<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">
Need Better I.T. Support Results? Call Today 800.481.4369 Client Support Center

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

Your #1 MUST-DO Resolution for 2017

With every New Year comes the chance to reset priorities. Unfortunately, when the topic of implementing a data recovery plan comes up, the comment we most often hear is “I know I should, but I haven’t gotten around to it yet…”

So…what if the pilot on the next flight you’re on announces right after takeoff, “I know we should have run through our preflight checklist, but we haven’t gotten around to it yet…”???

Without a solid backup and recovery plan in place, just one mission-critical file that gets lost or stolen could put your company in a world of serious hurt. When you compare the high cost of replacement, repair and recovery to the relatively trivial price of keeping good backups, the choice is an absolute no-brainer.

Read More

$1.5M Cyber-Heist Typifies Growing IT Security Threat

Efficient Escrow of California was forced to close its doors and lay off its entire staff when cybercriminals nabbed $1.5 million from its bank account. The thieves gained access to the escrow company’s bank data using a form of “Trojan horse” malware.

Read More

Top 4 Email and Online Scams To Avoid This Holiday Season

Ready or not, the holiday season is upon us. While you are shopping for gifts, attending parties, and drinking hot cider, the scammers are going to work. 

Here are four scams to avoid this holiday season:

Be on the lookout for fake emails from shipping providers like UPS and FedEx.

With friends and family mailing gifts to one another, it’s likely that you and your employees will receive notifications from carriers, such as UPS or FedEx, notifying you that a package has been delivered.

Whether you were expecting something or not, the intrigue will cause most people to read the message and try to find out what it might be.

Is it the gift I ordered for my wife? Or maybe it’s the gifts Grandma sent?

Scammers capitalize on this intrigue by asking you to give them information that may be used to steal your identity, or by deploying viruses onto your network when you click links or attachments.

Be extra careful when clicking on links or attachments in emails this season, and think twice before you provide information to anyone on the Internet.

Read More

Password Best Practices

In the last quarter, some big names in the business world had their systems compromised and passwords were leaked. LinkedIn, Yahoo, and Dropbox are just a few notable companies that were affected by major security breaches. Each breach was unique, but they all resulted in some of their users’ login credentials becoming public information.

It was mainly consumers who were inconvenienced by having their login information revealed to the masses, but businesses could also be affected.

If the people whose information was hacked use the same login credentials for company sites like Salesforce.com or Quickbooks Online — or worse, your network — then your business could be at risk. If that were the case, hackers would have open access to your email, financial records, client information and other information.

Read More