RSL Computer Solutions, LLC Logo
CALL US
(513) 816-1344
FOLLOW US
  • Home
  • About
  • Services
  • Service Request
  • Service Portal
  • Backup Solutions
  • Emsisoft A/V
  • Heimdal Security
  • Security Cameras
  • Contact
  • Testimonials
  • Blogs and Specials

One-Two Punch Combo, Malware-Ransomware and Virus Protection that Works!

May 10, 2019 by Richard Langford

Heimdal Thor Enterprise and Emsisoft AntiVirus – AntiMalware deliver the ONE- TWO PUNCH KNOCK OUT PUNCH COMBO

The ProActive: 

Heimdal Security – Since 2011, has been leading the fight against cybercrime, developing new technologies and providing intelligence to protect over 5,000 companies and 600,000 users against cybercriminal attacks and data security breaches.

With security Products for Home and Business , Heimdal security takes a Proactive approach to securing your data. With the complete pack THOR Premium your endpoints are SAFE! unlike traditional Antivirus products Heimdall’s complete package with Thor Premium sits basically at the network card level and is constantly scanning incoming and outgoing traffic, Your DNS is pointed to the Heimdal Security centers robust network, and traffic is scanned at the network level. By scanning through the network connection Thor can stop, block and cease an attack before it reaches your machine, since it is done in route through a highly secure DNS server. The complete Business package allows for updating 3rd party applications and Windows security patches automatically closing loophole and breaches due to unsecure or unpatched software. Automatically scheduled scans of your files and constant scanning of incoming and outgoing data and where they are connecting ( endpoints). Is your online application really connecting to say your bank or has it been hijacked and pointed to a dark web or malicious hackers page masking itself as the real deal only to steal your data?

Dark Layer Logo

Detects threats at the DNS, HTTP, HTTPS layers, before they reach your device, and prevents data leakage and compromise. With a unique, proactive approach to security, DarkLayer Guard™blocks all incoming and outgoing communications to malicious servers, preventing APTs and other threats.

VectorN Logo

While antivirus is a reactive solution that scans code to stop threats, our VectorN Detection™ will autonomously detect and prevent infections.

Through VectorN Detection™, hidden malware in your system will be immediately detected and blocked before it can compromise your data.

Xploit Resilience Logo

Through X-Ploit Resilience, available updates are automatically and silently updated. This way, you eliminate vulnerabilities before they’re exploited AND infect your PC with malware. Windows Security Pacthes and updates are applied on a scheduled basis along side many 3rd party applications, Updates to these application is patched automatcially when a new patch or update is available it will automatically be installed with the least amount of user intervention.

The Reactive:

Forget viruses – Today’s threats come in new shapes and are called Malware

Emsisoft’s high performance dual-engine scanner

Emsisoft not only detects more because it uses the full power of two major antivirus- and anti-malware technologies, it also scans quicker because of the efficient combination of the scanners.
Any unnecessary duplicates in detection are avoided, enabling the least impact on memory and overall hardware resources.

The engine Emsisoft has built complements the second Bitdefender engine, and they are combined seamlessly to maximize efficiency.

One of the ways they detect unwanted programs is through signature-based detection. What this means is that we search programs for their unique signatures, which are like fingerprints, and scan your computer for these threats. At Emsisoft, most of there lab time is spent creating detection signatures for PUPs (potentially unwanted programs) and on custom malware removal code for specific infections. We ran some numbers a while ago and discovered that more than 74% of the total detected PUPs are detected by our in-house built scan engine component.

So how does information translate to your own practical use?

Simple: all detections with an (A) postfix are from our own engine and those with (B) are from Bitdefender.

In a nutshell: We believe two engines are better than one, and we use our own technology to detect threats to your computer that might otherwise be missed. But we won’t compromise efficiency in this process — Emsisoft works to keep your memory clean and uncluttered, and to detect threats at optimal speed.

 

For the last 4 months I personally have been running Heimdal Thor Enterprise alongside the trusted Emsisoft antivirus, and feel this is the ULTIMATE SECURITY / Antivirus-Antimalware combination available by having an Reactive and Proactive software suite I feel confident my data is secure, and any internet sites I visit or use are not sneaking in backdoor threats or phishing, or worse parading themselves as the real site only to be fake and stealing any data they can get ahold of. Last thing I want to do is come home and have to clean up my own systems or laptops which is why I run both Heimdal and Emsisoft on every machine I use for the business and computer in our home. I won’t sell something I personally don’t use, and I won’t sell something which doesn’t work!
Contact RSL Computer Solutions, today and get the ONE-TWO Punch Advantage! Heimdal and Emsisoft the deadly One-Two Punch combo against Malware, Ransomware and Malicious Attacks!

Phone: 513-816-1344 or Email: Info@rslcomputers.com

Filed Under: Protecting Your PC, Uncategorized

Share:

April 1, 2019 by Richard Langford

An antivirus solution standalone is not enough to fully protect your data

If you are currently using an antivirus solution to keep your data safe and secure, know that it can’t provide 100% protection. Online threats have evolved greatly and malicious actors became real “artists” in using creative ways to spread malware.

Antivirus is only a single layer of security that you need, but can’t keep up with the increasing number of malware attacks. It does a better job at covering threats like worms, viruses, trojans, while advanced malware strains (ransomware, phishing or social engineering threats) manage to evade AV detection.

Last year, massive spam campaigns like WannaCry or NonPetya could fly below the radar of antivirus software and go undetected during the first hours or days. The timing was crucial for both home users and organizations and we’ve seen the damages caused.

Here’s an example of a spam campaign we monitored and analyzed to see how long it takes AV engines to detect advanced malware. During this malicious campaign, cyber criminals tried to bait victims into clicking on a malicious link to deliver the NanoCore malware on their devices.

The results from VirusTotal showed that in the first day only 5 AV engines out of 64 could detect this malicious campaign. A few days later, 37 out of 64 engines could find it. This indicates a low detection rate for antivirus during the first stages of an attack.

Nowadays, cyber attacks are brand new and unlisted in antivirus databases, which are designed to sneak past your AV product and compromise your computer. People rely on antivirus as their only protective layer, but it’s just not enough. Antivirus is often ineffective in blocking ransomware attacks.

Nano Core Spam Campaign 2 1

Virus Total results

You can see other examples of spam campaigns explaining why AV detection for new malware remains low.

Why extra layers of security are needed

A multi-layer approach is needed to better fight ransomware infections that can spread quickly and harvest users’ data. This happens because the malware scanning is rather reactive than proactive. The newer a malware strain is, the harder will be for AV to detect it.

The purpose of a multi-layered security system is to stop cyber attacks on different levels, so they never reach the core of the system and essential information.

Malicious actors can find ways to manipulate the data that flows through your Internet connection to serve their malicious purposes.

We spend a large amount of time browsing the Internet, but have you thought about the danger you are exposed to? We believe that everyone should enjoy the web safely when navigating online.

To do that, you will need a tool that can help you filter the Internet traffic and eliminate all the threats out there that antivirus can’t block. A tool focused on proactive cybersecurity.

We believe that you shouldn’t wait for something bad to happen to improve your online safety and protect your digital assets.

What Heimdal PRO can do for you

If you didn’t know about our product, Heimdal PRO is built to protect its customers from attacks like ransomware traditional antivirus can’t detect.

Heimdal PRO can block different ransomware infection sources such as malicious email attachments, infected links you may receive in your email, infected web pages or malicious web apps that appear legitimate at first, but aimed at spreading ransomware.

Here’s how Heimdal PRO works and how it can stop a ransomware infection in 4 different stages:

how Heimdal PRO blocks

Heimdal PRO is an antimalware solution that includes three layers of protection against ransomware.

1. Traffic scanning and filtering

With its DarLayer Guard feature, Heimdal PRO proactively scan for all your incoming and outcoming Internet traffic to identify all types of malicious connections.  It does that by changing the DNS (Domain Name System) for IPv4 and IPv6 to a different address and block a malicious web address.

When the engine is enabled, Heimdal PRO will apply a filter on the network adapter that will scan for infected sites and other web locations (servers, online ads, etc) with the potential to install a ransomware on your devices.

In the image below, on the right side, you can see how many web traffic scans Heimdal has performed on your system in the last 7 days and how many web addresses were blocked.

You should know that all the filtering process takes place quickly and will not affect your Internet connection speed.

Traffic filtering layer

2. Detection and blocking of advanced malware (VectorN Detection)

The Malware engine analyzes potentially malicious code to detect and block ransomware attacks. It compares the signatures of the files on your PC with our constantly updated database to find any matches.

With the malware scanning feature, Heimdal PRO works proactively to detect and block second generation malware like ransomware that tries to compromise users’ endpoints and encrypt their files. All websites you are accessing are scanned and verified in our internal database.

You can choose to turn it off, but we don’t recommend doing it, because it will decrease your protection level.

VectorN Detection feature works hand in hand with the DarkLayer Guard feature and tries to search and detect for patterns in the number of blocks that DuarLayer Guard records. It uses Machine Learning Detection (MLD) to perform an in-depth analysis of all incoming and outgoing HTTPS, HTTPS, and DNS traffic.

You can see in the image below how many malware scans Heimdal PRO has completed on a system in the last 7 days, as well as how many malware strains Heimdal has cleaned from your PC in the same frame time.

Malware Detection feature

3. Automatic and silent patching feature was created to silently keep your software programs and applications, including operating system, up to date and patched, without annoying you with notifications.

In Heimdal PRO, the patching system is split into two sections:

  • software patching (designed to monitor and update the programs installed on your computer and details about them) 
  • recommended software (here you’ll find programs Heimdal recommends to install that will automatically be inserted into the software patching list).

Software Patching system

 

To better handle ransomware attacks, you need to see the bigger picture and take all the security measures to prevent these attacks.

Use this anti-ransomware protection plan and better secure your endpoints against ransomware.

What you should know is that Heimdal PRO is compatible with any antivirus product available on the market that will block threats at their root. An anti-malware solution isn’t meant to replace your AV product, but complement it, so users can benefit from multiple layers of protection to better fight against ransomware.

With both software products installed on a PC, more security gaps are closed and you can enhance online safety.

Please let us know what you think of our product and what other features you’d like us to include. Your feedback is important.

Heimdal Security Official logo

The easy way to protect yourself against malware
contact RSL Computer Solutions, LLC for a free trial

Use it to:Block malicious websites and servers from infecting your PCAuto-update your software and close security gapsKeep your financial and other confidential details safe

EASY AND RELIABLE. WORKS WITH ANY ANTIVIRUS.

https://rslcomputers.com/185-2/

Filed Under: Uncategorized

Share:

New Year – New Services

December 26, 2018 by Richard Langford

With the New Year comes More Managed Services, Security and Antivirus Options- RSL Computer Solutions the choice for Small Business-Small Office and Home Office, Computer and I/T Services

For 2019 we will be adding more Firewall and Security options for Small Business / Home Office environments

More antivirus and web protection applications and managed services.

Thanks for using and recommending  RSL Computer Solutions the past couple years!

We look forward to providing  service and support- keeping you running and secure- with minimum downtime in 2019!

 

Filed Under: Uncategorized

Share:

Security Cameras

April 24, 2018 by Richard Langford

We offer both NVR and XVR (DVR) Based Video Security Systems.

Avoid exposure to the two major NVR brands and preserve your firm’s reputation and credibility. The Mirai Botnet and recent discovery of master password backdoor access to those two major platforms are risks easily avoided. Our vendors DVR and NVR have no backdoor master passwords, and 350 full time engineers focused on performance, reliability, and customer security and privacy.

Our choice of vendor offers NVR with higher performance, higher quality construction, and the intuitive GUI that alleviates customer anxiety on first time installations. Better hardware and software. The CMS is intuitive and more powerful than PSS. We’re confident you’ll agree that these platforms are truly first class. Very easy to use. With a full line of IP Cameras that receive same stellar end user feedback.

From 4 channel analog models to 128 IP channel input; 16 Hot-Swappable SATA Bays, H.265, Up to 12MP Recording Resolution Integrator Series Network Video Recorder offering 4K HD

Click for more information

Filed Under: Uncategorized

Share:

Secure Cloud Based Backup Solutions,

April 24, 2018 by Richard Langford

Why you should be using an Offsite Backup Service

Keeping a regular backup of your computers and storage systems prevents data loss, but to completely protect databases, email archives and other critically important data, businesses should keep at least two separate backups including one offsite backup.

An offsite backup is a copy of key files and folders kept in a separate physical location from your primary storage device. From a disaster recovery viewpoint, there are several key advantages to offsite file storage.

Protection From Natural Disasters

One of the more obvious advantages of an offsite backup is the protection that users gain from natural events. If you cannot access your computer or storage system for any reason, you can use the offsite copy to restore your data in the meantime.

Offsite backups have provided some businesses with essential protection from downtime following major fires, earthquakes, hurricanes and floods. In some cases, this protection is worth millions of dollars, particularly if the backup copy is recent and productivity losses are minimal following the failure.

Avoiding Logical Data Issues

Offsite backups also protect against logical data disasters in RAID-dependent or networked systems. For example, if your business keeps a primary copy of data on a RAID array and an automatic onsite backup, logical file damage could potentially affect both copies of the file. By keeping a separate offsite backup, your business could avoid data loss in this type of scenario.

Logical file issues account for a large percentage of commercial data loss events, and a good backup plan uses an offsite copy to prevent viruses, user errors and software errors from causing data loss.

Setting Up Offsite Backups

Choosing an appropriate backup program or service can provide you with peace of mind. A good offsite backup is automatic, consistent and reliable.

Depending on whether you need to store a small or large amount of data, you may be able to use a cloud-based service to maintain an accessible offsite backup. Cloud services are a reliable option for personal computer users, and many services offer automatic software that uploads changed files from the user’s computer once per day. Most cloud services also offer state-of-the-art data encryption to ensure secure file transfers.

Businesses with large storage systems often prefer physical offsite backups. This can include data tape cartridge libraries, NAS and SAN devices, and other large-scale archival systems. Ideally, these offsite backups should not be in the same regional area as the original copy of the data. Otherwise, major natural events such as floods, hurricanes and earthquakes may prevent you from accessing critically important files in both locations.

We all know that offsite data backup is something we should be doing. But, it’s not something that we all do. Cloud backup services are an insurance policy to protect your data from any number of data loss threats. It gives you peace of mind.
Consider the following data loss situations. They are all too common and could send your business down the drain if an offsite backup solution is not in place.

Deleting files: Updating files or deleting them are common activities. We often lose data simply because we don’t have proper workflow procedures and backup strategies. More efficient procedures for saving work and making backups regularly will definitely save time.

Viruses & malware: New viruses attack computers every day. Damages greatly differ, but most viruses affect operational systems and damage stored data. Making regular backups of your data and storing the data safely offsite allows you to access it after severe virus attacks.

Mechanical damages: Computer hardware is a fragile part of business networks. There are ways to recover data, but this service can be costly. There’s no guarantee you can totally recover your important data. Regular offsite backups help in case of hardware troubles and keeps the latest version of your data in safe storage.

Power failures: Power failures affect operation systems and computer hardware. Suddenly shutting your computer or business systems down without proper procedures causes problems. This leads to a chain reaction, and your data is gone. Offsite data backups makes you feel better and more secure, keeping data in a safe place where you can recover it.

Computer theft: It’s a tragedy to lose both your computer and data at the same time. While traveling, you may leave your laptop unattended, lose it in an airport, conference center, coffee shop or any other crowded place. New computers cost money, but the data lost is even more expensive. If you use a proper offsite data backup strategy, you can recover your data even after your computer is long gone.

Fire & explosions: Explosions rarely happen, but fire mostly likely destroys both your computer and data. Fire is also dangerous when backups are stored in the same location. The safest practice against fire is to make regular backups and keep them in the cloud.
In all these cases, another factor to consider is the cost of data recovery. The cost of professional recovery can be considerably more than maintaining an offsite backup. The best data recovery case is one that uses a reliable, offsite backup solution.

Businesses suffer not only the financial devastations caused by data loss, but they can suffer the loss of client confidence. Both are equally devastating and determine whether a business can survive.

More than one-third of Ransomware attacks are on businesses with fewer than 250 employees.
There’s a lot at risk when a business fails to implement a successful and thorough offsite data backup plan. Some companies never recover from the blow.
After a major data loss, only 6% of those businesses will survive, studies show. A whopping 51% go out of business within two years, while a sober 40% are gone immediately.

Natural disasters happen, and they can take down your entire office.

40% of businesses never reopen after being destroyed by a natural disaster. — FEMA

Data loss has a big effect on that stat. Mother nature is unpredictable, at best. Natural disasters happen fairly often. Should a natural disaster destroy your entire office when you don’t have offsite backups, well…

That’s why it makes sense to for that offsite copy to be cloud-based, so that it stays up-to-date and can be restored easier in the event that disaster strikes.

Offsite data backup is more secure. Much more.

What’s the security like in your office? Maybe you work in a shared building, or maybe it’s just you and your co-workers. But even if you have a fairly extensive alarm system, it likely doesn’t compare to the military-grade security in a data center managed by a 3rd-party provider.

That security includes multiple layers of security to prevent data loss from all types of threats — from disasters to unauthorized access. Some of these facilities are even underground.

Not only that, but data centers have additional layers of protection that stop problems like malware and ransomware before they get into the network.

What’s more, with the right offsite backup solution, you should get multiple layers of backup redundancy, meaning even if your data could be compromised or lost in one data center, it would still be safe and sound at another site.

It’s the last stop to preventing complete business failure.

We provide Cloud Based Secure AES 256 Encryption backup solutions. Hosted on Amazon’s S3 AWS server, Amazon S3 provides a highly durable storage infrastructure designed for mission-critical and primary data storage. Objects are redundantly stored on multiple devices across multiple facilities in an Amazon S3 region. To help better ensure data durability, Amazon S3 PUT and PUT Object copy operations synchronously store your data across multiple facilities before returning SUCCESS. Once the objects are stored, Amazon S3 maintains their durability by quickly detecting and repairing any lost redundancy.

Amazon S3 also regularly verifies the integrity of data stored using checksums. If Amazon S3 detects data corruption, it is repaired using redundant data. In addition, Amazon S3 calculates checksums on all network traffic to detect corruption of data packets when storing or retrieving data.

Amazon S3’s standard storage is:

  • Backed with the Amazon S3 Service Level Agreement
  • Designed to provide 99.999999999% durability and 99.99% availability of objects over a given year
  • Designed to sustain the concurrent loss of data in two facilities

Fore more information see https://rslcomputers.com/services/secure-backup/

 

Filed Under: Uncategorized

Share:

Services

  • Service Agreements
  • System Tune-Ups
  • Virus & Malware Removal
  • On-Site Repair Service
  • Custom Computer Systems
  • RMM Remote Monitoring & Management
  • Secure Backup

Certified A+ Service Techncian

RSL Computer Solutions, LLC

A Network Member of the Microsoft Partner Network

RSL Computer Solutions, LLC

(513) 816-1344
10 Douglas Ln
Hamilton, Ohio 45011

FOLLOW US

Testimonials

  • Excellent technical and customer service. Rick is always ready to respond to a request and resolves them within a timely manner. He is a pleasure to have as part of our extended team. He is always prompt on follow ups as well. Thank you for your commitment to Class-A service! Read More
    Jill Kohrs
    Prolocity
  • 5 Star service. Off the charts computer knowledge. Would highly recommend Rick & RSL Computer Solutions! Read More
    Jeff Driver
    Consumers Mortgage Source
  • I highly recommend RSL for any computer / network issues you may be having. RSL recently revamped our network here at Mehas Music in downtown Hamilton - Rick took care of multiple complex issues, and was able to get us back up and running in much less time than we were expecting (AND at a... Read More
    James Mehas
    Mehas Music
  • I would highly recommend RSL for all of your networking, computer or technology support needs. The company completely set up a new office complex for my company and did a great job. The remote monitoring service is a lifesaver! Read More
    Sid Vance
    MAJ Companies
  • I called Rick a year ago (02-2017) to rid my computer of a virus. Rick took care of that situation and installed new protection software. No problem since then. Recently Rick transferred files/programs from several of my old computers to a new computer. Now I've got one new "family" computer with all the files/programs I... Read More
    John S. Comella N8AA
  • Rick is the best. If you want fast and quality service, he is definitely the one to call. I am so impressed with the service I received. I would recommend him to everyone. Read More
    Terry Singer Huffman
  • First and foremost, Rick is very smart about computers and networks. On top of that, he really cares about his clients. Your problem is his problem until he has it solved. My computers and network have never worked better. Read More
    Thomas J. Ruwe, Attorney at Law
  • I would like to take a minute to thank you for all your help with setting me up with a new laptop, transferring all my info and files and such, and supporting me with questions and all the help. Your prompt attention to my needs is always helpful and fast. I recommend you and your... Read More
    Gary B. KC9PTD
    Somonauk, IL
  • We have been using Rick with RSL Computer Solutions, LLC for almost a year now. So glad that we switch because we were not happy with who we were using before and since switching to Rick we have had a lot less issues. Makes things so much smoother when you have your trust in somebody... Read More
    Reffitt’s Garage & Towing Service, Auto Body Repair, LLC
    Reffitt's Garage & Towing Service, Auto Body Repair, LLC
  • All of the Hamilton Amateur Radio Club (HAMARC) desktop computers at the station were built by Rick and have working great for several years without any problems! Read More
    Bob KD8RLA
    HAMARC

Copyright © 2025 · RSL Computer Solutions, LLC · 10 Douglas Ln, Hamilton, Ohio 45011