Technology Articles from MPA Networks

Malware is Running Rampant - Learn The 3 Moves to Stop It

April 15th, 2021 by admin

A man in a dark gray hoodie with his arms crossed and face obscured, coming out of an open laptop.

MPA Networks, Inc. Helps Customers Protect Their Precious Networks SAN MATEO, CA - MPA Networks, Inc. a leading managed technology services provider (MTSP), proactively helps businesses address the increased threat of malware affecting small to mid-sized...

Read Full Story »

Posted in: Cyber and Data Security, Press Release

Protect Your Business with MPA Networks’ Cybersecurity Solutions

December 8th, 2020 by admin

Hacker typing on two keyboards overlaid with the words 'data breach' in orange letters

Moving to the cloud will increase your business's cybersecurity. The secure data centers utilized to host data and applications are much more secure than what would typically be found in an on-premise setup. There are many different ways that hackers...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Be on the Lookout for Rising Number of COVID-19 Phishing Attacks

April 21st, 2020 by admin

A blue digital lock with various connected devices and a person hand pointing at the lock

Hackers will often look to exploit any weakness they can find, whether it is technological means or through human curiosity and concern. With the rapid rise of COVID-19 across the globe, hackers are ramping up their phishing attack efforts. These efforts...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Tips to Stay Productive, Cyber-Safe, and Get the Fastest Service

March 30th, 2020 by admin

A hooded figure representing a hacker is coming out of a laptop screen

MPA has collected tips and actual client experiences & lessons about how to stay productive, cyber-safe, and get the fastest service from us right now. What's Happening Right Now The support load continues to be heavy. Some clients did not shelter...

Read Full Story »

Posted in: Press Release

Sharing the 3 Best Practices for Thwarting Phishing Attacks

February 4th, 2020 by admin

Fish hook stuck in a credit card with a keyboard in the background

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) thwart cyberattacks and protect their organizations from unnecessary downtime by addressing the most common...

Read Full Story »

Posted in: Press Release

MPA Networks Protects Your Network From Security Threats

January 16th, 2020 by admin

Blue shield with keyhole providing protection from cybersecurity

Protecting your data networks is one of the most important things your company can do. At MPA Networks, our experience and expertise enable us to bring the most innovative cybersecurity solutions to the table. There are numerous types of...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

MPA Networks, Inc.’s Cyber Security Technology Helps Local Businesses Protect Their Networks Against Global Attacks

June 12th, 2019 by admin

Password protection security

SAN MATEO, CA – May 2019 – MPA Networks, Inc., a leading managed technology solutions provider, helps local businesses protect their networks against growing global attacks. The company’s state-of-the-art cyber security technology and defense...

Read Full Story »

Posted in: Press Release

Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Discrete hacker looking for vulnerable code

Phishing attacks occur when communication that appears to be reputable is fraudulent. The sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information and more. People...

Read Full Story »

Posted in: Cyber and Data Security

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlayed with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network...

Read Full Story »

Posted in: Cyber and Data Security

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Cyber and Data Security

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Skyscraper office buildings tinged in blue

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...

Read Full Story »

Posted in: Cyber and Data Security

5 Email Disasters: How a Service Like MPA Networks Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Solutions

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Cyber and Data Security

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of...

Read Full Story »

Posted in: Cyber and Data Security

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Cyber and Data Security

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Cyber and Data Security

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Stethscope, glasses, and pills resting on a paper ECG readout

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Cyber and Data Security

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

Color logo of Google Drive(tm)

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's...

Read Full Story »

Posted in: Hardware and Software

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Cyber and Data Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Cyber and Data Security

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

You Have Been Hacked - cartoon of a robber climbing out of a black laptop

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different...

Read Full Story »

Posted in: Cyber and Data Security

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Cyber and Data Security

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

Clip art of a red rotary telephone

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers...

Read Full Story »

Posted in: Cyber and Data Security

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

'Do Not Enter' traffic sign of a red circle with a white horizontal line

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with...

Read Full Story »

Posted in: Cyber and Data Security

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

Two signs: 'Safety First' and 'www', against an ominous looking black web/network effect

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email...

Read Full Story »

Posted in: Cyber and Data Security

Know Your Enemy: These New Phishing Schemes are Hard to Spot

April 16th, 2015 by admin

Depiction of a computer monitor and a mouse, with the screen showing the @ sign and the icon of an envelope

A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly...

Read Full Story »

Posted in: Cyber and Data Security

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

Cartoon of a red haired woman using a chained up computer while a man extends his hand for payment

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our...

Read Full Story »

Posted in: Cyber and Data Security

Quiz Answers - Can you Find the Malicious Email?

December 18th, 2013 by admin

Silhouette of a man throwing a fishing line and hook towards the screen, in front of a laptop on an eBay page

Ready for the answers to our quiz? Drumroll please... Every single email is malicious EXCEPT for this one: “eFax message from “4082459385″. 1 page(s). Caller-ID: 408-245-9385″  -  eFax Yep, that eFax message is 100% legitimate! Now let's discuss why...

Read Full Story »

Posted in: Cyber and Data Security

Quiz - Can you Find the Malicious Email?

December 12th, 2013 by admin

Envelope graphic with numerous web related concerns coming out of it

Can you Spot the Malicious Emails/s?! After reading through our Cryptolocker and Ransomware blog series and learning how to identify a malicious email, it's time to put your new virus sleuthing skills to the test. Read through the list of email...

Read Full Story »

Posted in: Cyber and Data Security

How to Identify a Malicious Email

December 4th, 2013 by admin

Fishing hook snagging a red '@' symbol

Continuing our blog series about Cryptolocker and Ransomware virus attacks, it is necessary we explain the basic fundamentals of identifying a malicious email or attachment. Only through education and proper awareness can we effectively avoid Ransomware...

Read Full Story »

Posted in: Cyber and Data Security

The Single Most Reliable Method for Preventing a Ransomware Attack

December 3rd, 2013 by admin

Desktop computer monitor with locked chains draped around it

Last week, we wrote about the rise of Cryptolocker and Ransomware viruses, the new breed of malware virus infecting host computers through malicious email attachments, and spreading rapidly through its use of commercial-grade RSA encryption and Bitcoin,...

Read Full Story »

Posted in: Cyber and Data Security