Need Help?

News & Notes

Creating an Effective Cybersecurity Strategy to Protect Your Business

Small businesses today are plagued by cyberattacks from viruses, phishing and ransomware. How can you protect your networks and systems from malware? Below is a multi-faceted strategy to counter the intrusion of hackers and cyberthieves. Prioritize a Cybersecurity Best Practices Culture with Employees The first …

Cybersecurity Risk and 71% of Businesses Who Are Set to Burn

Cybersecurity Risk is definitely a bake-a-Brûlée situation. (Ugh, really Kevin?) If you aren’t paying attention – you could eventually burn down your house. Cyber-attacks were up almost 20% in 2017, which turned up the oven temperature – 9.32 Billion Malware attacks cranked up the browning …

Google Docs Scam Attempt Warning

Google Docs Scam Flooding the World If you didn’t get a fraudulent email already, please be advised that a Google Docs scam has hit the world with a spearphishing attack against a their document solution. Thankfully, within an hour, Google said they shut down the …

Lord of the Ransomware – Return of the Cryptolocker

Ransomware steals and holds your data hostage. For years, ransomware protection and removal has been a large cat-and-mouse game with internet security companies like Symantec, McAfee, and TrendMicro. Unfortunately, cryptolocker, a variant that spread like wildfire in 2014 has resurfaced stronger then ever. Generally, they …

Exchange Server 2007 is a Threat to Your Business

Exchange Server 2007 is 12 year old technology. Retire it. Do you know if you use Exchange Server 2007? Do you know what a secure site is? For most people, it simply means that they see the green “secure” notification next to the web address …

Spear Phishing Cyberthreat is Getting Worse

Spear Phishing Tries to Get You to Disclose Your Confidential Information In simple terms, spear phishing cyberthreat means receiving an email that looks like it came from someone you know, but actually isn’t. It is a threat for anyone, anywhere, and in any industry. They …

Business IT Resolutions for 2017

Every year brings new business IT challenges. Did you just join a gym? Along with your health, it is a good time to review your business IT health. As opposed to yoga pants and water bottles, in this case you need quality technician experience, training, …

Phishing Emails | 5 Ways to Spot ‘Em

Phishing Emails – No, Not Fishing Emails. They are the “Nigerian Prince” swindle of this decade. Despite our best efforts via enews, meetings, calls, and support tickets, if there is one question we get at Network Medics on a weekly basis – it’s about phishing …

Your Printer Security is Important – Wireless Printers

Printer Security on Wireless Can Present Larger Problems It may seem like a minor risk if some hacker takes the time to bypass your wireless printer security. What are they going to do? Print through 50 pages of full color toner? That’s like 50 bucks …

Social Engineering | How It Impacts You

Social engineering is an art form. Whether it’s a spoofed email, phone call, or download link, social engineering is a researched and effective tactic to get you to give up confidential information. Social engineering not only can affect you, but can affect your business if …


Questions about
how we can
help you?