Chat with us, powered by LiveChat

Blog

  • All
  • Administration
  • Security
  • Server Administration
Preventing Rogue Employee Access
Preventing Rogue Employee Access
Intermedia and Osterman Research recently surveyed knowledge workers about their access to former employers’ IT systems. An incredible 89% of respondents retained access to at least one system—such as Salesforce, PayPal, email, SharePoint and other sensitive corporate apps. What can we do as business owners to avoid the snakes in the grass? One of Osterman…
Security from ransomware
Containing a Ransomware Outbreak
After shutting down the computer of the affected user and taking her off the network, we determined she had been hit with the CryptoWall ransomware. We had 90 percent of our files be encrypted. This impacted every user in our whole company. – Luke Skibba, @Gigabitgeek Ransomware is hard to spot while it’s encrypting user files.…
Phone email security
Why Hosted Exchange for your Email?
WHAT IS HOSTED EXCHANGE? Microsoft Exchange Server is the leading business-grade messaging system employed in North America and is currently used by 180 million people worldwide. Exchange offers a number of capabilities, including email, calendaring, task management, address lists, and access to shared document repositories, and other functions. Exchange was originally introduced in June 1996…
Emergency hospital
Healthcare Professionals and Cyberattacks
Why is the Doc an easy target? When it comes to data breaches and cyberattacks, healthcare organizations are a prime target. There are a few reasons why this is the case:  1) their IT infrastructure has a tendency to be older and connected in ways that create convenient attack surfaces, 2) minimizing IT staff combined…
Computer security
Google Docs Imposter
The latest Malware Scam you may not have heard of Google Docs is a great way to document share for individuals and businesses alike. With the click of your mouse, you can send an email directly to a recipient you want to share a document with, giving them the capability to view, edit, and download…
Business man working on computers
You Should Never Call Back an Unknown Number
This is one the newest scams and we’ve all had it happen: You look at your phone and notice a missed call from a familiar-looking number that isn’t in your contacts. Scammers are purposely calling numbers, hanging up, and hoping your first instinct might be to call back and see who it was, but that’s…