Posts

Computer security

Google Docs Imposter

By James Dahl / July 18, 2019 /

The latest Malware Scam you may not have heard of Google Docs is a great way to document share for individuals and businesses alike. With the click of your mouse, you can send an email directly to a recipient you want to share a document with, giving them the capability to view, edit, and download…

Read More
Emergency hospital

Healthcare Professionals and Cyberattacks

By James Dahl / July 18, 2019 /

Why is the Doc an easy target? When it comes to data breaches and cyberattacks, healthcare organizations are a prime target. There are a few reasons why this is the case:  1) their IT infrastructure has a tendency to be older and connected in ways that create convenient attack surfaces, 2) minimizing IT staff combined…

Read More
Phone email security

Why Hosted Exchange for your Email?

By James Dahl / July 18, 2019 /

WHAT IS HOSTED EXCHANGE? Microsoft Exchange Server is the leading business-grade messaging system employed in North America and is currently used by 180 million people worldwide. Exchange offers a number of capabilities, including email, calendaring, task management, address lists, and access to shared document repositories, and other functions. Exchange was originally introduced in June 1996…

Read More
Security from ransomware

Containing a Ransomware Outbreak

By James Dahl / July 18, 2019 /

After shutting down the computer of the affected user and taking her off the network, we determined she had been hit with the CryptoWall ransomware. We had 90 percent of our files be encrypted. This impacted every user in our whole company. – Luke Skibba, @Gigabitgeek Ransomware is hard to spot while it’s encrypting user files.…

Read More
Preventing Rogue Employee Access

Preventing Rogue Employee Access

By James Dahl / July 18, 2019 /

Intermedia and Osterman Research recently surveyed knowledge workers about their access to former employers’ IT systems. An incredible 89% of respondents retained access to at least one system—such as Salesforce, PayPal, email, SharePoint and other sensitive corporate apps. What can we do as business owners to avoid the snakes in the grass? One of Osterman…

Read More