Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That’s what National Cybersecurity Awareness Month (NCSAM) – observed in October – is all about! https://staysafeonline.org/ncsam/ https://www.dhs.gov/national-cyber-security-awareness-month https://www.cisecurity.org/blog/october-national-cybersecurity-awareness-month/   Tip of the Day – Social Engineering Social engineering is the use of

Read more…

A very popular computer cleanup utility, CCleaner, has been compromised with malware (https://www.wired.com/story/ccleaner-malware-targeted-tech-firms/).  We also use this software during computer cleanups, and wanted to provide an update on how we’re managing this threat: Webroot, the computer security endpoint protection we use and recommend, detects and stops this malware (as we’ve been seeing more alerts recently)

Read more…

As a follow-up to our post from February, where I walked you through one of our servers crashing, I wanted to share another experience from a client, which fortunately, was halted in its tracks. Many organizations have a false sense of security when it comes to their IT systems and feel, due to their size,

Read more…

On Friday, May 12th, one of the largest cyberattacks in history was launched. The ransomware attack, aptly named WannaCry, has affected over 230,000 systems, in over 150 countries. The ironic thing about this attack is that, dare I say, ignorance (or laziness) was to blame. And here’s why: This Was a Known Vulnerability While yes,

Read more…

Education has been a focus of ours for the past few years, starting with our Security Awareness and Training video, which educates staff members on security threats and good computing practices.  Since then, we’ve written articles, blog posts, conducted webinars and seminars, and even phished our clients, all in an effort to further educate our

Read more…

Dear Potential Victim, This is an example of a new type of phishing attack, where the attacker sends you an email with a PDF attachment, neither of which contain overly suspicious wording, broken English, or links to Russian websites. Often times, they’re sent using compromised user accounts from perfectly legitimate email providers, such as Office

Read more…

For this quarter’s Security Awareness and Training, instead of an article, I’ve developed a guide which can be used to configure a backup for a home or small business computer. The following guide will walk you through downloading and installing Veeam Backup. Veeam EndPoint Backup Free Edition, Setup Guide

Precision Business Solutions Director of Operations, Matt Shutty, whose responsibilities include finance and accounting, received an email from “Brian Shrift,” which initiated a request for an “important payment” to be sent out today. In review of the email, someone did their homework on this attack. This email looks legitimate. The attacker kept the request short

Read more…

If you haven’t heard of Pokémon GO during these past few weeks, I don’t know how you could have avoided it.  Pokémon GO, from Nintendo, is one of the first augmented reality smartphone games to gain popularity, using your smartphones gyroscope, camera, GPS and Internet.  As a Pokémon trainer, your goal is to catch Pokémon,

Read more…

Employees are most often a company’s most expensive resource, and from an IT security perspective, they’re usually the biggest security threat.  This threat can be partially mitigated by properly training employees on computer security and proper computing practices. A Security Awareness & Training program accomplishes this by providing training on security threats, such as malware

Read more…