Technology Is A Tool. Choose Wisely. 516.876.8761
On May 12, 2017, a massive ransomware attack called WannaCryptor 2.0 or WannaCry hit thousands of networks in companies around the world. The cyber campaign, reached over 150 countries and wreaked havoc for offices, government and healthcare facilities. The WannaCry malware takes advantage of a bug within a Windows protocol. There was a patch for this that Microsoft put out in March of 2017, but many companies that had not updated their systems with the patch were victimized by this attack.
When you walk out the door in the morning, what is the one thing you do not want to forget? Most people would say their cellphone.
Today, cellphones are used for more than making calls; they are our calendars, our computers and many times our wallet.
There’s no doubt about it – the Internet and mobile and cloud computing have made our lives easier and our businesses more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly.
Data security in your field is paramount. As a business owner you need to protect your assets and data as well as the personal and financial information of your clients. Off the shelf routers are simply not robust enough to truly guard you against the proliferation of internet threats and intrusions.
Exhausted, and exhilaration….that’s how our accountant clients’ say they feel after tax day. What a ride!
Can’t afford to be down for days? Then take heed to these 3 easy (but critical!) steps to make sure you never have to experience extended downtime, data loss or corruption.
Keeping our promise to keep YOU in the know, here is an update on the latest cyber threat we've seen resurface. We urge you to review your current data back up strategies and consider a proactive approach to protecting your business from this and other cyber threats.
Hacking is rampant but why make things easy? Strong passwords are one way you can protect your data.
The old saying “pack your own parachute” comes to mind when I think of data backups or, more specifically, data RECOVERY. Here’s the best tip I can give you, the absolute WORST time to check your parachute is on the way down.
The same goes for checking the robustness of your network and data back up where the absolute worse time to think about it, is AFTER a data disaster.
EXPIRATION NOTICE
If your organization is currently running either Microsoft Windows Server 2003 or Exchange 2003 on any servers in your office, you need to know about a dangerous security threat to your organization that must be addressed very soon. Please take a moment to read this important announcement.
Ending the year, much like it began, many companies in the wake of the latest and debilitating attack on Sony are re-evaluating what they consider “secure.” In reviewing the vulnerabilities that opened the door for hackers to deeply imbed themselves in Sony’s IT infrastructure, companies are beginning to realize the need to proactively invest more heavily in their cyber security and IT defense systems.
Virus Warning: CryptoWall
To our valued clients and colleagues:
We are seeing a nasty mutation of the CryptoLocker virus called CryptoWall.
This virus is a form of a Trojan horse and is considered “ransomware." This means that the hacker will install malware onto your computer and will want to exact some type of payment from you in order to set your data free. In this virus, your Word, Excel, PDF, Photo and other files can become encrypted or corrupt and despite the removal of the virus itself, the files may be virtually impossible to decode. In addition, anti-virus software does not typically "see" this as a threat since the virus behaves much like a user would.
Our Nation’s economy relies on the success of small and medium-sized businesses. These types of businesses offer a wide range of services and in addition, they store significant amounts of sensitive data, ranging from their database and financial spreadsheets to intellectual property. To protect this information, it is important to have a strategic approach to cyber security
The best thing to do in order to protect yourself against the Internet Explorer security bug is not to use the web browser at all. Even though it might take some time to get weaned from Internet Explorer to a different web browser like Chrome, Firefox, Safari, or Opera, in the end – it will be worth the effort and time.
Tech 2020 Solutions is the new brand identity for 2000 Computer Solutions
535 Broadhollow Rd. Suite A28
Melville, NY 11747
Services