Blog

How to Avoid Being a Ransomware Hostage

ansomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today’s world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638 million attacks, almost 200 times more than the number of ransomware attacks in 2015. Most experts agree that Ransomware attacks will continue to occur–so what can you do to avoid being a ransomware hostage?

What Is Two-Factor Authentication?

Two-factor authentication (2FA) strengthens access security by requiring two methods to verify your identity. These factors can include something you know (a username and password), plus something you have (like a smartphone app) to approve authentication requests.

Time Matters 16.1 Released – March 28, 2017

LexisNexis(R) released 16.1 of Time Matters(R) so finally we can upgrade many of our clients who have been waiting for the opportunity to upgrade. Many of you are still on older versions of Time Matters. Lately we have had several firms purchase new desktops or upgrade to Office 2016; their hardware and software are not compatible with their Time Matters version, forcing them to stop and get the upgrade done.

Attention – Adobe DC Update Breaks TM SAVE Function

A recent update to Adobe DC (2017.009.20044) is causing Adobe to prompt you to disable Protected mode at startup even though its already disabled. This issue does not allow the pdf document to be saved to TM using TM SAVE. Enabling/disabling the option nor re-firing the add-in seems to resolve the issue.

Is Your Network Ready for Cloud Backup?

Ransomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery.

What are Managed Services and Why Should I Care?

A managed services provider (MSP) takes on the responsibility for a company’s technology and infrastructure by proactively providing a defined set of IT services for a fixed monthly fee. This approach is preferred by businesses over the traditional Break/Fix services delivered on an hourly rate when needed. By emphasizing high availability and reliability,

Rethinking Wide Area Networking

There is a shift in how businesses use technology. New applications, including Voice over IP VoIP phone systems, Cloud Based Email, File Sync & Sharing all require solid network infrastructure. According to a recent report from the Enterprise Strategy Group, Demonstrating SD-WAN Business Value: Rethinking WAN for a Modern Age, distributed organizations with multiple Remote Office/Branch Office (ROBO) locations may need to reduce unnecessary deployment and management of network infrastructure.

Archives

Share This