Technology Articles from MPA Networks

Malware is Running Rampant - Learn The 3 Moves to Stop It

April 15th, 2021 by admin

A man in a dark gray hoodie with his arms crossed and face obscured, coming out of an open laptop.

MPA Networks, Inc. Helps Customers Protect Their Precious Networks SAN MATEO, CA - MPA Networks, Inc. a leading managed technology services provider (MTSP), proactively helps businesses address the increased threat of malware affecting small to mid-sized businesses (SMBs) in 2021. As more companies...

Read Full Story »

Posted in: Cyber and Data Security, Press Release

Protect Your Business with MPA Networks’ Cybersecurity Solutions

December 8th, 2020 by admin

Hacker typing on two keyboards overlaid with the words 'data breach' in orange letters

Moving to the cloud will increase your business's cybersecurity. The secure data centers utilized to host data and applications are much more secure than what would typically be found in an on-premise setup. There are many different ways that hackers can get into your data network, from phishing attacks...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Our Technology Thwarts Cryptojacking

October 15th, 2020 by admin

A hacker in a dark hoodie typing on two keyboards, one for each hand, while orangish red test floats around them

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) to prevent cryptojacking attacks from damaging their organizations. Cryptojacking attacks, are derived from the widely popular cryptocurrencies, such as Bitcoin...

Read Full Story »

Posted in: Press Release

Offering Next Generation Cybersecurity Solutions

August 23rd, 2020 by admin

A man writing on a notebook while there is paperwork with graphs and charts scattered beneath it

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) equip themselves with the necessary cybersecurity protections that every modern company needs to survive. Over the past, large organizations including Target,...

Read Full Story »

Posted in: Press Release

Be on the Lookout for Rising Number of COVID-19 Phishing Attacks

April 21st, 2020 by admin

A blue digital lock with various connected devices and a person hand pointing at the lock

Hackers will often look to exploit any weakness they can find, whether it is technological means or through human curiosity and concern. With the rapid rise of COVID-19 across the globe, hackers are ramping up their phishing attack efforts. These efforts are slipping past Microsoft 365 ATP's and getting...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

MPA Networks Protects Your Network From Security Threats

January 16th, 2020 by admin

Blue shield with keyhole providing protection from cybersecurity

Protecting your data networks is one of the most important things your company can do. At MPA Networks, our experience and expertise enable us to bring the most innovative cybersecurity solutions to the table. There are numerous types of cyberattacks, but the most common for small businesses...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

MPA Networks, Inc. Educates Customers on Ransomware

August 5th, 2019 by admin

Close Up of Red Information Security Button on Computer Keyboard with Blue Keys Cyber Security Concept

SAN MATEO, CA – MPA Networks, Inc., a leading managed technology services provider, announced today that they have launched a ransomware awareness campaign. The purpose of the campaign is to quickly educate business owners in understanding one of the latest threats now facing small to mid-sized...

Read Full Story »

Posted in: Press Release

Cyber-Security Brings Peace of Mind to Business Owners and their IT Networks

January 4th, 2019 by admin

Cyber Security in text above a laptop with the image of a masked criminal, as well as a green check mark and a gold lock

San Mateo, CA – We are excited to announce the launch of an awareness campaign on recent advancements in cyber security. As technology has become even more central to business operations, hackers have grown in proficiency and are posing several new threats to business owners. We are actively...

Read Full Story »

Posted in: Cyber and Data Security

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlayed with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network security solutions for your business, no matter the...

Read Full Story »

Posted in: Cyber and Data Security

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is a combined process of utilizing technology and educating...

Read Full Story »

Posted in: Cyber and Data Security

Addressing the Unique IT Management Needs at Law Firms

April 11th, 2018 by admin

Close of up businessman's holding a pen, wearing a black watch and a gold wedding band

Law firms face many unique IT management challenges that stem from the confidential nature of the information they work with. And that confidential data is why law firms must make the protection of information a key IT priority. Threats can come from outside (such as hackers using pressure to extort...

Read Full Story »

Posted in: Partners and Industries

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of a cyberattack, a data breach costs an enterprise...

Read Full Story »

Posted in: Cyber and Data Security

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected devices overwhelm a target with data traffic....

Read Full Story »

Posted in: Cyber and Data Security

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing technique is particularly bothersome because it...

Read Full Story »

Posted in: Cyber and Data Security

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Stethscope, glasses, and pills resting on a paper ECG readout

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry receives a whopping 15 percent of all ransomware...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised security at least once for 79.2 percent of businesses...

Read Full Story »

Posted in: Cyber and Data Security

Scheduling Security: Take Control of Your OS Updates

May 10th, 2017 by admin

The word 'update' written in chalk on a blackboard, with a red analog clock between the 'p' and 'd' letters

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration turns what should have been a four-minute job...

Read Full Story »

Posted in: Hardware and Software

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

Skull and crossbones symbol drawn with 1s and 0s

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this new malware "Fruitfly," and it's being used to target...

Read Full Story »

Posted in: Cyber and Data Security

8 Spring Cleaning Tips for Your Office Computers

March 1st, 2017 by admin

Stylized green bucket, with a blue squeegee and a gray dust buster vacuum

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you'll never know all the breakdowns you avoided. Keeping your office...

Read Full Story »

Posted in: Hardware and Software

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of “the sum is greater than the parts” but rather “less...

Read Full Story »

Posted in: Hardware and Software

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack from compromised Internet of Things (IoT) devices....

Read Full Story »

Posted in: Cyber and Data Security

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

You Have Been Hacked - cartoon of a robber climbing out of a black laptop

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different form of cyber-threat plaguing businesses over the...

Read Full Story »

Posted in: Cyber and Data Security

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission that they're virtually powerless to stop it. Mostly...

Read Full Story »

Posted in: Cyber and Data Security

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which expose confidential information of 500 or more individuals,...

Read Full Story »

Posted in: Cyber and Data Security

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's nothing wrong with sticking with "obsolete" hardware...

Read Full Story »

Posted in: Hardware and Software

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

Clip art of two badges, one red with an 'X' and the other green with a check mark

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks to some quick thinking and online research, he...

Read Full Story »

Posted in: Cyber and Data Security

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. On March 4, researchers at security firm Palo Alto...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout the building or the Smart TV in the conference room...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A lock with a black and yellow hazard stripe, with a key inserted into it

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of time and finances. It’s estimated that businesses...

Read Full Story »

Posted in: Cyber and Data Security

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

Clip art of a hand holding a bag with a dollar sign on it, in black and white

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned never to feed bears and other wildlife—because...

Read Full Story »

Posted in: Cyber and Data Security

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Silhouette of Sherlock Holmes smoking a pipe and looking through a magnifying glass

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated our network, probably for a while now—where and...

Read Full Story »

Posted in: Cyber and Data Security

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Yellow, triangular shaped sign with a black exclamation point on it

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities were low-threat, others were more critical,...

Read Full Story »

Posted in: Cyber and Data Security

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

Two signs: 'Safety First' and 'www', against an ominous looking black web/network effect

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email links and shady websites. But there's a bigger threat...

Read Full Story »

Posted in: Cyber and Data Security

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

Black calculator sitting on a sheet of data, next to an uncapped silver pen

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover you've still been hacked? An insurance policy...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

'Tis the Season—for Small Business Cybercrime. Here’s How to Protect Your Company

January 7th, 2015 by admin

Hand cursor touching a 'Do Not Enter' sign against a field of red '@' symbols

The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S. "Targeting" Target—via Small Businesses You may have seen a segment on the November 30 broadcast of 60...

Read Full Story »

Posted in: Cyber and Data Security

Beware Email Spoofing! Protect Yourself Now!

April 4th, 2014 by admin

Cartoon of a man at a keyboard holding four masks, against a yellow background

We have recently seen a rise in a disturbing phishing scam called email spoofing. Email Spoofing A spoof email is an email that looks as if it came from a trusted friend or acquaintance, but is actually malicious in nature. These emails are particularly nasty because they really look like they are...

Read Full Story »

Posted in: Cyber and Data Security

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

Cartoon of a red haired woman using a chained up computer while a man extends his hand for payment

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our clients be up-to-date on this issue and understand...

Read Full Story »

Posted in: Cyber and Data Security

Cryptolocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

Example screenshot of having been victim to CryptoLocker

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for the recovery and decryption of files, typically...

Read Full Story »

Posted in: Cyber and Data Security


Back to Top

Copyright © 2021 MPA Networks, Inc.

Atomic8Ball Web Presence Management

Cal. Civ. Code § 1798.102 - Do Not Sell My Personal Information