From start-ups to multi-billion dollar businesses, everyone is looking for ways to cut costs while turning a profit. In fact, many companies are just trying to keep things in the black, however that does not eliminate the need for practices that will improve and grow these businesses. Since few people have the expertise to manage much of today’s technology, a certain percentage of their budgets should be allocated to IT and software applications maintenance. Here are ways that Managed IT Services benefit small and medium businesses.

Read more

The challenges that small businesses deal with never end — and for the small number of employees who have to take on these tasks, it can quickly get overwhelming. No wonder, then, that many small businesses have all but ignored the important task of developing a disaster recovery plan, which involves understanding the risks of the disasters that small businesses face, figuring out how best to prevent against the deleterious effects of these disasters, and implementing a business continuity solution to minimize downtime.

Importantly, the disasters that cause small organizations the most damage are the ones that many business owners may not consider to be all that common, such as hardware failure and power outages. This blog post aims to illuminate five common disasters that small businesses face, so that business owners have a sense of perspective when considering the importance of a disaster recovery strategy.

Read more

An exploit for a recently patched Adobe Flash Player vulnerability has been added to the Angler exploit kit and it has been used by cybercriminals to deliver the file-encrypting ransomware known as TeslaCrypt.

The French security researcher who uses the online moniker “Kafeine” reported last week that an exploit for a Flash Player heap buffer overflow vulnerability (CVE-2015-8446) patched by Adobe on December 8 had been added to Angler. This flaw, reported by an anonymous researcher via the Zero Day Initiative (ZDI), was one of the 77 security issues resolved by Adobe with the release of Flash Player 20.0.0.228 and 20.0.0.235.

Read more

Most places we go, there is a network connection for us to link up to. This is our gateway to any and all information, as well as each other. When we open an Internet browser, we tend to take for granted that we are secure in surfing the web.

At home, we protect our family and belongings with locks and deadbolts. These are a measure to keep the bad guys at bay. But how do we protect ourselves when browsing the World Wide Web? What are we doing to secure our information?

Below are 5 ways to keep your information safe.

Read more

A critical patch released last week by Windows is causing Outlook to keep crashing, restarting over and over again. This patch was supposed to fix a flaw in the way Windows handles fonts, but has had some unexpected side effects for some Outlook users. Just a few weeks ago, we spoken about the weird Windows patch that was creating confusion world wide, and now it seem they have another problem with their update codes again.

Read more

Backup and disaster recovery solutions are invaluable solutions for businesses who need to be able to respond to disruptions within minutes or hours of an outage or disaster taking place. They work by taking a carbon-copy backup of servers and storing them in two locations — on-site and in-the-cloud. Backup and disaster recovery enables a multitude of recovery options, so businesses are able to get back up and running as soon as possible.

But beyond giving business owners a solution to outages and disasters, backup and disaster recovery services provide many more benefits to organizations. This blog post explains how a backup and disaster recovery solution can help organizations avoid the high costs of downtime, comply with important regulations, and boost the bottom line.

Read more

If you take a close look at what your list of Window Updates contain this week, you will be in for a shock!

Windows Update Server Hack

Does it seem weird that an update direct from Microsoft will have such strange wording in it?

Read more

All of us know backup is important, however most of the time it is place under “Not Urgent Now, But Important” category. A financial planner friend once said this “Backup is like insurance or a parachute. You should have it when you don’t need it. By the time you need it and don’t have it, it is too late”

To keep us reminded of how important backup is, here are some cases studies we have came across where they wished they had a working backup in place beforehand.

Read more

One day Judy, head of the finance department, receive an email from her boss, asking her to transfer $100,000 to a bank in Hong Kong for a supplier. Her boss has often asked her to do such transaction and it does not appear to be an unusual request, so Judy go ahead and transfer the money over.

Until a few day later, the supplier call and arrange for his payment which shocked Judy as she thought she has already transfer the money to him. Consulting her boss, she then found out that the boss has never send her any email for the transfer. Upon checking the email, they realize the email was a spoofing email that looks very similar to the boss’s email except for 1 letter.

Does this sound familiar to you? This kind of spoofing attacks have been reported all over newspaper and business journal and yet people are still falling for it.

How can you protect yourself against it?

Read more

Just got a message in one of my whatsapp groups – “Anyone know how to recover help_decrypt ransom attack??”

Another victims of the infamous ransomware Crypto virus, and lucky he managed to contain it within the PC before it spread to the server. How the CryptoLocker virus works is that it encrypts the files on the infected computer then it will prompt a message box asking you to pay within a certain period (usually within 2 days). This is why they are classified as ransomware, they keep your information hostage.

Read more