MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY

Does it feel like you’re getting an email update from everyone you’ve ever done business with about how their company is handling COVID-19? A spike in corporate email messages meant to keep customers informed has provided a valuable opening for bad actors to exploit as they mount new phishing attacks.  The United States Secret Service recently released an Read more about MALWARE-LADEN COVID-19 EMAILS EXPLOIT MS OFFICE VULNERABILITY[…]

You’ve Been Breached: Now What?

It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]

How to Spot a Phishing Attempt

Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]

Apple iPhone 7 Smart Battery Case Is The Best!

My days are hectic. My life is run by my calendar and therefore my iPhone. I am constantly checking emails, making calls and researching topics and products from my phone all day. If you know me then you know how much I love my iPhone 7. The problem has always been the battery life! I Read more about Apple iPhone 7 Smart Battery Case Is The Best![…]

Azure AD Connect – Connecting your infrastructure to the cloud

With the current direction the industry is heading, more and more IT environments are moving to cloud solutions. This means you need to use additional tools to keep your cloud and on-premise environments in sync to create a true Single Sign-On solution. In this article, we will be reviewing sync features of one specific tool Read more about Azure AD Connect – Connecting your infrastructure to the cloud[…]

Using O365 Mailboxes and Permissions

Office365 is a fantastic mail platform with many options. However, due to the large amount of options, certain features are often unexplored. Specifically, there seems to be a lot of confusion regarding O365 mailboxes. I frequently see offices paying for mailbox licenses when a different free mailbox could’ve been used. In this article I will review Read more about Using O365 Mailboxes and Permissions[…]

Crypto!

CryptoWall Viruses CryptoWall viruses such as CryptoLocker, AlphaCrypt and TeslaCrypt to name a few are ransomware trojans that encrypt any file that it has access to your on machine, delete the original, and then demand money to restore your data. What this means is that not only will it delete your files from your computer Read more about Crypto![…]