Blog

Latest Blogs from Mohawk Computers

 

Thank you for reading.

Data Protection Laws and PIIs

Data Protection Laws and PIIsLast week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This...

Cyberattacks and the vulnerability of the small business

Cyberattacks and the vulnerability of the small businessYou cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to...

Are you subject to Data Protection laws?

Are you subject to Data Protection laws?This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the...

Ransomware Part II

Ransomware Part IIIn our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.Prevention is the best cure. Follow standard “data hygiene” principles that you...

Ransomware part I

Ransomware part IThe daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your...

Website cloning: Don’t fall for that trap!

Website cloning: Don’t fall for that trap!Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website cloning does the same thing--to your business--in real life. Website cloning is one of the...