What is the cost of your company's involuntary IT manager?

Top 5 Ways to Protect Yourself From “WannaCry” Malware

It’s been well documented in the news that the latest ransomware, dubbed WannaCry, has effected a lot of businesses and people over the last few days. WannaCry is just the latest in a long line of ransomware attacks that we’ve been talking about (and keeping people safe from).

The good news is that you can protect yourself – and even recover your files if they get infected:

  1. First, apply all Microsoft updates to your Windows computers. This latest malware propagates through a security hole in Windows, but if your computer is patched, then you can’t automatically get it.
  2. However, just because your computer is up-do-date doesn’t mean you can’t get the WannaCry malware. You can still get this malware – and all kinds of other malware – by clicking on a link or by opening an attachment in a malicious email.
  3. Make sure your anti-virus and anti-malware software is up to date, and always running on your computers – both Mac and PC’s alike. Yes, Mac’s are vulnerable to malware also (just not this specific “WannaCry” strain of malware.) Good anti-virus/anti-malware software will protect your computers.
  4. In case you or your employees do get infected with malware, make sure your backup systems can restore your data (and make sure you know how long it will take to restore your files and get back to work.)
  5. Train your employees on cyber threats of all kinds – from ranswomware to phishing attacks. Ongoing training programs will greatly reduce the likelihood that you will get infected.

Still concerned or need help?
Our TotalCare managed service programs protect businesses throughout New Jersey and New York! Contact us today to learn how we can protect your business – and your profits!

Acquiring a Company? Save Money with an IT Audit!

There is a lot to consider during the due diligence process of a merger or acquisition. The focus is primarily on the company’s books because the financial records tell a big story about that firm’s financial health. But, they don’t tell the whole story–especially regarding the state of a company’s business technology and the unexpected expenses and liabilities that you may incur after the sale.

Sure, things appear to be working, but how do you know if are you inheriting an old jalopy or a finely tuned machine? How old is their IT hardware (computers, servers, firewall, etc)? Are they in compliance for record storage requirements and software licensing? Have they ever had a cyber intrusion or a theft of customer data?

Doing a full IT audit may tell quite a different tale about the state of the other company’s computing network, and the real value of the organization. Read more

Cyber Security Tips

It’s Tax Time. Think Before You Click!

This time of year, it is more important than ever to think before you click!

Security systems (like anti-spam, anti-virus, and firewalls) stop the majority of malicious emails, but they cannot stop all of them.

Cyber criminals are sending “spoofed” emails that look like they come from the CEO or another C-level executive in your organization, asking you to send employee’s W-2 statements or to transfer money.

We have seen a huge increase in these types of malicious emails, and authorities are warning about a huge wave of W-2 phishing scams going on right now.

Read more

Replicating Files is NOT the Same as Backing Them Up

Many businesses use file “sync and share” applications such as Dropbox, Box.com, and Google Drive. These programs are relatively cost effective and are very easy to use for file sharing, but they are not meant to be used as a business-class file storage system.

Sure, it’s convenient to store your files in the Cloud because you can then sync them to any device you want. However, replicating files across multiple devices (desktops, laptops, mobile devices, etc) means you are simply putting the same file in multiple places, which is not the same as backing it up.

In the event of a ransomware attack, which installs a nefarious cryptolocker virus on all those files, everywhere they’ve been sync’d up means they’ll be cryptolocked, making it very difficult, if not impossible, to access your data.

Read more