Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Windows 10 Computer Managed Service Provider Ransomware Productivity Backup Innovation Mobile Devices Smartphone Outsourced IT Data Backup Android Google Social Media Business Continuity Managed IT services Hardware User Tips Browser Communication IT Support Data Disaster Recovery Workplace Tips Data Recovery Efficiency Upgrade Cloud Computing Business Management Smartphones Data Management Small Business App Server Holiday Microsoft Office Internet of Things Office Remote Monitoring Phishing Managed IT Services Miscellaneous WiFi Office 365 Network Windows Facebook IT Support communications Spam Passwords Artificial Intelligence Tech Term Gmail Big Data Password Save Money VoIP Paperless Office Encryption Customer Relationship Management Collaboration Employer-Employee Relationship Risk Management Unified Threat Management Bandwidth Firewall Robot Apps Hosted Solution Recovery Wi-Fi Office Tips Chrome Analytics Vendor Management Apple Avoiding Downtime Infrastructure Word Hacker Customer Service Mobile Device Management Compliance Document Management Tip of the week Operating System Cybersecurity How To Content Filtering Saving Money Government Remote Computing Money Downtime Work/Life Balance Outlook IT Management Mobile Device File Sharing Two-factor Authentication Antivirus Settings Project Management Managed IT Business Technology Data loss Health Automation The Internet of Things BDR Computers Alert Hacking Mobile Computing Printing Data storage Windows 10 Tech Support Telephone Systems Computing Education Vulnerability Cybercrime Virtual Reality Data Security Training Applications Presentation Business Growth SaaS BYOD Social Website Maintenance Mouse YouTube Unified Communications User Legal Display LiFi Retail Twitter Politics Monitors Best Practice Tablet Travel Lithium-ion battery Google Drive Business Owner Websites Physical Security Augmented Reality Going Green Marketing Taxes Botnet Managed Service IBM Running Cable Samsung Healthcare Competition Meetings Bring Your Own Device Search Patch Management Sports Storage Scam Proactive Information Technology IT service Regulations Cortana Humor Virtualization Computer Care Identity Theft Remote Monitoring and Management Administration VPN Net Neutrality Analyitcs Help Desk IT solutions Safety Virtual Private Network Smart Technology Laptops Wireless Technology Assessment Licensing Automobile Upgrades HIPAA Wireless Server Management Software as a Service Router Budget End of Support Mobile Security Specifications Consultation Digital Payment Software Tips Administrator Asset Tracking 3D Printing IT Technicians Backup and Disaster Recovery Statistics Technology Tips Address Managed IT Service Cameras Windows 8 Chromebook Modem Law Enforcement Vulnerabilities Network Congestion Proactive IT Hotspot Domains User Error Remote Workers Unsupported Software Mirgation Procurement 5G Bluetooth Comparison Entrepreneur Redundancy Break Fix Application Corporate Profile CCTV Emoji Cookies Gadget Geography Users IT Consulting Language Public Speaking Quick Tips Printer History Information Mobile Data Migration Remote Worker iPhone Hacks Black Friday Dark Web WannaCry Nanotechnology Cables Data Breach Computing Infrastructure Time Management Access Control Cabling Electronic Health Records Chatbots Virtual Assistant Current Events Cyber Monday Laptop Data Warehousing Hard Drives G Suite Staffing Processors IoT Wires Virtual Desktop Technology Laws Alerts Network Management SharePoint Motion Sickness Cyberattacks Identity Voice over Internet Protocol flu season Halloween Google Docs Lenovo Microsoft Excel Refrigeration VoIP GPS Utility Computing Writing Unified Threat Management Cooperation Touchscreen Downloads PowerPoint Google Maps Disaster Bookmarks Deep Learning Personal Information Windows 7 Fun Shortcut Fort Worth Scary Stories Superfish Blockchain Consumers Digital IT Consultant Tracking Machine Learning MSP Social Engineering business communications systems Staff Multi-Factor Security Uninterrupted Power Supply Favorites Computer Repair Manufacturing flu shot Cost Management Permissions Undo Spyware Cleaning Notifications Relocation Internet Protocol Flexibility eWaste IP Address Google Calendar Fort Worth IT Solid State Drive IT Sevices Webcam Conferencing Alt Codes Electronic Medical Records Proactive Maintenance Google Wallet Management Dark Data Networking Fraud How To Crowdsourcing Private Cloud VoIP streamlines Operations Environment Mobile Office Heating/Cooling Legislation DFW IT Service Hard Disk Drive Point of Sale Typing Social Networking Processor Drones Enterprise Resource Planning Buisness Firefox Supercomputer Error WPA3 business network infrastructure Wearable Technology Employees Troubleshooting Servers Cryptocurrency Motherboard Knowledge Mobile Techology Internet Exlporer IT Budget Fleet Tracking data services Zero-Day Threat Phone System Mail Merge Distributed Denial of Service Web Server Bitcoin Update Experience Company Culture Disaster Resistance

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code