Our Insights

Valuable information we share.

Why are many businesses outsourcing IT, and is it right for you?

on Jan 17, 2019 4:02:27 PM By | Kelsey Calvert | Technical Support Managed Services
The idea of hiring professional services firms instead of employing in-house staff is a compelling topic in today’s business market. Whether your business is outsourcing accounting, recruiting, or others, the bottom line is you need a trusted partner to fill an integral role in your company.  There are lots of reasons to contract certain services out, but why would IT be at the top of the list? You may be thinking, “There are countless resumes being sent to our HR department from IT professionals, and they must be qualified… right?”
Read More

Things to Remember about Email Passwords

on Nov 6, 2018 9:52:31 AM By | Nino Vales | Emails Cyber Security
An email account with a simple or weak password puts your information at risk. Confidential attachments, messages, bank information, contact list, or personal conversations could fall into the wrong hands if an email account gets hacked due to a weak password.
Read More

Latest Email Threats: Homograph Exploits and Extortion Scam

on Nov 2, 2018 11:45:42 AM By | Glenn Kemp | Emails Cyber Security Phishing
Regular SPAM filtering just isn’t as effective as it used to be. We live in a time where threats are evolving on a global scale, rapidly working to disarm even the best email filtering solutions. Time and time again, new exploits of Phishing and Spoofing are designed to take advantage of the human condition.  Here are two of the more advanced tactics currently being utilized to gain access to private data or extort money:
Read More

Explaining the 3 2 1 Backup Rule

on Oct 23, 2018 4:51:03 PM By | Nino Vales | Backup Ransomware
The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or environmental disasters, are just some of the dangers lurking to destroy your backups. Recovering data off dead drives costs lots of money, and that can easily be avoided if you have an effective backup strategy in place. This is where the 3 2 1 backup rule comes into play.
Read More

Cyber Kill Chain & Ransomware

on Aug 20, 2018 9:46:05 AM By | Nino Vales | Network Security Ransomware Phishing Cyber Security
The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More

Extra Layer of Protection against Macros and Malicious Websites

on Aug 20, 2018 9:45:24 AM By | Nino Vales | Cyber Security Ransomware
Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or destroy all of your work in seconds. It is exploited by attackers to infect systems and make demands against the victim.
Read More

4 Tips to Quickly Identify – Am I Getting Good Technical Support or Bad?

on Jul 25, 2018 7:47:34 AM By | Russ Unger | Technical Support
During my career in the support and service industry I’ve often wondered, “Am I or my team delivering the best possible service and support for our clients?”
Read More

Staying Connected: Utilizing office.com

on Jul 25, 2018 7:47:07 AM By | James Poirier | Microsoft 365 Cloud
We have all been in the situation where we are out of the office but require access to critical business resources. Maybe its double checking budget numbers in a report or accessing the updated presentation that you are scheduled to give in 10 minutes. Whatever it is, you need access to that resource now and the access needs to work. Microsoft's service at office.com fills this need with easy to use, feature rich, web applications.*
Read More

How Do I Get Rid of My Old Computer Equipment?

on Jul 3, 2018 9:55:17 AM By | Bruce Waite | Tips
Do you have an old computer equipment graveyard? I’ve been to many new client’s offices only to be asked, “how do I get rid of all this junk taking up an entire storage room?”. We appear to have a habit of believing that at some point, that old computer, monitor, set of cables or printer may come in handy. And you definitely cannot throw electronics out in the trash. So, we stack them up and close the door.
Read More

Protecting your Backups from Ransomware

on Jun 22, 2018 10:48:02 AM By | Nino Vales | Ransomware Backup
Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of locations vulnerable to getting encrypted. Imagine if an administrator account or someone using an account that has full read and write access to the server gets infected. Easily, everything on the server and the network will be affected. It can halt the operations and affect the productivity of not just one person but the entire organization.
Read More