Security

END OF EXTENDED SUPPORT FOR WINDOWS 7, SERVER 2008 AND EXCHANGE 2010

Microsoft announced the end of extended support will be on January 14, 2020 for Windows 7, Windows Server 2008 and Exchange 2010. This means that these operating systems and services will no longer be patched or supported. This makes  devices with these operating systems and services a threat to your network because vulnerabilities and exploits […]Read More


RANSOMWARE AND CRYPTO-VIRUSES II

Our last blog discussed crypto-wall ransomware and what can be done about it. Since then we have seen several companies that have been impacted by a new variant of crypto-wall that has more potential to get into environments than previous versions. Crypto-wall is on the rise and it is imperative that your company takes the […]Read More


RANSOMWARE AND CRYPTO-VIRUSES

Ransomware and Crypto-Viruses are types of malware that encrypt the data of a compromised system without the approval of a company. The longer the viruses run the more data they encrypt. The viruses are built with information on how to send ransom money and increase the amount demanded at regular intervals. These viruses can quickly shut […]Read More


STRONG PASSWORDS

A system, username, website or any IT device without a strong password becomes a security threat. Without a strong password it is not a question of if the device will be hacked, it is a question of when. Weak passwords allow hackers to break into systems quickly using special programs to generate random words, numbers […]Read More


IMPORTANT IT POLICIES

There are several types of IT Policies. IT policies are designed to clearly communicate to your IT Department, IT Vendors and company employees what is or is not allowed and with computers, email, passwords and other aspects of a company’s IT infrastructure.   All IT work in the company should follow the guidelines of IT Policies. […]Read More