QNAP and Ransomware

QNAP and Ransomware

QNAP is advising customers to update the HBS 3 disaster recovery app to block Qlocker ransomware attacks targeting their Internet-exposed Network Attached Storage (NAS) devices. A massive Qlocker ransomware campaign started breaching QNAP NAS devices during the week of April 19, replacing victims’ files with password-protected 7-zip archives. While the attack vector was not known […]

Server or Cloud?

Server or Cloud?

                Small businesses have had the need for data sharing since the dawn of the computer age.  Where to put that data and how to share it effectively has usually been with the on-premise server.  Servers allow for storage redundancy, folder level permissioned sharing and effective backups.  Companies have relied on servers for years but, […]

Password Managers and You

Password Managers and You

Password managers are often recommended by security minded users and IT professionals because they make it easy for people to store long, complex passwords that are unique to hundreds or even thousands of accounts. Without use of a password manager, many people resort to weak passwords that are reused for multiple accounts. This is an […]

Be Aware of Ransomware

Be Aware of Ransomware

If you are not familiar with the term “Ransomware” it is very important that you become aware of the severity of this infection as it is the most catastrophic of infections you can possibly get on your system if you are a day to day computer user. A Ransomware attack can simply be caused by […]

What is the ‘Right to Repair’ Movement?

What is the ‘Right to Repair’ Movement?

            In recent years you’ve probably heard the phrase “Right to Repair” being thrown around. If you’re not really in the know you may not understand what this means, so we’ll break it down here. Right to Repair is essentially allowing users of devices that they purchase the choice of choosing who repairs their devices […]

Still Using RDP? (Remote Desktop Protocol)

Still Using RDP? (Remote Desktop Protocol)

Here in 2021 many companies are still using RDP to access their computers remotely, especially during this period where COVID-19 has been running rampant. Because of this, many hackers and bots have had the opportunity to take advantage of vulnerabilities within this protocol to attack companies and hit them with ransomware or hack entire networks […]

24/7/365 Network Monitoring

24/7/365 Network Monitoring

24/7/365 Network Monitoring… Frankenstein Computers has a 24/7/365 Network Monitoring Service. For a minimal cost we will will be able to monitor your entire network including: Inventory the network Discover and record all systems, servers, printers and devices on the network. Gather all technical data about each device. Track all software on each device to […]

Spills Can Kill

Spills Can Kill

If you spill liquid on your computer, what is the first thing you do? For most people, it is to power it back on and see if it works. At least after they dry off the keyboard and the case. That is a very dangerous thing to do, adding power to a computer that is […]

CI Security Partnership

CI Security Partnership

Frankenstein is proud to announce that we have Partnered with CI Security and will be providing professional security services for businesses around the country. These services are specifically geared towards preventing intrusions from hackers and security threats which are growing daily. With ransomware and hacking on the rise, it’s important to make sure your company […]

Spring Cleaning Your Computer

Spring Cleaning Your Computer

Well, it’s spring time and everybody’s AC filters are filling up with dust and pollen.  The same is happening with your computer.  Dust and pollen get collected in your PC or Mac while it is running.  This can cause bad air-flow resulting in slowed performance and even overheating.  It is recommended that you clean out […]