re walking down the hallway of your office when you bypass a team member from accounting. They tell you that the wire transfer you requested has been completed successfully, but you don’t remember ever asking for such a thing. You take a look through your books and see that a ton of money was sent to some random stranger who took on your identity.

0 Comments
Continue reading

Study Shows Way Too Many Businesses Ignore Insider Threats

Study Shows Way Too Many Businesses Ignore Insider Threats

Insider threats are an unpleasant reality of working with sensitive information, though you might be relieved to hear that not all instances of insider threats have malicious intentions. Then again, maybe you aren’t relieved since a threat is still a threat. Either way, we’ll discuss some statistics concerning insider threats, and what you can do about them.

0 Comments
Continue reading

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

0 Comments
Continue reading

The Threat of Your Car Being Hacked is Becoming Increasingly Relevant

The Threat of Your Car Being Hacked is Becoming Increasingly Relevant

In response to the increasing danger of cyber attacks against computerized cars that are currently in production, Volkswagen has partnered up with three Israeli experts in cybersecurity to form a brand new cybersecurity company dedicated to designing solutions intended to protect such advanced cars and their passengers.

0 Comments
Continue reading

Ransomware: Coming to a Mobile Device Near You

Ransomware: Coming to a Mobile Device Near You

Ransomware, the unpleasant form of malware dedicated to denying users access to their own device, has become more prominent with mobile technology. While ransomware is typically associated with desktop computers, it’s fully capable of infecting mobile devices. Therefore, it should be no surprise that cases Mobile-based ransomware have increased nearly four-fold in the past year.

0 Comments
Continue reading

Situations Can Quickly Deteriorate When Employees Attempt to Resolve IT Issues

Situations Can Quickly Deteriorate When Employees Attempt to Resolve IT Issues

In a world where businesses either pride themselves on their security solutions, or have woefully unsecured networks, you need to understand that one of the most common threats to sensitive corporate data comes from within your organization. User error is the leading cause of data loss and security-related problems, although, it’s important to remember that they often have good intentions that may result in an unfortunate outcome.

0 Comments
Continue reading

Kindle Users May Not Like the Latest Windows 10 Upgrade

Kindle Users May Not Like the Latest Windows 10 Upgrade

If you happened to plug your Kindle into your computer and get a blue screen of death, you aren’t alone. Many Kindle users have discovered that the Anniversary update to Windows 10 has caused an issue when attempting to use USB to charge the device or transfer books. It would seem that, within moments of connecting the Kindle to a Windows 10 device, the device will lock up and display the dreaded Blue Screen of Death before rebooting.

0 Comments
Continue reading

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

0 Comments
Continue reading

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

3 Built-in Windows 10 Security Tools that Keep Hackers at Bay

Windows is perhaps the most widely-used computing tool in the workplace, and as such, it remains a huge target for hackers of all kinds. Criminals are always trying to uncover vulnerabilities in the operating system, but this time around, Microsoft has truly outdone themselves. Windows 10’s built-in security, according to hackers at the Black Hat conference in Las Vegas, allows for the most secure Windows operating system in several years.

0 Comments
Continue reading

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.