Danville (217) 446-9574 | Terre Haute (812) 561-0211 | Indianapolis (317)-759-1051

Archive for October, 2020

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft's DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen's Black Lotus Labs is working on something new. They ...

Adobe Patches A Number of Critical Vulnerabilities In Latest Update

If you make frequent use of Adobe products, then you'll definitely want to give priority to applying the latest security update offered by the company. It's an out of band patch that ...

New Windows 10 Update Shows App Warnings For Malware

A great many malware strains are designed to engage quietly during a PC's startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at ...

Latest Windows 10 Update May Block Third Party Drivers

If you haven't yet installed the latest Windows 10 or Windows Server update, here's something to be aware of before you do. You may not be able to update or install some ...

Microsoft Image AI Increases Accuracy To Rival Humans

Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, 'Terminator,' in which a computer network gained sentience and decided to do ...

Intel Adding Additional Security To Future Processors

Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and ...

Hacked Networks And Credentials Being Sold At Alarming Rates

Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According ...

Blog

Remote Leadership: Strategies for Effective Management in a Virtual Environment

Remote Leadership: Strategies for Effective Management in a Virtual Environment

The business world is always evolving. Creating a solid foundation with a team and encouraging a positive work environment can[...]
The Importance of Cloud Backup

The Importance of Cloud Backup

Suppose your company’s network were to fail right now. How long would it take to recover the data and restore[...]
The Importance of Font Security

The Importance of Font Security

Everyone has seen memes about the impact of using the wrong font on graphic design. However, the potential for a[...]

Location

Illinois Offices

21 N Vermilion Street
Danville, IL 61832
(217) 446-9574

Indiana Offices

333 N Alabama St. Suite 350
Indianapolis, IN 46204
(317) 759-1051


619 Cherry St #14
Terre Haute, IN 47807
(812) 561-0211

Texas Offices

6600 Chase Oaks Blvd
Suite 100
Plano, TX 75023
(317)-759-1051

Company

Since 1991, CTS Computers has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in central Illinois and Indiana. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite