A new kind of attack: Distributed spam distraction

Every day, you receive dozens of email messages, including spam, which is usually harmless, unless there’s a malware attached to it. But even the harmless ones can become more than just an annoyance if you have thousands of them flooding your inbox. Learn how a new spam attack called distributed spam distraction can do more […]

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails. Understanding DSD Distributed Spam […]

“TIS THE SEASON TO BE CAREFUL”…by dStringer

Today marks exactly 10 days before Christmas...the mad rush to get all of the Christmas responsibilities done is at its most heightened point!  Folks are in a hurry, hassled and stressed.  When our focus is on a million things, it may not be on security diligence while we are out and about during the Holiday season.

TO BE…OR NOT TO BE – WHEN YOU SUSPECT IDENTITY THEFT by dStringer

We live with crime everyday.  It's become commonplace...unfortunately.  And, one of the frustrating aftermaths of being victimized by criminal activity is feeling victimized all over again when you try to rectify the situation and normalize your life.

WHY TECHNOLOGY INTIMIDATES PEOPLE by DStringer

We at "Alcala Consulting" are constantly looking for new, innovative, and "user-friendly" ways to make the "World of Technology" less intimidating for our clients and potential clients.  Ultimately, we pride ourselves in being available to lift the "Technological Burden" off of business owners.

THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer

The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys."  Well, yes and no.  While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.