Grand Rapids (616) 723-9494 | Detroit (313) 736-5022 | Lansing (517) 233-1523

Archive for January, 2018

Use Of Bots Has Increased Fake Account Creations

The ThreatMetrix Cybercrime Report 2017 is out, and is a troubling read for anyone who has anything to do with data security.  As a fraud prevention company protecting nearly a billion ...

Unpaid Invoices Were a $825 Billion Problem Last Year

Businesses exist to make money. Regardless of what that money is intended for, be it to sustain someone’s lifestyle or to bankroll a cause, a business will cease to be ...

Intel Chips Face Another Possible Vulnerability

Intel's year isn't getting off to a very good start.   Just after the discovery of a pair of critical vulnerabilities that have been in their chipsets for more than a decade ...

Tech Tip #57: Protect Your Business From Cryptojacking

What is Cryptojacking? Cryptojacking is a new-comer in the world of digital threats, and is the term that is being used to describe the act of using a device (be it phone ...

Inappropriate Ads Found In Some Game Apps for Kids

Normally, Google's robust series of checks and audits are pretty good at catching malicious code and preventing it from making its way to the Play Store.  Sometimes, however, something slips through ...

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of ...

Do Not Use These Chrome Extensions

Do you use any of the following Chrome browser extensions? Change HTTP Request Header Nyoogle - (a custom logo for Google) Stickies - (a Post-It note for Chrome) Lite Bookmarks If ...

Backdoor In Certain Lenovo Switches Discovered

Does your company utilize either RackSwitch or BladeCenter networking switches?  Are those switches running ENOS (the Enterprise Network Operating System)?  If so, there's a backdoor in your network you weren't aware ...

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may ...

Vulnerabilities Found In Some GPS Services

A duo of researchers stumbled across a series of vulnerabilities in literally hundreds of GPS services that leave sensitive GPS tracking data open to hackers.  Dubbed "Trackmageddon" by the researchers, the ...

Blog

How Long Before You Experience A Cyber Attack?

How Long Before You Experience A Cyber Attack?

According to this year's Traveler's Risk Index, published by The Traveler's Indemnity Company, a majority of business owners have a[...]
Firefox Adds Data Breach Monitoring Service 

Firefox Adds Data Breach Monitoring Service 

Firefox is upping the ante where digital security is concerned, having just announced the release of a new, free service[...]
Windows 10 Adoption Continues To Grow 

Windows 10 Adoption Continues To Grow 

Windows 10 is far and away the fastest growing version of the OS in the company's history.  It recently hit[...]

Location

Howell

1684 Hydraulic Dr
Howell, MI 48855
(517) 233-1523

Company

Bulldog IT Services is a leading provider of IT support and consulting, focusing on small and medium sized businesses in Michigan. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite