Technology Is A Tool. Choose Wisely. 516.876.8761

Power Up Blog

Sometimes You Just Wanna Cry…

On May 12, 2017, a massive ransomware attack called WannaCryptor 2.0 or WannaCry hit thousands of networks in companies around the world.  The cyber campaign, reached over 150 countries and wreaked havoc for offices, government and healthcare facilities.  The WannaCry malware takes advantage of a bug within a Windows protocol.  There was a patch for this  that Microsoft put out in March of 2017, but many companies that had not updated their systems with the patch were victimized by this attack.

Read More

6 Tips for Cell Phone Security

When you walk out the door in the morning, what is the one thing you do not want to forget? Most people would say their cellphone.
Today, cellphones are used for more than making calls; they are our calendars, our computers and many times our wallet.

Read More

Mobile Device Essentials

There’s no doubt about it – the Internet and mobile and cloud computing have made our lives easier and our businesses more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly.


Read More

Adding up the Value of Security

Data security in your field is paramount.  As a business owner you need to protect your assets and data as well as the personal and financial information of your clients.  Off the shelf routers are simply not robust enough to truly guard you against the proliferation of internet threats and intrusions.

Read More

Like a bad penny, CryptoWall is back: CryptoWall 4 Update

Keeping our promise to keep YOU in the know, here is an update on the latest cyber threat we've seen resurface.  We urge you to review your current data back up strategies and consider a proactive approach to protecting your business from this and other cyber threats.

Read More

Four Tips Every CEO Should Know About Data Back Up

The old saying “pack your own parachute” comes to mind when I think of data backups or, more specifically, data RECOVERY. Here’s the best tip I can give you, the absolute WORST time to check your parachute is on the way down.

The same goes for checking the robustness of your network and data back up where the absolute worse time to think about it, is AFTER a data disaster.

Read More

An URGENT Warning for Businesses Running Microsoft Windows Server 2003

EXPIRATION NOTICE
If your organization is currently running either Microsoft Windows Server 2003 or Exchange 2003 on any servers in your office, you need to know about a dangerous security threat to your organization that must be addressed very soon. Please take a moment to read this important announcement.

Read More

It is time to change how we think about network security.

Ending the year, much like it began, many companies in the wake of the latest and debilitating attack on Sony are re-evaluating what they consider “secure.” In reviewing the vulnerabilities that opened the door for hackers to deeply imbed themselves in Sony’s IT infrastructure, companies are beginning to realize the need to proactively invest more heavily in their cyber security and IT defense systems.

Read More

IMPORTANT UPDATE: WARNING NEW VIRUS CRYPTOWALL

Virus Warning: CryptoWall
 
To our valued clients and colleagues:

We are seeing a nasty mutation of the CryptoLocker virus called CryptoWall.
 
This virus is a form of a Trojan horse and is considered “ransomware."  This means that the hacker will install malware onto your computer and will want to exact some type of payment from you in order to set your data free.  In this virus, your Word, Excel, PDF, Photo and other files can become encrypted or corrupt and despite the removal of the virus itself, the files may be virtually impossible to decode. In addition, anti-virus software does not typically "see" this as a threat since the virus behaves much like a user would.

Read More

October is National Cyber Security Awareness Month

Our Nation’s economy relies on the success of small and medium-sized businesses. These types of businesses offer a wide range of services and in addition, they store significant amounts of sensitive data, ranging from their database and financial spreadsheets to intellectual property.  To protect this information, it is important to have a strategic approach to cyber security

Read More

Explorer Security Bug

The best thing to do in order to protect yourself against the Internet Explorer security bug is not to use the web browser at all. Even though it might take some time to get weaned from Internet Explorer to a different web browser like Chrome, Firefox, Safari, or Opera, in the end – it will be worth the effort and time.

Read More

Have a question?

Call 516.876.8761
Email tech@tech2020solutions.com

2022 Copyright
Tech 2020 Solutions
All rights reserved.

Site designed and powered by: