Always at your service to provide the highest level of quality support to our customers.
Anthony Firth Client Engineer
“I’m passionate about building and fostering relationships, and finding solutions for success.”
Michael Koenig Client Account Manager
“Enabling IT to become an effective and valuable partner by delivering premier customer service and quality IT solutions achieving business goals.”
Jake Parrott Business Development Manager
“Serving the client through IT solutions is my passion. A happy client is a happy me.”
Jason RichardsonClient Engineer
“Striving to provide friendly and quality service to our customers”
Ted Rorabaugh Client Engineer
“I help clients stabilize and grow their IT infrastructure so they can focus on growing their core business.”
Josh Wilshire Systems Engineer Team Lead
“Providing courteous, quality IT service for our customers.”
Rich Yoest Rapid Response Team Supervisor
“Striving to be your trusted adviser and IT teammate in accomplishing all your business goals”
Brandan Bishop Client Account Manager
“I strive to provide the highest level of quality service to our customers.”
Tommy Williams Sr. Hardware Engineer
“I’m driven by the steadfast belief that technology must serve as a business enabler. This mantra has driven 21
Years of successful partnerships.”
Stephen Riddick VP Sales & Marketing
“CSP doesn’t succeed unless your company succeeds.”
Stephen Allen Inventory Manager
“Through my intuition and genuine concern to help others I have built long-lasting relationships with our customers, co-workers and business partners.”
Scott Forbes VP Support Services
“Every day, I work with clients to help plan the future of their businesses.”
Michael Bowman vCIO
“Your IT problems become our IT solutions.”
Mark McLemore Project Engineer
“Managing internal and external operations to ensure that CSP provides quality and reliable customer service .”
Margie Figueroa Business Manager
“Helping customers get the most out of their IT Infrastructure.”
Marc Gillet Project Engineer
“Providing quality internal and externals financial support to our customers and accounting support to CSP.”
Katie Steiglitz Accounting Administrator
“Your satisfaction is our #1 priority.”
Heather Moore Project Manager
“Some call me the CEO. I call myself the Cheerleader for an awesome team!”
William B. Riddick Founder & CEO
“CSP is here to assist you with your IT needs.”
Beth Wylie Inside Sales Manager
Thinking ofHiring A New IT Company?
On What Questions You Need To Ask Before Signing Any Agreement.
By now, most people are aware of the harm that both viruses and malware can do to your sensitive information. This is also an issue that small businesses need to be concerned about as their financial and customer information could be compromised. A new threat, USB Thief, means that computer users might not even realize their data has been hacked because the mechanism that has done so is armed with a method of self-protection.
How USB Thief Works
As researchers have recently discovered, USB Thief relies on using a USB device to attack an air-gapped computer or an isolated server. Once it attacks, USB Thief leaves nothing behind to alert you to its presence. While other types of malware use traditional methods of spreading, such as attaching itself to shortcuts and autorun files that then enable it to spread, USB Thief is a different animal altogether, making it a challenge to discover.
Piggybacking on USBs
Much like its name suggests, USB Thief gains entry to your system by piggybacking on portable thumb drives that contain those applications that you use the most, such as Firefox, TrueCrypt and NotePad++. It then takes up residence within the application’s chain command using a plugin or a library that is dynamically linked. The result? When the target host is running, the malware is also running quietly and unobtrusively in the background without your knowledge. It does so by utilizing six files — four that are executable and two that are loaded with configuration data.
How to Protect Yourself from USB Thief
The research firm that discovered USB Thief noted that the malware was particularly difficult to break down. This is partially due to the fact that the malware executes three payloads with the ability to steal data with each instance. USB Thief also protects itself by making a different filename with each piece of malware that it executes. While this particular piece of malware is not widespread as of this writing, it has the potential to do a great deal of damage. It is advisable to turn the autorun feature of any computers off and to avoid using thumb drives from any unknown sources.
Malware can cause numerous problems for your small business. Protect it and yourself by engaging a reliable IT support partner in Raleigh. Give CSP, Inc a call at (919) 424--2000 or drop us an email at firstname.lastname@example.org.