Sales & Support: 877-374-7581
Thirtyseven4 Endpoint Security 7.4 Upgrade
How to Upgrade Your Thirtyseven4 Endpoint Security Console Pre-installation Tasks: Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior to deploying network wide. You can test the...
IDENTITY THEFT: What Are YOU Worth On The Dark Web?
IDENTITY THEFT: What Are YOU Worth On The Dark Web? (Hint: It's More than You Think!) Does anyone else’s brain have certain topics that it zones out on? I am not sure why, but remembering to renew my driver’s license on time is a real struggle for me. Maybe it’s the...
Malware Definitions
Malware Definitions and Information Adware Adware usually acts without a user’s authorization or knowledge. While adware is not always malicious, it typically tracks a user’s Internet activity and sends information, such as email addresses, to advertisers. Many free...
It’s Time To Change [Again] – Quit Your Moaning-Change Comes With the Territory!
It's Time To Change [Again] - Quit Your Moaning-Change Comes With the Territory! With summer break winding down and the start of school lurking right around the corner, a monumental change is about to occur in our household: our oldest child will fly-the-coop,...
Can Cyber-Security Software Do It All? What Responsibilities Rest With the Users?
Can Cyber-Security Software Do It All? What Responsibilities Rest With the Users? If you’ve been following my column for some time, you know that we’re a big-time soccer family. (If you don’t like the game of soccer or don’t have children who play soccer, I encourage...
Staying Safe from RDP Brute Force Attacks
Staying Safe from RDP Brute Force Attacks. Best Practices to Protect Your Organization One game we like to play while taking in the sights and sounds of interstate driving is the old classic: “What am I?” It is a simple game to play: a family member simply thinks of a...
Staying Safe from RDP Brute Force Attacks
Staying Safe from RDP Brute Force Attacks In a RDP (Remote Desktop Protocol) brute force attack, an attacker gains access to a victim’s computer by using brute force techniques which can effectively crack weak passwords. Typically, the attacker scans a list of IP...
The Greatest Ransom Ever Paid
April Showers Bring Malware: A Crop of Thorny Ransomware Has Recently Bloomed Spring is here, and with it all the beautiful birds singing in the morning (I much prefer them to my alarm clock!) and all the neighborhood kids running and reconnecting outside while...
Malicious or Not Malicious, That is the Real (Time) Question
Explore the heauristics of virus detection and proactive identification-through the eyes of a seven year old. As a recognized expert in cyber security, I’m often pressed by the media for comments relating to current cyber-related headlines. In one such recent...
TheDarkOverLord and Saturday Soccer
Why Malicious Hackers May Be a Reflection of Our Society We are a proud soccer family. Our weeknights are filled with our 3 kids playing and practicing with each other down our basement (and daddy yelling at them for being too wild), driving them to multiple practices...
get protected today
Call 877-374-7581 to schedule your free online demo.
get protected today
Call 877-374-7581 to schedule your free online demo.
Thirtyseven4, LLC is dedicated to serving customers with a full palette of EDR security solutions including AntiVirus, AntiMalware, Anti-Ransomware and Zero-Day Threat Protection.