Our last blog discussed crypto-wall ransomware and what can be done about it. Since then we have seen several companies that have been impacted by a new variant of crypto-wall that has more potential to get into environments than previous versions. Crypto-wall is on the rise and it is imperative that your company takes the proper precautions to protect your data. Crypto-wall can be installed internally by users clicking an infected email attachment or website […]Read More


Ransomware and Crypto-Viruses are types of malware that encrypt the data of a compromised system without the approval of a company. The longer the viruses run the more data they encrypt. The viruses are built with information on how to send ransom money and increase the amount demanded at regular intervals. These viruses can quickly shut down entire companies and lock entire drives of data Ransomware and Crypto-Viruses are commonly acquired by clicking on viral links […]Read More


A system, username, website or any IT device without a strong password becomes a security threat. Without a strong password it is not a question of if the device will be hacked, it is a question of when. Weak passwords allow hackers to break into systems quickly using special programs to generate random words, numbers or letter combinations. The shorter and less complex the password the sooner they can get in. WHAT YOU CAN DO […]Read More


There are several types of IT Policies. IT policies are designed to clearly communicate to your IT Department, IT Vendors and company employees what is or is not allowed and with computers, email, passwords and other aspects of a company’s IT infrastructure.   All IT work in the company should follow the guidelines of IT Policies. This will help train and protect your environment from misuse, spam, viruses and more.   WHAT YOU CAN DO ABOUT […]Read More


Viruses and Malware are an ever-present danger to any internet accessing device. Viruses and Malware can steal private information, destroy data, compromise multiple devices and completely cripple a network. Any computer that is used to browse or download from the internet is susceptible to viruses and malware. Any device that is public facing like email servers, web pages, web servers, and applications servers that can be accessed from outside the network pose a risk.   […]Read More