Our Insights

Valuable information we share.

Latest Email Threats: Homograph Exploits and Extortion Scam

Regular SPAM filtering just isn’t as effective as it used to be. We live in a time where threats are evolving on a global scale, rapidly working to disarm even the best email filtering solutions. Time and time again, new exploits of Phishing and Spoofing are designed to take advantage of the human condition.  Here are two of the more advanced tactics currently being utilized to gain access to private data or extort money:
Read More

Explaining the 3 2 1 Backup Rule

The more backup copies you have, the better your coverage against losing a full day of work or even worse your entire data. Ransomware, data corruption, accidental deletions, or environmental disasters, are just some of the dangers lurking to destroy your backups. Recovering data off dead drives costs lots of money, and that can easily be avoided if you have an effective backup strategy in place.
Read More

Cyber Kill Chain & Ransomware

The Cyber Kill Chain model breaks down a Ransomware attack in seven stages. This article will give you an understanding of our security solutions and what is effective based on the current stage of the Ransomware. 
Read More

Protect Yourself Against Macros and Malicious Websites

Macros – they are normally delivered as attachments in the form of a Microsoft Word document. Macros can either make your life easier by automating those repetitive stuff or destroy all of your work in seconds. It is exploited by attackers to infect systems and make demands against the victim.
Read More

4 Tips to Quickly Identify – Am I Getting Good Technical Support or Bad?

During my career in the support and service industry I’ve often wondered, “Am I or my team delivering the best possible service and support for our clients?”
Read More

A Free Microsoft Office on the Web

We have all been in the situation where we are out of the office but require access to critical business resources. Maybe its double checking budget numbers in a report or accessing the updated presentation that you are scheduled to give in 10 minutes. Whatever it is, you need access to that resource now and the access needs to work. Microsoft's service at office.com fills this need with easy to use, feature rich, web applications.*
Read More

How Do I Get Rid of My Old Computer Equipment?

Do you have an old computer equipment graveyard? I’ve been to many new client’s offices only to be asked, “how do I get rid of all this junk taking up an entire storage room?”. We appear to have a habit of believing that at some point, that old computer, monitor, set of cables or printer may come in handy. And you definitely cannot throw electronics out in the trash. So, we stack them up and close the door.
Read More

Protect your Backups from Ransomware

Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of locations vulnerable to getting encrypted. Imagine if an administrator account or someone using an account that has full read and write access to the server gets infected. Easily, everything on the server and the network will be affected. It can halt the operations and affect the productivity of not just one person but the entire organization.
Read More

Risks of Unsecured Remote Desktop Connections

The ability to connect to your work computer or remote desktop server remotely provides an added productivity to some employees. However, the risks of having this incorrectly configured outweigh the convenience it provides.
Read More

What is Microsoft 365 and how do I know if it's a fit for my business?

Almost every small and mid-sized business (SMB) owner is being inundated with information promoting cloud this or that, making it nearly impossible to determine who or what to trust. After all, deciding to migrate to the cloud is often fraught with risk and uncertainty, leading many business owners to stick with what they know. Often, what they know and are comfortable with, is a file server installed in the secure confines of their office. This is a tangible investment in purpose-built hardware running Windows Server OS, a topology referred to as a “client / server network”. In this mode of network, which has been around since the 70s, each computer connects to the local server for access to files and applications. This centralized way of computing has served us well, but the emergence of cloud computing has turned the model upside down.
Read More