How a Defense-in-Depth Strategy Protects Businesses from Ransomware and other Cyberattacks

posted in: Blog | 0

The WannaCrypt Scare – Part 2 The global WannaCrypt ransomware attack that started on Friday, May 12, 2017 was unprecedented in scale.  It infected more than 230,000 computers in at least 150 countries.  It also caused concern for many other … Read More

Ransomware Prevention – Responding to WannaCrypt

posted in: Blog | 0

The WannaCrypt Scare – Part I The global WannaCrypt ransomware attack that hit over 230,000 victims in at least 150 countries on Friday 5/12/17 sparked concern about how businesses can best protect themselves from ransomware. What is Ransomware? Ransomware is … Read More

Skype for Business PSTN Conferencing: A complete online meeting solution!

posted in: Blog | 0

Online meetings are becoming increasingly popular.  Online meetings using video conferencing solutions enable people in different locations – from the same company or from several companies – to meet virtually, without the need to spend time and money on travel. … Read More

Last Call to Upgrade to Windows 10 for Free! Should Your Business Upgrade Now?

posted in: Blog | 0

Has your business upgraded your computers to Windows 10?  The last date to upgrade to Windows 10 for free is July 29, 2016, and it’s quickly approaching! You could continue to use your Windows 7 or Windows 8.1 until the … Read More

Simplify Conference Room Booking with Evoko Room Managers

posted in: Blog | 0

More and more we are finding that today’s modern offices utilize an open concept design, where everyone sits in an open cubicle from the CEO on down. While this atmosphere encourages collaboration and a sense of community work, there is … Read More

Microsoft’s Office 365 E5 adds New Phone and Conference Features!

posted in: Blog | 0

Starting this week, Microsoft now offers a new premium enterprise Office 365 suite which adds new phone and conference features! Office 365 is the name for Microsoft’s subscription plans that include Office applications (Word, Excel, PowerPoint, Publisher, OneNote, and Outlook) … Read More

Consider End-of-Life When Preparing Your Strategic IT Plan

posted in: Blog | 0

Planning for the future of your business includes planning for your IT needs.  An important consideration is whether your technology has reached end-of-life. “End-of-life” (EOL) indicates that the vendor considers the product to be at the end of its useful … Read More

SECURITY ALERT: CryptoWall 4.0 – an Even Greater Threat than Previous Versions

posted in: Blog | 0

CryptoWall ransomware has evolved since it first appeared in 2014. The newest strain of CryptoWall has new features that make it an even greater threat than previous versions. What’s Different in this CryptoWall version? CryptoWall is a form of malware … Read More

Surprising Advice from the FBI to Victims of Ransomware: Pay the Ransom!

posted in: Blog | 0

Surprisingly, if your company is a victim of ransomware, the Federal Bureau of Investigation (FBI) now advises that you to pay the ransom! Why does the FBI recommend paying the ransom? Joseph Bonavolonta, the Assistant Special Agent in Charge of … Read More

Ransomware Strikes Again! This Time Through Remote Desktop and Terminal Services

posted in: Blog | 0

A new strain of ransomware has been discovered.  This one, called LowLevel04, is being circulated by targeted Remote Desktop or Terminal Services hacks. Unlike ransomware in the Cryptolocker family which encrypts the files on a computer when its user clicks … Read More

Organizations with Inadequate Data Security Practices Can Be Sued by the FTC

posted in: Blog | 0

Yet another reason to step-up your security practices to protect your customer information… the FTC can sue you if you don’t! The FTC collects complaints about hundreds of issues including data security, and makes them available to law enforcement agencies … Read More

SECURITY ALERT: Beware of Windows 10 Upgrade Scams

posted in: Blog | 0

Scammers are taking advantage of the confusion in the wake of Microsoft’s Operating System upgrade to trick users through phishing campaigns that install ransomware and fraudulent call centers that demand payment. Windows 10 Upgrade Scams Windows users, who may not … Read More

SECURITY ALERT: Critical Patch for Remote Desktop Protocol

posted in: Blog | 0

Does your organization run a Terminal Server (Remote Desktop Services server)? Or does your Windows desktop have Remote Desktop Protocol (RDP) enabled?  If so, you need to deploy Microsoft’s security update! A critical vulnerability found in Microsoft Windows could allow … Read More

Office 365 and Office for Mac 2016: Perfect Together

posted in: Blog | 0

Do you use Office 365 on a Mac?  Then you’ll be happy to learn that Microsoft recently released Office for Mac 2016 and it’s available free for Office 365 customers!  (That is, for subscribers with full installed Office applications.)  Office … Read More

Digital Signatures Simplify the Signature Process

posted in: Blog | 0

Businesses often require signatures on documents to signify knowledge, approval, acceptance or obligation.  Printing the documents to have them signed is a common practice.  Even businesses that automate the workflow in their office often print the final document to have … Read More

Sending Sensitive Information? How to Send – and Receive – Encrypted Email

posted in: Blog | 0

You’ve heard it before.  Sensitive information being sent by email must be encrypted.  This is required by HIPAA for “covered entities” including doctors and other healthcare providers sending patient information by email.  Other businesses (and individuals) should use encrypted email … Read More

Optimize Your Business Systems with Managed IT Services

posted in: Blog | 0

Are you looking for an IT services provider, but are unsure what services they can or should provide to optimize the performance of your business systems? In the past, when you called your IT services provider in regard to an … Read More

SECURITY ALERT: New CryptoWall Scam uses Zipped Resume and Compromised Websites

posted in: Blog | 0

Hiring?  If you’re looking at resumes, beware of this newest CyrptoWall scam!  The attacker sends a zip file “resume” attachment which infects your computer with malware that encrypts your files.  There has been an increase in this type of malicious … Read More

SECURITY ALERT: New Android Ransomware Poses as FBI Warning

posted in: Blog | 0

A new “FBI” malware is targeting Android users, locking their devices and demanding payment to restore their smartphones.  Cybercriminals have sent more than 15,000 spam emails over the past three days to distribute this ransomware.  Ransomware is malware that demands … Read More

Protecting Your Business from Hackers

posted in: Blog | 0

The Cybersecurity Unit of the Department of Justice (DOJ) recently released an outline of cybersecurity best practices.  The document discusses what to do before and after a cyber-incident.  The DOJ advises you to take specific steps before a cyber-intrusion or … Read More

Business Email Solutions Protect Your Company’s Reputation and Data Security

posted in: Blog | 0

Most businesses use email for exchanging information with other businesses, with customers and with prospects.  Yet, if appropriate email solutions are not used, email can be a source of problems for your business.  To protect your company’s reputation and data … Read More

SECURITY ALERT: Rombertik Malware Destroys Your Hard Drive If Detected

posted in: Blog | 0

A new form of spyware is making headlines.  Rombertik is designed to steal usernames and passwords, but if it finds that its actions are being monitored, it attacks the user’s hard drive. Like other malware including Dyre and Cryptolocker, Rombertik … Read More

IT Disaster Planning: An Essential Element of Data Protection and Business Continuity

posted in: Blog | 0

If your company is like most, it is becoming increasingly dependent on your software applications and electronic documents to conduct business.  Yet, there are so many disasters that can make your data inaccessible to you.  From natural disasters such as … Read More

Top 10 Cyber Security Training Tips for Your Company’s Employees

posted in: Blog | 1

Even if your company does everything right to protect your data, your employees can unwittingly give cyber attackers access to your company’s sensitive information.  As a followup to our recent post on human error being a major risk factor to data … Read More