Unusual phishing email will soon be found in the inbox

September 20th, 2016
Unusual phishing email will soon be found in the inbox

We spotted an unusual phishing email which revealed a new scam your users will soon find in their inbox. Time to inoculate them before it becomes a problem!

Many online service providers like Microsoft, Google, Facebook, Twitter, and PayPal have adopted a policy to warn users via email when there is a possible security-related event like "unusual sign-in activity".

Copies of these emails have been used for credentials phishing for a few years, but the problem is these security notifications are now being used by bad guys as a new attack vector for a tech support scam.

Spam CSI

August 7th, 2015
Spam CSI

You may have noticed a few more SPAM messages in your inbox recently. SPAM, not the yummy meat product kind either, is trending up again, reminding us all that the pest has not gone away. Recently I attended a brainstorm where we sat and rethought the battle with SPAM, yes SPAM. Instead of the typical kneejerk reaction of adjusting our SPAM filter or screaming, we decided to CSI or in other words use intelligence to analyze and defeat the anonymous beast.

Just Because You’ve Been LUCKY Enough To Avoid A Cyber-Attack Doesn’t Mean You’re Not At Risk

March 20th, 2015
Just Because You’ve Been LUCKY Enough To Avoid A Cyber-Attack Doesn’t Mean You’re Not At Risk

Imagine walking into your office one morning to discover your computer network was breached by a hacker, exposing not only YOUR company’s data, but also all of your client records and private communications. Imagine the embarrassment of having to notify your clients and vendors that, because of you, their private and possibly personal information may now be in the hands of cybercriminals.

5 Smart Tips To Know Before Moving To A Cloud-Based Application

March 20th, 2015
5 Smart Tips To Know Before Moving To A Cloud-Based Application

Cloud computing is all the rage these days, and while some companies are moving their whole IT infrastructure to the cloud, many others are choosing to streamline their businesses by moving individual business applications. If you are considering moving any of your company’s software applications “to the cloud,” make sure to consider these 5 tips BEFORE pulling the trigger:

1. Back It Up!

Migrating data to any new location is a mess, and anything can (and usually does) go wrong.

March Madness: How To Protect Your Business

March 19th, 2015
March Madness: How To Protect Your Business

Its that time of year again, employees are hunkering down in the cubicles, making their picks for the NCAA tournament. You as the employer and internet provider are footing the bill for this office tradition. Now, it is good for employee moral and company excitement to hold an office pool, however that does not mean your organization needs to lose bandwidth to game streaming over the latter half of March and into April.

12 Things To Know About Windows 10

January 22nd, 2015
12 Things To Know About Windows 10

Microsoft gave the first look at its Windows 10 operating system on Tuesday, a major release that will span all hardware from PCs to phones and try to address the ills that have dogged Windows 8. The event in San Francisco was aimed mostly at enterprise customers, and Microsoft promised an OS that will be more intuitive for the millions of workers still on Windows 7 and older OSes.

Safeguard Your Devices – A Back to School Guide

August 22nd, 2014
Safeguard Your Devices – A Back to School Guide

By Matthew Sorenson

It is that time of year again. Students are heading back to colleges and universities across the country. Their minds are focused on moving into new dorm rooms and apartments, buying supplies and books, and registering for classes.

Read more 1 Comment

Russian Hackers Steal 1.2 Billion Login Credentials

August 8th, 2014
Russian Hackers Steal 1.2 Billion Login Credentials

By Naomi Dolin-Aubertin

Or did they? Security experts are on the fence. For more in-depth articles examining how great of a security breach this is, visit here and here.

That being said, here are five things you can do to help bolster your online security.

The Subtle Art of Internet Tracking

August 1st, 2014
The Subtle Art of Internet Tracking

By Naomi Dolin-Aubertin

Never in human history has there been so much data available about average people. I've discussed this before when speaking about how social media gives anybody a platform to make their voice heard. In the past, it was always possible to learn about the famous, the infamous, and the top echelon of society.

5 reasons I love my cloud desktop

July 21st, 2014
5 reasons I love my cloud desktop

By Naomi Dolin-Aubertin

I have a confession to make; I am a cloud desktop convert. I honestly can't imagine how I worked without the cloud before. Let me tell you five reasons why:

Ease of use
Our WebTop cloud workspace is easy. When I started working with DirectNetworks, I think I received two pag
es of printed documentation on how to use WebTop.