(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Tip of the Week: Troubleshoot Your Slow Computer Like an IT Pro

Tip of the Week: Troubleshoot Your Slow Computer Like an IT Pro

If your Windows PC is acting sluggish, you may want to “check under the hood” to see how your disk space is looking. If you see that your PC is regularly hanging out in the 90-percent-or-higher zone, then you’ll want to do something about that. Here’s how to check the status of your computer’s disk usage space, along with some best practices for troubleshooting performance issues.

0 Comments
Continue reading

Hackers Use 100,000 Mobile Devices to Break the Internet

Hackers Use 100,000 Mobile Devices to Break the Internet

You may have noticed that the Internet was acting a little strange for a couple of hours last month. This was the result of a massive Distributed Denial of Service attack against one of the biggest DNS providers in the United States. What’s more, in the wake of this attack, professionals have discovered the surprising cause.

0 Comments
Continue reading

How to Find Out if You’ve Got Stolen Data on the Dark Web

How to Find Out if You’ve Got Stolen Data on the Dark Web

Data breaches: these criminal intrusions are conducted against businesses of all sizes. Critical and sensitive data is copied from the system it belongs on to another, unauthorized one--all for someone’s illegitimately-gained benefit. For many businesses, the threat of being struck by a data breach and having their data put up for sale and/or distribution on the Dark Web is very real, especially for those possessing data of a more sensitive nature.

0 Comments
Continue reading

Tip of the Week: How to Find Out if a Third-Party IT Provider is a Good Fit

Tip of the Week: How to Find Out if a Third-Party IT Provider is a Good Fit

The use of third parties has become a necessity to successfully complete the tasks that many businesses require to maintain their operations. Unfortunately, not all third parties follow the same stringent security standards, making your dealings with them somewhat laden with risks. As a result, an unfortunate catch-22 results for most businesses--they need third parties to maintain their business operations and processes, but the security risks that third parties pose to their data could result in lost business from a client whose information is compromised.

0 Comments
Continue reading

3 Ways to “Ghost Proof” Your IT Network

3 Ways to “Ghost Proof” Your IT Network

What makes haunted houses so scary are the ghosts of souls left behind belonging to former residents. These restless spirits manifest at unexpected times, causing problems for the living. What about the virtual realm? Is it possible for your company’s IT network to be haunted? If you have employees connecting outdated devices to your network, then it’s possible for it to be haunted by the ghosts of devices past.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite
SCW