<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">
Need Better I.T. Support Results? Call Today 800.481.4369 Client Support Center

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

What To Do When Your Email Has Been Hacked

A colleague got an odd email from you, but you didn’t send it. … How did this happen? Were you hacked?

With the right IT security measures in place, successful attacks on corporate email systems are rare, but they do happen.

So what should you do when you think you’ve been hacked?

Read More
Topics: I.T. Security

Could One Tiny Leak Wipe Out Your Entire Company?

Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company.


He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists. Life was good for this middle-aged businessman from Detroit.

Then, one Tuesday afternoon in May 2008, the phone call came that changed his life. His general manager came in to tell Daugherty about a call he’d just fielded from a man claiming to have nabbed a file full of LabMD patient documents. For a medical business that had to comply with strict federal rules on privacy, this was bad. Very bad.

Read More
Topics: I.T. Security

Go Mobile - Without Killing Your Data

What if you could tap into the top talent in your industry, no matter where in the world they are? With the power of the mobile web, your all-star team is now – literally – at your fingertips.

Read More
Topics: I.T. Security

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype. It can include software from Excel macros to cloud-based data storage apps such as Dropbox, Google Docs and Evernote. Or collaboration spaces like Slack, Asana and Wrike. And then there are devices: USB sticks, smartphones, tablets and laptops within your network that you have no control over.

Robert J. Moore, CEO of RJMetrics, relates how companies like Slack and Dropbox craft their pricing models to encourage rapid proliferation. One day, a few of his engineers were using Slack, then all the engineers, then the whole rest of the company was using it. He said, “We reached a point of no return and paying for it was pretty much our only option.”

Read More
Topics: I.T. Security

Social Engineering & IT Security: What Businesses Need To Know

Keyboard_hacker.jpg

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful.

The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

There are few places where power is abused more dangerously than in the cybercrime industry. According to “Net Losses: Estimating the Global Cost of Cybercrime,” a report published by McAfee, the cost to the global economy could be as high as $575 billion a year.

How should your business enlist in the global fight against cybercrime? As always, it is important to ensure you’re using the right combination of hardware and software to keep illicit software (malware) from being transmitted to your company’s network – but there is a new threat, and that threat is you.

Read More
Topics: I.T. Security

10 Things You Must Do Now To Prevent A Costly Data Disaster

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster…

Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes.

Read More

Beware of "Linkedin Helpdesk" Emails

One of the ways hackers like to get into networks is to pose as popular and familiar organizations - such as banks and social networks - to lure users into clicking on malicious links and attachments.

One of the latest examples of this is an email going around from "Linkedin Helpdesk" (photo included this post).

Read More
Topics: I.T. Security

Top 4 Ways Hackers Infiltrate Your Business Network

Cybercrime is on the rise and is making the news – in fact, just last month The Press-Enterprise reported data breaches at two local hospitals in Chino and Victorville. These criminals are getting bolder and more sophisticated, and if the success of your business is contingent on the availability and security of your data, then you need to ensure you are protected against these attacks.

You may be thinking that well orchestrated cybercrime only affects large companies, but for every cybersecurity story you hear on the news, there are thousands of similar untold stories from small and midsize businesses. Often times they’re preying on your employees.

Read More
Topics: I.T. Security

Relying On A Good Luck Charm?

Carrying a four-leaf clover might work for leprechauns. But when it comes to Internet abuse by employees, you’re gonna need more than sheer luck…

Did you know that…

  • 70% of all web traffic to Internet pornography sites occurs during the work hours of 9 a.m. – 5 p.m.
  • Non-work-related Internet surfing results in up to a 40% loss in productivity each year at American businesses.
  • According to a survey by International Data Corp (IDC), 30% to 40% of Internet access is spent on non-work-related browsing, and a staggering 60% of all online purchases are made during working hours.
Read More