Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

By Roger Murray | January 16th, 2018 | Network Security

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

Top 25 Most Popular Passwords of 2017

By Roger Murray | December 27th, 2017 | Network Security

Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.  Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.

Google Partners with ESET to Provide Malware Detection for Chrome

By Scott Evans | November 2nd, 2017 | Network Security

Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer.  The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.

Four Ways Ransomware Can Destroy Your Backups

By Chris Souza | September 14th, 2017 | Network Security

I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing … Continued

The Current State of Ransomware Among SMBs

By Roger Murray | August 1st, 2017 | Network Security

In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In … Continued

Data Breaches Up 29 Percent Over Last Year

By Roger Murray | July 26th, 2017 | Network Security

Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.  Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did … Continued

Is Online Privacy Dead?

By Roger Murray | July 7th, 2017 | Business Operations

Privacy…we all talk about it and we’re all concerned with losing it, but does it really matter?  There are 1.94 billion active monthly Facebook users, 3.5 billion daily Google searches, and over 95 million photos & videos shared on Instagram each day.  These are a few examples of the many apps, fun quizzes & surveys, … Continued

3 Tips To Ensure A Smooth Migration To Microsoft Azure

By Roger Murray | April 24th, 2017 | Cloud Services

Microsoft Azure is a cloud computing platform, among many functionalities Azure delivers solid recovery and replication services to ensure business continuity. But before implementing Azure for your organization, we recommend a few simple tips to making the process that much smoother… Develop an Implementation Roadmap When it comes to implementing a new cloud computing platform … Continued

eCommerce Security Tips

By Isaiah Bollinger | April 6th, 2017 | Network Security

eCommerce security is a constantly evolving topic for any organization, regardless of their size.  As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites.  One of questions I often face is what a new or smaller business can do to improve their … Continued

Experiencing Security Fatigue?

By Gerard Louise | March 10th, 2017 | Network Security

As the CEO of an IT company, I often find myself speaking to people about what my company offers and what services we provide. Inevitably, the discussion will segue from technology, to the topic of internet security and privacy.  We all desire complete control over what information we share, but it often feels like it … Continued

Need Support? Call Us Today

Available 24 hours a day, 7 days a week