Skip to main content

How to Secure Microsoft 365: Top 10 Best Practices

Microsoft 365 is a powerful suite of tools that can significantly enhance productivity and collaboration. However, securing your Microsoft 365 environment is crucial to protect sensitive data and ensure compliance. Here are ten best practices to help you secure Microsoft 365: 1. Multi-factor Authentication (MFA) Implementing MFA adds an extra layer of security by requiring […]

Safeguarding Your Business

Safeguarding Your Business Safeguarding Your Business is critical to most businesses. Did you know that cybersecurity breaches are projected to cost $10.5 trillion by 2025? Fully automated AI ransomware businesses are being sold on the Dark Web, targeting small businesses. Business owners need to view cybersecurity as an investment in protecting their business and clients, […]

7 critical password rules to practice

There are 7 critical password rules to practice. in your daily lives. For an in-depth understanding of digital security, consider reading the four-volume Digital Identity Guidelines by the National Institute of Standards and Technology (NIST). Although it’s a comprehensive document primarily tailored for Federal agencies requiring highly robust security measures, it also includes a wealth […]

What should you do if you get a pop-up message?

Here’s how to prevent pop-ups from causing harm to your system What never to do when you see a pop-up message It’s crucial to be cautious with pop-up messages, as scammers often use them to trick you into downloading malware or revealing personal information. Your instinct to pause and assess the situation is correct. However, […]

Immutability with Fortified Copies

US Service Center Fortified Copies offer a fresh approach to immutability—protecting servers, workstations, and Microsoft 365 backups, without compromising the ease-of-use US Service Center is known for. Immutability became a hot topic in the data protection space when ransomware groups started targeting backups to thwart victims’ recovery attempts. What is Immutable Data Backup? “Immutable” simply […]

Broad VMware Changes

You may already have heard about the acquisition of VMware by Broadcom. High-level summary? They’ve decided to end the sale of perpetual licenses for VMware products, moving to a subscription model/bundling, and reducing the number of Resellers and Cloud Service Providers. Existing contracts will continue to receive support as outlined in their contractual commitments, but […]

Google and Yahoo are upping their game in 2024

In the on-going battle against spam, Google and Yahoo have announced new standards for 2024 which will help protect their inboxes and reduce spam intrusions. This is great news for legitimate email senders who abide by email best practices. Your business will need to adapt to these new standards or risk non-delivery to the users’ […]

Virtual Kidnapping

Be aware of a New Twist on a Frightening Scam — Virtual Kidnapping. The FBI reports this crime is on the rise. Below are some ways to protect yourself. Don’t Become a Victim The success of any type of virtual kidnapping scheme depends on speed and fear. Criminals know they only have a short time […]

Windows 8.1 End of Life

Windows 8.1 support will end on January 10, 2023 As a reminder, Windows 8.1 will reach end of support on January 10, 2023, at which point technical assistance and software updates will no longer be provided. If you have devices running Windows 8.1, we recommend upgrading them to a more current, in-service, and supported Windows […]

Dymo Printer Proprietary Labels

Dymo Printer Proprietary Labels have RFID chips. This means you are required to purchase Dymo brand labels to run on these news Dymo printers. If you are using custom labels, avoid purchasing the Dymo 550, Dymo 550 Turbo, and Dymo 5XL printers. These printers ONLY use proprietary Dymo labels. These labels have an RFID chip […]

McAfee Agent bug lets hackers run code with Windows SYSTEM privileges

Bleeping Computer’s article from January 21, 2022, states the following: McAfee Enterprise (now rebranded as Trellix) has patched a security vulnerability discovered in the company’s McAfee Agent software for Windows enabling attackers to escalate privileges and execute arbitrary code with SYSTEM privileges. McAfee Agent is a client-side component of McAfee ePolicy Orchestrator (McAfee ePO) that […]

3G Networks are shutting down in 2022

From the FCC: If your mobile phone is more than a few years old, you may need to upgrade your device before your mobile provider shuts down its 3G network, to avoid losing service. For more information on your mobile providers’ plans for 3G retirement and how you can prepare, contact your provider directly. What […]

Microsoft says M365, cloud services inaccessible due to Azure AD outage

Does not affect users with already active sessions. Microsoft has confirmed issues with its Azure Active Directory service that are preventing a number of users from authenticating to gain access to cloud-based applications and services. The company said in a status advisory that “customers using Azure Active Directory or Microsoft Account may experience authentication issues […]

Tell Apple: Don’t Scan Our Phones

Apple has abandoned its once-famous commitment to security and privacy. The next version of iOS will contain software that scans users’ photos and messages. Under pressure from U.S. law enforcement, Apple has put a backdoor into their encryption system. Sign the EFF petition and tell Apple to stop its plan to scan our phones. Users […]

Is your printer tracking you?

The tracking is almost invisible but contain a hidden code. These “microdots” are well known to security researchers and civil liberties campaigners. Many color printers add them to documents without people ever knowing they’re there. The EFF (Electronic Frontier Foundation) has a no longer updated list of printers. It is referenced in the article. Article: […]

Tired of robocalls on your mobile phone?

The new FCC STIR/SHAKE framework is effective on 06/30/2021.  The FCC is forcing providers to authenticate and verify each call.  This standard framework will help with spoofed called by authenticating each caller ID. This will significantly reduce/eliminate the robocalls and illegally spoofed calls.   If your service does not comply, then the calls would be […]