<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

IT Untangled: 1 in 5 Businesses Are Affected By Cybercrime, Are You Next?

One in five small businesses are affected by cybercrime each year. – The National Cyber Security Alliance.

Let that sink in. One in five. That is some serious risk. While companies like Target and Sony have the financial support to get them through this kind of scandal, do you?

Read More

Tech Alert: Macs and Malware, Crypto Ransomware Is on Your Tracks

Will macOS and iOS be able to handle the malware specifically targeted at Mac in 2017?

Apple is known to have some of the best built-in security protections on the market. But like everything, there are limitations to what it can protect you from.

Read More

Tech Alert: Are You Making These BIG IT Security Mistakes?

If you think cyber-attacks only happen to big businesses, think again. Over the past 5 years, the rate of attacks on small and midsized businesses has nearly doubled. Your IT is your foundation.  And the security of it is even more significant.

Read More

Tech Alert: Cyber Attacks On The Rise

Hackers were real show-stoppers in 2016. Globally, data breaches and technology disruptions were sweeping everyone.

Today, cyber attackers use things outside of the normal social media and websites to hack you. They’re using things like artificial intelligence and smart infrastructure or devices. The Internet of Things (IoT), although amazing for advancements, also leaves us very vulnerable.

Read More

IT Untangled: Does Your Work Phone Need Antivirus?

Does your smartphone have a virus? Would you know how to determine if it did? There are security vulnerabilities on your phone just like on your desktop or laptop. These vulnerabilities are likely to double if you use your work smartphone for sensitive information. Think email accounts, transactions, or accounts receivable. If any or all of that is linked to your phone without the proper security precautions, you might as well post your bank account number and pin on Facebook.

Read More

That Fake App Just Stole Your ID

Ryan loved tweaking photos on his Android phone.  

He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.

To his surprise, he found one that looked just like what his friends were describing. Delighted, he downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on his phone.

When he got to work the next day, he logged his phone into the company network as usual. The malware jumped from his phone to the network. Yet no one knew. Not yet, but that was about to change…

Read More

Look Out for Tax Time IT Security Risks & Common Scams

Cybersecurity is a hot topic these days. New threats are cropping up daily and hackers are using more sophisticated tactics to lure people into falling for their scams.

Hackers are exceptionally good at tying their schemes to trends, events, or a time of year. They fit themselves in to what’s already going on in your life, which increases the probability that you’ll take the bait. We are in one of the times right now – tax season.

These first few months of the year are when we’re gathering documentation from financial institutions, discussing details with tax professionals, filing taxes, and potentially communicating with the IRS about statements, bills, or refunds. The hackers know this and they capitalize on it.

Read More

Your #1 MUST-DO Resolution for 2017

With every New Year comes the chance to reset priorities. Unfortunately, when the topic of implementing a data recovery plan comes up, the comment we most often hear is “I know I should, but I haven’t gotten around to it yet…”

So…what if the pilot on the next flight you’re on announces right after takeoff, “I know we should have run through our preflight checklist, but we haven’t gotten around to it yet…”???

Without a solid backup and recovery plan in place, just one mission-critical file that gets lost or stolen could put your company in a world of serious hurt. When you compare the high cost of replacement, repair and recovery to the relatively trivial price of keeping good backups, the choice is an absolute no-brainer.

Read More

$1.5M Cyber-Heist Typifies Growing IT Security Threat

Efficient Escrow of California was forced to close its doors and lay off its entire staff when cybercriminals nabbed $1.5 million from its bank account. The thieves gained access to the escrow company’s bank data using a form of “Trojan horse” malware.

Read More

Top 4 Email and Online Scams To Avoid This Holiday Season

Ready or not, the holiday season is upon us. While you are shopping for gifts, attending parties, and drinking hot cider, the scammers are going to work. 

Here are four scams to avoid this holiday season:

Be on the lookout for fake emails from shipping providers like UPS and FedEx.

With friends and family mailing gifts to one another, it’s likely that you and your employees will receive notifications from carriers, such as UPS or FedEx, notifying you that a package has been delivered.

Whether you were expecting something or not, the intrigue will cause most people to read the message and try to find out what it might be.

Is it the gift I ordered for my wife? Or maybe it’s the gifts Grandma sent?

Scammers capitalize on this intrigue by asking you to give them information that may be used to steal your identity, or by deploying viruses onto your network when you click links or attachments.

Be extra careful when clicking on links or attachments in emails this season, and think twice before you provide information to anyone on the Internet.

Read More