Cyber Security Class


“There are two types of companies: those that have been hacked, and those who don’t yet know they have been hacked.”- former Cisco CEO John Chambers.

Why do people do come after your business on a cyber level? Money. Attackers can corrupt your system, take it offline, and demand payment to restore it for you.  Cyber Narcissists are on the prowl and professionals can help your business defend your computer systems against different types of cyber threats.

Staying up-to-date with the latest threat can be quite a daunting task. We wrote this to break it down- in laments terms so it is easy to stay on top of it, or have the language to hire someone who can.

Lesson 1


Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user’s computer security and privacy.

How do you get it on your system?

Well- it is activated when a user clicks on a malicious (hence “malware”?) link or attachment, which leads to installing dangerous software onto your personal or business device. Once activated, this little bugger can:

  • Block access to key network components (ransomware)
  • Install additional harmful software
  • Covertly obtain information by transmitting data from the hard drive (spyware)
  • Disrupt individual parts, making the system inoperable

Where have I heard this phrase before?

You would recall hearing the terms: computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and keyloggers

What can I do about it?

It is always best to have a professional company or trusted technical employee handle your online affairs. They can install antivirus software, firewalls, applying regular patches to reduce zero-day attacks, securing networks from intrusion, having regular backups and isolating infected systems. Malware doesn’t give up- so stay on top of this and make sure you are prepared for backup resources if your website is compromised and you need to get information out to your customers.

Source : wikipedia, as a supplement for better phrasing and links to learn all terms with one click.

Meeting All of Your Telecommunication Needs


At Southern Cal Telecom Inc., our professional staff can install, design, and maintain just the ideal system for your company. At our data and storage center, your data will always be safeguarded with the highest levels of security. Count on us for the right carrier service (VoIP and hosted PBX phone system), security and surveillance systems, and more!