News & Media

Tips to keep you sane while working from home

TELEWORKING IS NOT FOR THE FAINT OF HEART; BUT HERE ARE SOME GREAT TIPS TO ENSURE YOU GET THROUGH YOUR DAYS Remote working, or Telework is not a new concept; but for many, this may be the first time that a whole company is forced to now operate a business with every employee connected remotely….

Read More...

Hackers are getting more sophisticated with password harvesting

We have been seeing a sharp uptick in hackers trying to harvest passwords from our customers. While it is a ‘less sophisticated’ level of hacking, it is still very effective. If hackers are able to harvest passwords from important company contacts within an organization, they can often get the ‘keys to the castle’ with the…

Read More...

Phishing Information from IntegraMSP

Phishing/Spam are always hot topics in the IT industry – here are several newsletter links where we talk about just that  – as well as how to mitigate and train your staff to recognize the signs. You’ve Got a Package!…Or a Virus. – https://bit.ly/382vo8Z 5 Ways to Avoid Phishing Attacks from IntegraSys IT – https://bit.ly/2GZxRoM…

Read More...

2019 Global Ransomware Report

Read More...

Phishing Campaign Spreading Through Office 365 OAuth

A phishing campaign has been discovered that doesn’t target a recipient’s username and password, but rather uses the novel approach of gaining access to a recipient’s Office 365 account and its data through the Microsoft OAuth API. Almost all Microsoft Office 365 phishing attacks that we see are designed to steal a user’s login name and…

Read More...

Ransomcloud Demo with Kevin Mitnick

Read More...

Vade Secure Office 365 White Paper

Click Here to view the full white paper: Vade Office 365 White Paper

Read More...

Are you ready? Exchange Server 2010 End of Life (EOL) is just around the corner

Read More...

Microsoft Windows 7 End of Life: What that Means for your Business

Click here for a printable checklist

Read More...

Has your email been hacked?

You can find out quickly and easily by visiting Have I been pawned? Click and enter your email address to see if you are at risk. Here are some quick (and scary) email password Stats 1 in every 131 emails contain a malware 81% of cyber attacks are based on weak or stolen passwords. Weak…

Read More...

Difference between backup & business continuity? In business continuity, backup is just step 1

These days, it’s not a matter of if your business will experience downtime, but when. Imagine your servers crashing during the busiest season of the year. Do you have a plan to get back up and running in minutes? Your safest bet is to plan for the worst by having a business continuity and disaster…

Read More...

RansomCloud – what you need to know NOW

Read More...