Protect Your Organization from Phishing Attacks

Phishing scams have become more and more common.  We are all bombarded by “Bad Actors” attempting to steal our information.  By utilizing the latest technology, training your users and monitoring their activity, and using sound judgement, attacks can be mitigated … Read More

How a Defense-in-Depth Strategy Protects Businesses from Ransomware and other Cyberattacks

The WannaCrypt Scare – Part 2 The global WannaCrypt ransomware attack that started on Friday, May 12, 2017 was unprecedented in scale.  It infected more than 230,000 computers in at least 150 countries.  It also caused concern for many other … Read More

Ransomware Prevention – Responding to WannaCrypt

The WannaCrypt Scare – Part I The global WannaCrypt ransomware attack that hit over 230,000 victims in at least 150 countries on Friday 5/12/17 sparked concern about how businesses can best protect themselves from ransomware. What is Ransomware? Ransomware is … Read More

Skype for Business PSTN Conferencing: A complete online meeting solution!

Online meetings are becoming increasingly popular.  Online meetings using video conferencing solutions enable people in different locations – from the same company or from several companies – to meet virtually, without the need to spend time and money on travel. … Read More

Consider End-of-Life When Preparing Your Strategic IT Plan

Planning for the future of your business includes planning for your IT needs.  An important consideration is whether your technology has reached end-of-life. “End-of-life” (EOL) indicates that the vendor considers the product to be at the end of its useful … Read More

SECURITY ALERT: CryptoWall 4.0 – an Even Greater Threat than Previous Versions

CryptoWall ransomware has evolved since it first appeared in 2014. The newest strain of CryptoWall has new features that make it an even greater threat than previous versions. What’s Different in this CryptoWall version? CryptoWall is a form of malware … Read More

Surprising Advice from the FBI to Victims of Ransomware: Pay the Ransom!

Surprisingly, if your company is a victim of ransomware, the Federal Bureau of Investigation (FBI) now advises that you to pay the ransom! Why does the FBI recommend paying the ransom? Joseph Bonavolonta, the Assistant Special Agent in Charge of … Read More

Ransomware Strikes Again! This Time Through Remote Desktop and Terminal Services

A new strain of ransomware has been discovered.  This one, called LowLevel04, is being circulated by targeted Remote Desktop or Terminal Services hacks. Unlike ransomware in the Cryptolocker family which encrypts the files on a computer when its user clicks … Read More

SECURITY ALERT: Critical Patch for Remote Desktop Protocol

Does your organization run a Terminal Server (Remote Desktop Services server)? Or does your Windows desktop have Remote Desktop Protocol (RDP) enabled?  If so, you need to deploy Microsoft’s security update! A critical vulnerability found in Microsoft Windows could allow … Read More

Office 365 and Office for Mac 2016: Perfect Together

Do you use Office 365 on a Mac?  Then you’ll be happy to learn that Microsoft recently released Office for Mac 2016 and it’s available free for Office 365 customers!  (That is, for subscribers with full installed Office applications.)  Office … Read More

Optimize Your Business Systems with Managed IT Services

Are you looking for an IT services provider, but are unsure what services they can or should provide to optimize the performance of your business systems? In the past, when you called your IT services provider in regard to an … Read More

Protecting Your Business from Hackers

The Cybersecurity Unit of the Department of Justice (DOJ) recently released an outline of cybersecurity best practices.  The document discusses what to do before and after a cyber-incident.  The DOJ advises you to take specific steps before a cyber-intrusion or … Read More

SECURITY ALERT: Rombertik Malware Destroys Your Hard Drive If Detected

A new form of spyware is making headlines.  Rombertik is designed to steal usernames and passwords, but if it finds that its actions are being monitored, it attacks the user’s hard drive. Like other malware including Dyre and Cryptolocker, Rombertik … Read More

IT Disaster Planning: An Essential Element of Data Protection and Business Continuity

If your company is like most, it is becoming increasingly dependent on your software applications and electronic documents to conduct business.  Yet, there are so many disasters that can make your data inaccessible to you.  From natural disasters such as … Read More

Top 10 Cyber Security Training Tips for Your Company’s Employees

Even if your company does everything right to protect your data, your employees can unwittingly give cyber attackers access to your company’s sensitive information.  As a followup to our recent post on human error being a major risk factor to data … Read More