END OF EXTENDED SUPPORT FOR WINDOWS 7, SERVER 2008 AND EXCHANGE 2010

Microsoft announced the end of extended support will be on January 14, 2020 for Windows 7, Windows Server 2008 and Exchange 2010. This means that these operating systems and services will no longer be patched or supported. This makes  devices with these operating systems and services a threat to your network because vulnerabilities and exploits […]Read More


How-To Deliverables

We offer step-by-step how-to guides called deliverables for many in-house I.T. tasks that users can perform on your computers and networks. WHAT YOU CAN DO ABOUT IT Users can be trained to perform these tasks so that your company can be self-sufficient in many areas of IT. If there are tasks that are performed on […]Read More


RANSOMWARE AND CRYPTO-VIRUSES II

Our last blog discussed crypto-wall ransomware and what can be done about it. Since then we have seen several companies that have been impacted by a new variant of crypto-wall that has more potential to get into environments than previous versions. Crypto-wall is on the rise and it is imperative that your company takes the […]Read More


RANSOMWARE AND CRYPTO-VIRUSES

Ransomware and Crypto-Viruses are types of malware that encrypt the data of a compromised system without the approval of a company. The longer the viruses run the more data they encrypt. The viruses are built with information on how to send ransom money and increase the amount demanded at regular intervals. These viruses can quickly shut […]Read More


STRONG PASSWORDS

A system, username, website or any IT device without a strong password becomes a security threat. Without a strong password it is not a question of if the device will be hacked, it is a question of when. Weak passwords allow hackers to break into systems quickly using special programs to generate random words, numbers […]Read More