skip to Main Content

Webinar Recap: Cyber Fortress – Data Protection For Your Business

Data protection webinar

Title: Cyber Fortress: How To Protect Your Data Empire
Date and Time: TUESDAY, November 13, 2018
Presenter: Michael DePalma, Channel Development Manager, Datto Inc.
Moderator: Eric Hobbs, CEO of Technology Associates

In this webinar:
  • How to safeguard your business with a secret weapon in the war on cyber extortion.
  • Simply, securely, and automatically maintain control of your business data.
  • Cyber Security Q&A on how to prevent the biggest threat to the small business community: Ransomware 
  • Real Life Check In: If your systems were struck by a disaster, how much data could you recover? How much downtime would you experience? 
  • Debunking the myths of traditional backup methods and their limitations.
  • Real “out of this world” examples of cyber threats.
  • Proactive Solutions: Business continuity, your new secret weapon in protecting your data empire.
  • How you can protect your business this holiday season.
Read More

Sextortion Scam: Aaron Smith, The Latest (Most Embarassing) Cybercrime Hacking Technique

Sextortion Scam Aaron SmithWhat we all do behind closed doors, is our business, right? This “Aaron Smith” Sextortion Scam suggests otherwise.

Imagine this (or maybe you don’t have to imagine because if you’re a business owner in the triangle area):

You open your inbox, and some guy named Aaron Smith in broken English says something to the effect of,

“Hey, I hacked into your computer while you were on adult website X, I turned on your webcam and recorded you and your screen, and if you don’t pay me $5000, I’m going to post this video on your Facebook feed and show your aunt Martha, your boss’s wife and everyone else in your world.

I have your information, I know your password is Rover050467.”

Yep. This latest scam/internet con/email phishing attack is called “Sextortion” because it’s whole tactic is based around threatening to share what you do in private to all of your peers. This one’s a doozie to say the least.

If you’re not signed up yet – attending our next webinar Tuesday November 13 from 1:00 – 2:00 PM on Cybersecurity: How To Protect Yourself And Your Business From Data Breaches is an absolute must. 

Let’s dive into this debacle of a threat so you can learn how to protect yourself from this fantastically embarrassing (and clever!) email phishing attack.

 

Read More

Goodbye FuseMail, Hello ProofPoint Anti-Spam Email Software: User-Friendly, Easy Digests

best anti-spam software for email ProofPoint Anti-Spam Email SoftwareIf you’re an existing client of ours you know we’re always evaluating our internal tools, evaluating what our clients’ experiences and refining our offerings, whether it’s a tool, a software or a service we offer.

As part of our core values, always find a way, when we find something better we’re going to make the change for the benefit of our customers.

We’ve listened to the feedback from our customers; we’re always on the cutting edge of technology offerings and in tune with our industry. Our latest upgrade to ProofPoint Anti-Spam Email Software is going to continue to ensure protection from malware, imposter emails, business email compromise (BEC) in an even easier user-friendly interface.

We’ve brought in, Mike Bodhe, one of our Support Services Engineers Allstars, to answer a few questions around unrolling this new product to our customers.

Read More

Data Recovery Plan For Law Firms: Managed Services Providers Don’t Let Natural Disasters Wipe Out Your Law Firm

Law Firm Data RecoveryNatural disasters like Hurricane Florence and Hurricane Michael remind us of the importance of building data recovery plan for law firms: managed services providers keep you in business – rain or shine.

October is Cyber-Security awareness month. In lieu of all the recent hurricane activities, in this article we’re diving into data recovery and data disaster planning for law firms. You won’t want to miss our upcoming webinar, Cyber Fortress: Protecting Your Data Empire — check it out here!

Read More

Nigerian Prince Alert! CEO Fraud: Phishing Email Scams Targeting CEOs

CEO Fraud Phishing Email ScamPhishing Email Scams Targeting CEOs: You’re Smarter Than A Nigerian Prince, Right?

Before you say you’ll never be one of those people who gets suckered into giving money to a Nigerian prince, just know that, a sophisticated version of this phishing email scam took tech giants, Google and Facebook, for over $100 million.

Yes. Google, a seller of security keys marketed as “the strongest, most phishing-resistant authentication factor for high-value users” and Facebook, a survivor of 600,000 cyber attacks every day, gave money to a Nigerian prince.

In this case, to a 40-something Lithuanian man named Evaldas Rimasauskas, who ran a sophisticated CEO fraud scheme, which involved him impersonating a large computer parts manufacturer using fake email addresses, forged corporates stamps, and phony invoices.

It took two years before anyone even discovered that they were being conned.

Read More

Managed Services For Medical Practices: Why You Desperately Need To Hire An MSP Right Now

managed services for medical practicesIf you’re still on the fence about hiring a managed services provider for your medical practice, just take a moment and imagine this: with managed services for medical practices, your staff would be free liberated in using the latest medical technology, tending to your patients’ needs, all without worrying about if your tools software is up-to-date or if your patients’ medical information are safe from hackers. Managed services for medical practices: here’s why  it’s the best decision you’ll ever make as a healthcare professional and a business owner (and your office administrator will forever be grateful.)

Read More

PhishPoint: Phishing Scam Attack Of The Week On Office 365 Users

Our topic today are the sharks in our digital waters this week. The latest Microsoft phishing attack, dubbed “PhishPoint,” demonstrates the lengthy extents in which cyber criminals will go to obtain confidential information.

In the most recent PhishPoint security breach, these hackers were able to use Microsoft’s Online platform to gain this information from users.

Here’s what happened and most importantly, here’s how you can protect this from happening to you, your employees or your clients if you’re an Office 365 User.

Read More

Ransomware Attacks Are Becoming More Sophisticated

Ransomware

You’ve probably seen articles about a recent cyber attack on LinkedIn or while scrolling through your social media news feed, and think that ransomware is limited to email scams like phishing.

But in this article, we’re going to address different types of ransomware attacks, how they’re growing in complexity and demand, and how you can protect yourself from these increasingly clever and potentially business-ending cyber attacks.

Read More

How To Protect Yourself Against Bandwidth Snatchers

Free WiFiHas your Internet connection suddenly come to a snail’s pace?

You try everything – dump your cache, restart your router, and make a semi-threatening to your Internet provider – but to no avail, videos still buffers at 144p. Then, just as you’re about to give up, your connection mysteriously speeds back up.

Beware. You might have a bandwidth snatcher for a neighbor.

Read More
Back To Top