<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

Tech Alert: Phishing Scams -- Can They Be Avoided?

76 percent of organizations have suffered phishing attacks.Wombat 2017 State of Phish

 “Go fish” just got a whole new meaning.

Phishing scams are getting harder to detect. Pronounced “fishing,” phishing is a way for hackers to get you to turn over passwords, sensitive company data, and bank account information. Usually, it comes in an email, but it can also be web-linked. Hackers plagiarise bank and payment services like PayPal’s logos and email templates to look like real emails. That’s why they’re so hard to detect!

Read More

Tech Minute: The End of Exchange Server 2007 Support

And that’s all she wrote. Thank you for your ten years of service, but Exchange Server 2007 has reached its end-of-life.

Starting April 11th, 2017, it will no longer be supported by Microsoft and here is what it means for you.

Read More

IT Untangled: 1 in 5 Businesses Are Affected By Hackers, Are You Next?

One in five small businesses are affected by cybercrime each year. – The National Cyber Security Alliance.

Let that sink in. One in five. That is some serious risk. While companies like Target and Sony have the financial support to get them through this kind of scandal, do you?

Read More

Tech Alert: Macs and Malware, Crypto Ransomware Is on Your Tracks

Will macOS and iOS be able to handle the malware specifically targeted at Mac in 2017?

Apple is known to have some of the best built-in security protections on the market. But like everything, there are limitations to what it can protect you from.

Read More

Tech Alert: Are You Making These BIG IT Security Mistakes?

If you think cyber-attacks only happen to big businesses, think again. Over the past 5 years, the rate of attacks on small and midsized businesses has nearly doubled. Your IT is your foundation.  And the security of it is even more significant.

Read More

Tech Alert: Cyber Attacks On The Rise

Hackers were real show-stoppers in 2016. Globally, data breaches and technology disruptions were sweeping everyone.

Today, cyber attackers use things outside of the normal social media and websites to hack you. They’re using things like artificial intelligence and smart infrastructure or devices. The Internet of Things (IoT), although amazing for advancements, also leaves us very vulnerable.

Read More

IT Untangled: Does Your Work Phone Need Antivirus?

Does your smartphone have a virus? Would you know how to determine if it did? There are security vulnerabilities on your phone just like on your desktop or laptop. These vulnerabilities are likely to double if you use your work smartphone for sensitive information. Think email accounts, transactions, or accounts receivable. If any or all of that is linked to your phone without the proper security precautions, you might as well post your bank account number and pin on Facebook.

Read More

That Fake App Just Stole Your ID

Ryan loved tweaking photos on his Android phone.  

He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.

To his surprise, he found one that looked just like what his friends were describing. Delighted, he downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on his phone.

When he got to work the next day, he logged his phone into the company network as usual. The malware jumped from his phone to the network. Yet no one knew. Not yet, but that was about to change…

Read More

Look Out for Tax Time IT Security Risks & Common Scams

Cybersecurity is a hot topic these days. New threats are cropping up daily and hackers are using more sophisticated tactics to lure people into falling for their scams.

Hackers are exceptionally good at tying their schemes to trends, events, or a time of year. They fit themselves in to what’s already going on in your life, which increases the probability that you’ll take the bait. We are in one of the times right now – tax season.

These first few months of the year are when we’re gathering documentation from financial institutions, discussing details with tax professionals, filing taxes, and potentially communicating with the IRS about statements, bills, or refunds. The hackers know this and they capitalize on it.

Read More

Your #1 MUST-DO Resolution for 2017

With every New Year comes the chance to reset priorities. Unfortunately, when the topic of implementing a data recovery plan comes up, the comment we most often hear is “I know I should, but I haven’t gotten around to it yet…”

So…what if the pilot on the next flight you’re on announces right after takeoff, “I know we should have run through our preflight checklist, but we haven’t gotten around to it yet…”???

Without a solid backup and recovery plan in place, just one mission-critical file that gets lost or stolen could put your company in a world of serious hurt. When you compare the high cost of replacement, repair and recovery to the relatively trivial price of keeping good backups, the choice is an absolute no-brainer.

Read More