Weekly Security Tip

As many individuals struggle with certain bills and debts, any relief options are often a welcomed conversation. Unfortunately, scammers are posing as debt relief organizations, tricking their victims into paying them in hopes of settling their debts. In this week’s security tip video, learn more about how these debt relief scams work and some tips […]

Read More

Protecting Against Ransomware

What is ransomware? Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. (See Protecting Against Malicious Code for more information on malware.) After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers. If […]

Read More

How much can you save by deploying the “New Standard”?

For businesses deploying on-premises Exchange, adding additional services such as email archiving and email security can be expensive and costly. But meeting the “New Standard” doesn’t have to be expensive. When deploying Exchange in the cloud, businesses can easily offload hardware and electricity costs, reduce IT complexity and increase overall security.  In fact, an average […]

Read More

What makes up the “New Standard” for Business Email?

The ecosystem around email has changed significantly and dramatically in just the last couple of years. Huge new business risks have come to the forefront.  (if you don’t know what those risks are, read our first post of this series https://wp.me/p6bE6m-ef. Today, there’s a “New Standard” for business email—one that requires servers to protect your […]

Read More

New Standard for Business Email

  Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an Exchange server on-premises or if you lack certain email security capabilities, your email could be at risk. Here are 5 ways your email could be vulnerable: Unprotected infrastructures. […]

Read More

ALERT “New Ransomware WannaCry” VIRUS

Over 200,000 victims have been reported to have contracted the new Ransomware virus WannaCry, a malicious piece of software that locks files on a computer and demands payments to unlock them.   Of all the servers and PCs we actively manage on a day-today basis only 40 PCs needed a manual update to better protect them from the […]

Read More

Healthcare Ransomware Guide

Healthcare organizations are a high value target for ransomware cyberattacks due to the sensitive nature of their information. Whether a small business or large, ransomware does not discriminate when it comes to obtaining vital data. If a business is unable to recover information for clients from a ransomware attack the result can bring not only […]

Read More

MHS Fined 5.5 Million For HIPAA Violation

In the second largest fine against a covered entity to date, Memorial Healthcare is set to pay 5.5 million dollars in breach of protected health information. In this case over 100,000 people were affected dating back between 2011 and 2012. Information such as names, dates of birth and social security numbers were leaked as reported […]

Read More

How to Avoid Being Spoofed

In Jacksonville, Florida a recent spoofing case was reported by a women claiming to have been asked for $250. The spoofer called pretending to be the HHS Office of Inspector General and informed the women she had won $9,000 in government grant money. In order to complete the process she was then asked to give […]

Read More

How To Keep Your Smart Phone and Mobile Device Secure

1. Password, pin, or fingerprint protect your mobile device It’s critical to lock your phone with a password, pin, or fingerprint detection. It’s easy to do and it’s free. If you ever put your phone down at a party or event, it’s very easy for someone to pick it up and read your email or […]

Read More