Evolve Your Communications With 3CX Phone System for Windows 3CX Phone System for Windows is a software based PBX for Windows that works with SIP standard based IP Phones, SIP trunks and VoIP Gateways to provide a full PBX solution – without the inflated cost and management headaches of an ‘old style’ PBX. Used by […]

Businesses today face many threats to their networks and the critical files and data contained within. Malicious software such as viruses, malware, ransomware, and trojans are out there prowling around for susceptible systems to wreak havoc upon. Let RHYNONetworks help you protect your company’s assets!   Viruses Viruses can render your business computers inoperable, or […]

Today your customers are freeing themselves from the desktop. More and more users are doing their business on tablets as well as mobile phones. Is your company’s website built to work smoothly on all of these devices? Now is the time to give your business’s website a modern look and modern functionality.     Let […]

FOX-IT and FireEye have partnered together and have been able to recover the private keys used in the CryptoLocker encryption which locks users out of their own files. They have also been able to reverse engineer the devastating ransomware. As a result of their efforts infected users can go to their website, upload an encrypted […]

Malware known as ransomware infects computers, encrypts every file on them (and any networked computers), effectively holding them ransom then demanding that users pay money to get the encrypted files back. CryptoLocker is the most sophisticated and effective ransomware out today and it is a business’s worst nightmare. Companies that rely on electronic documents and […]

Another serious vulnerability has been found in OpenSSL’s crypto library. This coming just on the heels of the Heartbleed nightmare. If you are running as a client you are vulnerable no matter the older version of OpenSSL, but servers are only vulnerable when running 1.0.1 and 1.0.2-beta1 – and in order for an attack to […]

Two weeks is how long Windows users have to beef up their computers and protect themselves from Gameover Zeus. Why two weeks? The FBI and international police have uncovered and disrupted the orchestrated Gameover Zeus attacks, but warn that two weeks would be sufficient time for the hackers behind this extremely sophisticated piece of malware to reorganize […]

Reuters has just reported that some security experts may be launching an effort to revive the mysteriously shut down TrueCrypt tool. It is still a mystery why the project’s developers shut it down, one possibility cited by Reuters is a possible government forced back door access. You can read the entire Reuters article here.

If you browse through computer sections of today’s retailers, or poke around through online shops you will notice a growing number of desktops with touchscreens. Of course phones and notepads use touchscreens as their sole user interface. And the current crop of operating systems reflect this (e.g.: Windows 8). So it is a good idea […]