END OF EXTENDED SUPPORT FOR WINDOWS 7, SERVER 2008 AND EXCHANGE 2010

Microsoft announced the end of extended support will be on January 14, 2020 for Windows 7, Windows Server 2008 and Exchange 2010. This means that these operating systems and services will no longer be patched or supported. This makes  devices with these operating systems and services a threat to your network because vulnerabilities and exploits are never fixed. WHAT YOU CAN DO ABOUT IT You can upgrade your computers and laptops to Windows 10. Servers […]Read More


How-To Deliverables

We offer step-by-step how-to guides called deliverables for many in-house I.T. tasks that users can perform on your computers and networks. WHAT YOU CAN DO ABOUT IT Users can be trained to perform these tasks so that your company can be self-sufficient in many areas of IT. If there are tasks that are performed on a regular basis and you would like information on how to perform the tasks you can request a deliverable for […]Read More


RANSOMWARE AND CRYPTO-VIRUSES II

Our last blog discussed crypto-wall ransomware and what can be done about it. Since then we have seen several companies that have been impacted by a new variant of crypto-wall that has more potential to get into environments than previous versions. Crypto-wall is on the rise and it is imperative that your company takes the proper precautions to protect your data. Crypto-wall can be installed internally by users clicking an infected email attachment or website […]Read More


RANSOMWARE AND CRYPTO-VIRUSES

Ransomware and Crypto-Viruses are types of malware that encrypt the data of a compromised system without the approval of a company. The longer the viruses run the more data they encrypt. The viruses are built with information on how to send ransom money and increase the amount demanded at regular intervals. These viruses can quickly shut down entire companies and lock entire drives of data Ransomware and Crypto-Viruses are commonly acquired by clicking on viral links […]Read More


STRONG PASSWORDS

A system, username, website or any IT device without a strong password becomes a security threat. Without a strong password it is not a question of if the device will be hacked, it is a question of when. Weak passwords allow hackers to break into systems quickly using special programs to generate random words, numbers or letter combinations. The shorter and less complex the password the sooner they can get in. WHAT YOU CAN DO […]Read More