Technology Articles from MPA Networks

Protecting SMBs from Exponential Growth in Cybercrime

December 9th, 2020 by admin

A hooded figure using two keyboards with the words 'danger, attack, locked, data breach' around him

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), announced today that it is educating businesses on the dramatic spike in cybercrime targeted towards small to mid-sized (SMB) businesses. Cybersecurity Ventures...

Read Full Story »

Posted in: Press Release

Offering Next Generation Cybersecurity Solutions

August 23rd, 2020 by admin

A man writing on a notebook while there is paperwork with graphs and charts scattered beneath it

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) equip themselves with the necessary cybersecurity protections that every modern company needs to survive. Over...

Read Full Story »

Posted in: Press Release

Providing Innovative Home Office Cybersecurity for Remote Workers

June 4th, 2020 by admin

A man working from home using a laptop and a headset

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), announced today that the company is providing home office cybersecurity for remote workers to support them through the current pandemic and beyond. According...

Read Full Story »

Posted in: Press Release

Tips to Stay Productive, Cyber-Safe, and Get the Fastest Service

March 30th, 2020 by admin

A hooded figure representing a hacker is coming out of a laptop screen

MPA has collected tips and actual client experiences & lessons about how to stay productive, cyber-safe, and get the fastest service from us right now. What's Happening Right Now The support load continues to be heavy. Some clients did not shelter...

Read Full Story »

Posted in: Press Release

Sharing the 3 Best Practices for Thwarting Phishing Attacks

February 4th, 2020 by admin

Fish hook stuck in a credit card with a keyboard in the background

SAN MATEO, CA - MPA Networks, Inc., a leading managed technology services provider (MTSP), is helping small to mid-sized businesses (SMBs) thwart cyberattacks and protect their organizations from unnecessary downtime by addressing the most common...

Read Full Story »

Posted in: Press Release

MPA Networks Protects Your Network From Security Threats

January 16th, 2020 by admin

Blue shield with keyhole providing protection from cybersecurity

Protecting your data networks is one of the most important things your company can do. At MPA Networks, our experience and expertise enable us to bring the most innovative cybersecurity solutions to the table. There are numerous types of...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

What is SOCKS, and How is it Used to Protect your Internet Security?

November 2nd, 2019 by admin

Computer with protective shield and lock.

SOCKS stands for Secure Over Credential-Based Kerberos Services, which is also known as SOCKets and is one of the earliest network protocol systems ever used. This protocol allows users to employ client-based applications and web servers transparently...

Read Full Story »

Posted in: Cyber and Data Security

Protecting Businesses from DNS Attacks

October 2nd, 2019 by admin

Hooded hacker touching a screen with green text

San Mateo, CA – We're helping small to mid-sized businesses (SMBs) protect themselves and their customers from DNS (Domain Name Server) attacks through innovative technology solutions. As businesses around the world continue to migrate...

Read Full Story »

Posted in: Press Release

MPA Networks, Inc. Educates Customers on Ransomware

August 5th, 2019 by admin

Close Up of Red Information Security Button on Computer Keyboard with Blue Keys Cyber Security Concept

SAN MATEO, CA – MPA Networks, Inc., a leading managed technology services provider, announced today that they have launched a ransomware awareness campaign. The purpose of the campaign is to quickly educate business owners in understanding one...

Read Full Story »

Posted in: Press Release

MPA Networks, Inc.’s Cyber Security Technology Helps Local Businesses Protect Their Networks Against Global Attacks

June 12th, 2019 by admin

Password protection security

SAN MATEO, CA – May 2019 – MPA Networks, Inc., a leading managed technology solutions provider, helps local businesses protect their networks against growing global attacks. The company’s state-of-the-art cyber security technology and defense...

Read Full Story »

Posted in: Press Release

Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Discrete hacker looking for vulnerable code

Phishing attacks occur when communication that appears to be reputable is fraudulent. The sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information and more. People...

Read Full Story »

Posted in: Cyber and Data Security

Leveraging Cybersecurity Techniques to Protect Customers

February 5th, 2019 by admin

Man with digital locks

SAN MATEO, CA – We announced today that we are leveraging state-of-the-art cyber security techniques and tools to protect customers from cyber attacks that have become a daily occurrence in the small to mid-sized business marketplace....

Read Full Story »

Posted in: Press Release

MPA Networks Knows Security

January 29th, 2019 by admin

Lock

Your business needs a dependable and robust cybersecurity solution, plain and simple. As technology continues to advance and new threats are coming to the forefront, it is essential to have the proper security and management behind you to ensure...

Read Full Story »

Posted in: Cyber and Data Security

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Cyber and Data Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Cyber and Data Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Cyber and Data Security

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Cyber and Data Security

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Cyber and Data Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Adobe Flash: The Rumors of My Death Have Been Greatly Exaggerated...Until 2020

August 29th, 2017 by admin

Finger pressing a pale blue touchscreen of icons against a pixelated background

Adobe Flash, the web content standard the Internet loves to hate, will soon meet its ultimate demise: Adobe will finish phasing out the platform in 2020. Flash, first introduced in the early 2000s, has been on a gradual decline for almost as long as it...

Read Full Story »

Posted in: Hardware and Software

When Windows 10 Support Stops

August 22nd, 2017 by admin

Dark wood desk with a Mac desktop, a gray MacBook Pro, and a white table resting on it

In July of 2017, some Windows 10 users received an error message when trying to install the Creators Update, stating, "Windows 10 is no longer supported on this PC." This first-of-its-kind problem stems from an incompatibility with a handful of Intel's...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Cyber and Data Security

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Stethscope, glasses, and pills resting on a paper ECG readout

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry...

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

White security icon spotlighted on a dark field of colorized programming code

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Is Your Office Router Secure?

July 25th, 2017 by admin

Netgear ProSafe GS108T router with 4 ethernet cables plugged into it

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Spare Computer Parts: Which Ones To Keep For Disaster Recovery

July 5th, 2017 by admin

Pile of old computer parts in a metal shipping container

It happens in every office eventually: an employee is going about their workday and suddenly their computer or monitor won't turn on. Fortunately, there's gold in those unused desktops and laptops stuck in the storage closet. Aside from the computers...

Read Full Story »

Posted in: Hardware and Software

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Cyber and Data Security

Scheduling Security: Take Control of Your OS Updates

May 10th, 2017 by admin

The word 'update' written in chalk on a blackboard, with a red analog clock between the 'p' and 'd' letters

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration...

Read Full Story »

Posted in: Hardware and Software

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

White email envelope icon with several red, pink, and gray circles behind it

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....

Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

April 11th, 2017 by admin

Stylized depiction of Windows 10's start menu on a desktop monitor

If your business hasn't already made the switch from Windows 10's predecessors to a new operating system, it's time to make the initiative a priority. While your IT staff doesn't need to upgrade every computer in your office, it's necessary to make sure...

Read Full Story »

Posted in: Hardware and Software

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

Skull and crossbones symbol drawn with 1s and 0s

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this...

Read Full Story »

Posted in: Cyber and Data Security

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Hardware and Software

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Cyber and Data Security

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Cyber and Data Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Cyber and Data Security

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Cyber and Data Security

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Cyber and Data Security

Are Comatose Servers Draining Your Wallet and Leaving You Vulnerable?

August 30th, 2016 by admin

Black skull and crossbones graphic

Those old servers your business no longer uses—and keeps running anyway—are more than just a security risk: They’re hurting your firm’s bottom line. The term comatose server describes a functional server, connected to a network, that sits idle virtually...

Read Full Story »

Posted in: Hardware and Software

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Cyber and Data Security

Don’t Forget About Printer Security

August 9th, 2016 by admin

Array of 6 white printer icons against backgrounds of various color

There was a time when printers—in your office or home—were considered relatively "simple" office equipment: plug it in, connect it to the local network, and keep the ink fresh, and there wasn't much else to worry about. But times have changed. Today's...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

You Have Been Hacked - cartoon of a robber climbing out of a black laptop

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different...

Read Full Story »

Posted in: Cyber and Data Security

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Hardware and Software

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Cyber and Data Security

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

Sepia-tinted close up of an eraser on the back of a pencil

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Cyber and Data Security

Windows 10 Free Upgrade Window Comes to an End

May 24th, 2016 by admin

Stylized depiction of the modern Windows start menu with a blue '10' overlaid

Those “Upgrade to Windows 10” notifications seem to be showing up everywhere, even in the middle of a weather forecast on Iowa television. What would’ve otherwise been an embarrassing interruption turned into a watercooler moment that anyone who used...

Read Full Story »

Posted in: Hardware and Software

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Hardware and Software

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Red and yellow depiction of a ringing alarm clock with hands at 12:15

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...

Read Full Story »

Posted in: Hardware and Software

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

Clip art of a red rotary telephone

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers...

Read Full Story »

Posted in: Cyber and Data Security

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

Clip art of two badges, one red with an 'X' and the other green with a check mark

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks...

Read Full Story »

Posted in: Cyber and Data Security

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

Silhouette of a running man carrying a giant 1 Euro coin, against a blue digital cityscape

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed...

Read Full Story »

Posted in: Cyber and Data Security

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Cyber and Data Security

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A lock with a black and yellow hazard stripe, with a key inserted into it

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of...

Read Full Story »

Posted in: Cyber and Data Security

The Dangers of Free Public Wi-Fi: How To Protect Your Network

February 2nd, 2016 by admin

Light blue depiction of a wireless symbol

How dependent have you and your employees become on public Wi-Fi outside the office? Mobile hotspots are almost everywhere now—from coffee houses and fast-food restaurants to hotels and airports (and even aboard most planes). Without Wi-Fi access,...

Read Full Story »

Posted in: Cyber and Data Security

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

Clip art of a hand holding a bag with a dollar sign on it, in black and white

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned...

Read Full Story »

Posted in: Cyber and Data Security

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

'Do Not Enter' traffic sign of a red circle with a white horizontal line

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with...

Read Full Story »

Posted in: Cyber and Data Security

Macs Are Here to Stay. How Well Are You Managing Them?

December 16th, 2015 by admin

Apple monitor, keyboard, mouse, and iPhone resting on a wooden desk

Before you take your teenage kids to see the new Steve Jobs biopic, ask them what Jobs' first successful product was. Don't be surprised if they answer "the iPod"! For most of their generation, the original Macintosh is ancient history. Today's Mac...

Read Full Story »

Posted in: Hardware and Software

The Future of Fingerprint Authentication… Is There One?

November 24th, 2015 by admin

Stylized close-up of a fingerprint

Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR...

Read Full Story »

Posted in: Cyber and Data Security

Mobile Security Exploits: Surviving the BYOD Environment

November 19th, 2015 by admin

Businessman using a smartphone with his right hand

IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to...

Read Full Story »

Posted in: Hardware and Software

Email Encryption: The Basics

November 12th, 2015 by admin

Stylized depiction of a blue postcard stamped 'PRIORITY'

Chances are you probably have a few USPS "forever" stamps that have been sitting in your desk drawer for a while. When was the last time you actually used them to "snail mail" something—a bill payment or an important letter? Most bills are paid online...

Read Full Story »

Posted in: Cyber and Data Security

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Silhouette of Sherlock Holmes smoking a pipe and looking through a magnifying glass

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated...

Read Full Story »

Posted in: Cyber and Data Security

Lessons of Ashley Madison: How “Crackable” Are Your Passwords?

October 20th, 2015 by admin

Close up of a keyboard with one key labeled 'safe' in red and blue

The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the...

Read Full Story »

Posted in: Cyber and Data Security

3 Incredible Benefits of Protecting Your Cloud Data with Two-Step Verification

October 16th, 2015 by admin

Cartoon graphic of a yellow padlock with a white number '2' overlaid

Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all. Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication,...

Read Full Story »

Posted in: Cyber and Data Security

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

Icon of a bug with the red, green, blue, yellow Windows logo on its carapace

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous...

Read Full Story »

Posted in: Cyber and Data Security

What You Don’t Know CAN Hurt You: The Dangers of Shadow IT

September 18th, 2015 by admin

Partially opened, gray MacBook against a black background

Last spring, Hillary Clinton received a barrage of criticism after it was revealed that she used a private email server during her tenure as Secretary of State—seemingly at odds with government security protocols, if not federal laws. Clinton would...

Read Full Story »

Posted in: Cyber and Data Security

BYOD Is Here: Where’s Your Company Policy?

September 11th, 2015 by admin

Android phone displaying an orange 'Google Play' screen, resting on a gray table next to an Apple keyboard

Once upon a time, IT administrators offered company-issued hardware to employees based upon something akin to Henry Ford's "Model T" approach: "You can have any equipment you want, as long as it's whatever we have for you." In light of the...

Read Full Story »

Posted in: Hardware and Software

IPv6: Heard of it? You Will...

September 4th, 2015 by admin

Inside view of a round, white tunnel with black numerals 0 through 9

In our ever-expanding universe of high-tech acronyms, perhaps one you've recently heard is IPv6. What exactly is it? Why do some IT people embrace it as the foundation of a "new Internet," while the mere mention of it gives others an instant headache?...

Read Full Story »

Posted in: Hardware and Software

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Yellow, triangular shaped sign with a black exclamation point on it

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities...

Read Full Story »

Posted in: Cyber and Data Security

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

Two signs: 'Safety First' and 'www', against an ominous looking black web/network effect

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email...

Read Full Story »

Posted in: Cyber and Data Security

Small Business Disaster Recovery Solutions

July 10th, 2015 by admin

Three keys, each with a different graphic of a circuit board on it

“Disaster”: the word itself is synonymous with trauma. Of course, even after a traumatic event, there is an opportunity to rebuild. Restoring your data is a critical part of rebuilding your infrastructure and your business after a physical or virtual...

Read Full Story »

Posted in: Cyber and Data Security

Is Tape Storage (Completely) Dead?

May 28th, 2015 by admin

Stylized graphic of an arrow pointing into a cassette tape

If you're over 40, you probably remember the original Sony Walkman—the freedom of listening to a single cassette tape in portable stereo. Even if you still have a few favorite cassette tapes packed away somewhere, where could you listen to them today?...

Read Full Story »

Posted in: Cyber and Data Security

Changes Ahead for Windows: A First Look

May 13th, 2015 by admin

Graphic of an old-style, black CRT monitor with 'Microsoft Windows XP' prominently displayed

It was about a year ago that Microsoft officially ended support (most importantly, automatic security patches) for Windows XP. Particularly for business users, running a computer on XP after April 8, 2014, became about as wise as leaving keys dangling...

Read Full Story »

Posted in: Hardware and Software

Know Your Enemy: These New Phishing Schemes are Hard to Spot

April 16th, 2015 by admin

Depiction of a computer monitor and a mouse, with the screen showing the @ sign and the icon of an envelope

A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly...

Read Full Story »

Posted in: Cyber and Data Security

Uncle Sam Won't Stop Cyber-Crime - It's Up To You

April 1st, 2015 by admin

Gold-colored, unlocked circular padlock with a key inserted

You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright...

Read Full Story »

Posted in: Cyber and Data Security

The $100,000 Phone Bill: Is Your Office VoIP Phone System the Next Target?

March 20th, 2015 by admin

Wireframe graphic of a desktop business phone

How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat...

Read Full Story »

Posted in: Cyber and Data Security

Welcome to the IoT: Will Your TV Be Watching YOU?

March 12th, 2015 by admin

Silhouette of the heads of a man and woman set next to an image of a desktop monitor

We've talked recently about the potential dangers of the rapidly expanding Internet of Things, or IoT. As we discussed, the IoT consists of embedded sensors collecting data from dozens of devices in your daily life—your car, your health and fitness equipment,...

Read Full Story »

Posted in: Hardware and Software

Do Surveillance Cameras Always Keep Your Company Safer? You'll Be Surprised

February 20th, 2015 by admin

Triangular sign with silhouette of a security camera on a field of yellow

You probably remember the 2001 blockbuster remake of Ocean's Eleven starring George Clooney and Brad Pitt. While George and Brad's grand scheme—robbing a secret multi-casino vault underneath the Las Vegas Strip—may have been pure Hollywood, a key element...

Read Full Story »

Posted in: Hardware and Software

Watch Out! Protect Your Home and Office against the Internet of Things

January 28th, 2015 by admin

Symbol of a wireless radio antenna with red/orange radio waves emanating from it

Internet of Things (IoT) devices provide a powerful way to utilize technology to enhance everyday machines in your home or office, from wrist fitness bands to refrigerators to thermostats. The ability to monitor your home security cameras while you’re...

Read Full Story »

Posted in: Cyber and Data Security

'Tis the Season—for Small Business Cybercrime. Here’s How to Protect Your Company

January 7th, 2015 by admin

Hand cursor touching a 'Do Not Enter' sign against a field of red '@' symbols

The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S. "Targeting" Target—via Small Businesses You may have...

Read Full Story »

Posted in: Cyber and Data Security

Homeland Security Issues Warning Over Serious Internet Explorer Bug

April 30th, 2014 by admin

Cartoon of the blue Internet Explorer icon with 3 insect legs extending from either side of it

Serious Security Flaw Found in IE A security flaw or bug has been discovered in Microsoft Internet Explorer (IE), which affects all versions of IE from 6 to 11. This flaw allows a hacker to potentially gain access to your computer and hard drive when...

Read Full Story »

Posted in: Cyber and Data Security

Critical Action Points to Protect Yourself from Heartbleed Bug Vulnerability

April 11th, 2014 by admin

Oblique angle of a website URL address with a red, bleeding heart icon around the secure lock

We don't want to inundate you with more background information about the Heartbleed bug (you've been bombarded with it across the internet and daily news since it was announced Tuesday!), but rather outline the critical takeaways and action points you...

Read Full Story »

Posted in: Cyber and Data Security

R.I.P. Windows XP. Current Users Now at Greater Cyber Risk

April 8th, 2014 by admin

The words 'Microsoft Windows XP', with logo floating above them

Microsoft Corporation has just announced it will stop supporting Windows XP, one of the world's most popular and successful operating systems. Though Microsoft XP will not magically disappear from the desktops of anyone currently using it (which is...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Beware Email Spoofing! Protect Yourself Now!

April 4th, 2014 by admin

Cartoon of a man at a keyboard holding four masks, against a yellow background

We have recently seen a rise in a disturbing phishing scam called email spoofing. Email Spoofing A spoof email is an email that looks as if it came from a trusted friend or acquaintance, but is actually malicious in nature. These emails are particularly...

Read Full Story »

Posted in: Cyber and Data Security

Quiz - Can you Find the Malicious Email?

December 12th, 2013 by admin

Envelope graphic with numerous web related concerns coming out of it

Can you Spot the Malicious Emails/s?! After reading through our Cryptolocker and Ransomware blog series and learning how to identify a malicious email, it's time to put your new virus sleuthing skills to the test. Read through the list of email...

Read Full Story »

Posted in: Cyber and Data Security

How to Identify a Malicious Email

December 4th, 2013 by admin

Fishing hook snagging a red '@' symbol

Continuing our blog series about Cryptolocker and Ransomware virus attacks, it is necessary we explain the basic fundamentals of identifying a malicious email or attachment. Only through education and proper awareness can we effectively avoid Ransomware...

Read Full Story »

Posted in: Cyber and Data Security

The Single Most Reliable Method for Preventing a Ransomware Attack

December 3rd, 2013 by admin

Desktop computer monitor with locked chains draped around it

Last week, we wrote about the rise of Cryptolocker and Ransomware viruses, the new breed of malware virus infecting host computers through malicious email attachments, and spreading rapidly through its use of commercial-grade RSA encryption and Bitcoin,...

Read Full Story »

Posted in: Cyber and Data Security

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

In bold uppercase: 'Practice Cyber Safety' with the last word in red

About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against...

Read Full Story »

Posted in: Cyber and Data Security

Cryptolocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

Example screenshot of having been victim to CryptoLocker

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for...

Read Full Story »

Posted in: Cyber and Data Security