by Felicien | Sep 5, 2017 | Education
Microsoft is the best choice for almost all daily work in the office, whether it’s Microsoft Word for documentation, Microsoft Outlook for email or Microsoft Excel for spreadsheets, so why not get the most out of those services? With the right Microsoft Office 365 expert, you can do even more with it.
However, as one of the world’s biggest technology companies, Microsoft knows that a product has to continually change in order to keep up with the ever-changing demands of users. Unfortunately, this can sometimes cause issues when a relied upon feature or version of software becomes unsupported.
Case in point – Microsoft has recently announced that an upcoming change will affect how Office 365 connects to Outlook, which could keep some users from accessing their inboxes.
This key change will end up affecting all Outlook users that are using a version more than two years old to connect to an Office 365 mailbox. That is, the protocol that allowed Outlook versions from 2007, 2010, and 2013 to connect with Office 365 (RPC over HTTP, or, Outlook Anywhere) will stop being supported by Office 365 after October 31, 2017. Details include:
Users of Outlook 2007 will not be able to connect to Office 365 after October 31. If that is the version you are currently using, you will therefore need to upgrade to a newer version of Outlook.
Users of Outlook 2010 will only be able to connect to Office 365 after October 31 if the proper updates have been installed in order to meet or exceed a specific build number: 14.0.7164.5002. Furthermore, it’s important not to forget that Microsoft mainstream support for Outlook 2010 has expired.
Users Outlook 2013 will only be able to connect to Office 365 after October 31 if the proper updates have been installed in order to meet or exceed a specific build number: 15.0.4779.1002.
So what can you do to keep connected to your Outlook inbox?
First of all: don’t worry. With expert Microsoft Office 365 support from {company}, you can rest easy. We can handle your update processes and any migrations or further support needed to ensure that you and your employees always have access to your Outlook inboxes, both before and after October 31.
In order to keep you connected we’ll do the following for you:
Verify your business’ Outlook versions and build numbers
Inform you of any required upgrades that need to be made by October 31
Let you know of any opportunities to move to enhanced Office 365 licensing options that will both handle the necessary upgrades and improve your productivity
Implement an Office 365 data backup strategy if your current strategy isn’t adequate to protect your Exchange, SharePoint, and OneDrive for Business data
Once we’ve got you properly setup to keep you connected to your Outlook inboxes, don’t forget that we can do a lot more as well. If you don’t feel that you’re getting everything you think you should from Microsoft Office 365, then allow {company} to help.
Our team of Microsoft experts is well-versed in everything that Office 365 has to offer, from the core functions of workhorses like PowerPoint and Excel to the hidden features and handy tricks that will allow you to use old standards in new and exciting ways. Upgrading to a more recent version of Microsoft Office 365 and actually using this new version to its full potential requires a solid grasp of exactly what it has to offer, which features and applications will have the most benefit for your unique business, and how to leverage the cloud aspect of this productivity suite to improve the way your staff gets work done.
Partnering with Microsoft Office 365 expert takes the guesswork out of it, and offers your business a valuable resource to help your team use this game-changing Office suite to your maximum advantage. Because what’s the point of investing in high-end technology if you’re not going to use it the way it was intended?
The {company} team has handled countless businesses’ transitions to Microsoft Office 365, taking care of everything from the initial install to helping to set up access to OneDrive to keeping track of subscription and licensing information. By making sure that every aspect of Office 365 has been setup correctly and taking the time to help your staff understand how the new tools they’ve been given actually work, your business can take advantage of a host of incredible new options that will help to simplify tasks, speed up projects, and impress your clients.
The key to finding real success with Microsoft Office 365 is having the needed resources and support in place to keep things running smoothly. That means having an experienced IT provider like {company} taking care of needed patches and updates, monitoring and maintaining the security of your entire IT environment, and helping you manage the devices that have access to mission-critical data and applications.
Microsoft Office 365 is flexible, versatile, and surprisingly simple. It’s just a matter of having the right IT provider implement and leverage this incredible productivity tool, making sure you’re not missing out on what Microsoft Office 365 has to offer.
Interested? Call {company} right away at {phone} or email {email} to learn mo
by Felicien | Sep 1, 2017 | Education
You may have heard of the dark web, but do you really know what is going on in this special part of the Internet that you need software to access?
What if somebody told you that there was a huge portion of the Internet that few people have ever been to? That right now, there is a place online that you can’t get through via your Firefox or Google Chrome web browser that houses 7500 terabytes of information? A place that has between 400 and 550 times more public information than the “regular” Internet, spread out across more than 200,000 different sites?
This may sound like fiction, but it is very much a reality. The above statistics are referencing something called the dark web and if you’ve never taken the time to learn about it, now would be an excellent time to start.
What is the Dark Web?
Technically, the dark web is just a blanket term used to describe either A) a part of the web that requires special software to access, or B) any website that hasn’t been indexed by Google. As the vast majority of all online interactions essentially begin with a search engine, a site that doesn’t appear – even when you search for it by name – on an engine like Google essentially doesn’t exist at all.
But these sites do exist and they’re a lot seedier than you were likely even imagining.
To the first point, certain areas of the dark web are only accessible via specialized applications. Tor, Freenet and I2P are some of the most prominent example. Tor is a name you’ve likely heard before in reports on the dark web on your local news, as it is the most popular of these applications in large part because it is also the easiest to use.
The Implications of the Dark Web
The major appeal of the dark web comes by way of anonymity – applications like Tor promise total secrecy and complete anonymity as they don’t connect a “user” and a “server” through traditional means. Instead, they use what are commonly referred to as Tor relays – specially configured computers that act as nodes. As a message moves from one node to another, it is encrypted in such a way that only the machine that sent it and the machine it is being sent to can decode it.
Pass a message across enough of these nodes and it becomes incredibly difficult – if not downright impossible – to decrypt.
Because of this greater degree of anonymity and secrecy, the dark web is incredibly popular among people with malicious intentions. But it isn’t just cyber attackers who are making use of these resources – everyday criminals, pedophiles and even certain terrorist groups regularly communicate via these means.
Just one frightening example of the “worst” that the dark web has to offer comes by way of its “Assassination Market.” This is exactly what you think it is – a place where users can pay money with the specific intention of having someone assassinated.
The dark web is home to many of these markets, in fact, where illegal goods like drugs and firearms are sold. In an effort to remain as anonymous as possible even in the middle of a transaction, Bitcoin has quickly become the favored currency among its users.
Where the dark web suddenly becomes relevant to small and medium-sized business owners, in particular, has to do with its intersection with cyber crime.According to one study conducted by the Norwich University, the total amount of revenue generated by criminal activities on the dark web exceeds $100 million per year. People are regularly using it to develop, share and test new cyber attacks before they have a proper “launch” against targets all over the world.
When you consider the fact that the cost of a single data breach now costs businesses an average of $3.62 million as of 2017 (breaking down to about $141 per compromised record), you can begin to get an idea of why the dark web has become incredibly popular among people who wish to do you harm.
Also making things incredibly difficult is the progress (or lack thereof) that law enforcement agencies are having in penetrating the dark web’s murky waters. Thanks to the aforementioned way that the dark web operates, it’s very difficult to simply “bust” someone planning a massive cyber attack. Even Bitcoin makes tracking illegal funds much easier said than done. Also complicating matters is the fact that a significant number of the sites listed on the main index of dark websites are scams – meaning that they only look like they’re fronts for illegal activity.
Still, the good news is that while the dark web certainly makes the job of agencies around the world more difficult – stopping these people is certainly not impossible. In recent years many agencies have had a large amount of success in both bringing down some of these illegal websites and arresting the users behind them. Ross Ulbricht, for example, was the person who created perhaps the most well known drug market in the history of the web – Silk Road. Though a feature film has been planned about his life, he’ll have to watch it from behind bars as he is currently incarcerated.
If you think that the dark web doesn’t have the potential to affect your employees, your customers and ultimately your business, you’ll definitely want to think again. Part of staying protected in terms of cybersecurity and the digital age involves staying aware. Knowing as much as possible about what people are up to in the so-called “dark” or “deep” web puts you in a better position to fend off new cyber attacks before they have a chance to do some real damage.
If you’re in {city} and would like to find out more information about this or any other essential IT topic, or if you just have any specific questions that you’d like to discuss in a little more detail, please don’t delay – contact {company} today by phone at {phone} or by sending us an email to {email}.
by Felicien | Sep 1, 2017 | Education
You may have heard of the Dark Web, but do you really know what it is? This may sound like fiction, but it’s very much a reality. If you’ve never taken the time to learn about it, now would be an excellent time to start.
What is the Dark Web?
Technically, the dark web is a blanket term used to describe either:
A part of the web that requires special software to access, or
Any website that hasn’t been indexed by Google.
The dark web takes up a huge portion of the Internet. You can’t access it with standard web browsers. It houses 7,500 terabytes of information, and contains 550 times more public information than the “regular” Internet. This information is spread across more than 200,000 different sites—And they’re a lot seedier than you can imagine.
To access the dark web, you need specialized applications like Tor, Freenet or I2P. Tor is a name you may recognize from reports in the news. It’s the most popular of these applications in large part because it’s also the easiest to use.
Experts warn that you should stay off the dark web. However, if you must explore it, do so via a virtual machine on a computer that has no data stored on it. This is because there’s some very sophisticated malware circulating on the dark web.
Criminal Activity on the Dark Web
The major appeal of the dark web is its anonymity— Applications like Tor promise total secrecy as they don’t connect a “user” and a “server” through traditional means. Instead, they use what is commonly referred to as Tor relays – specially configured computers that act as nodes. When a message is transferred from one node to another, it’s encrypted so only the machine that sent it, and the machine it’s being sent to, can decode it. Pass a message across enough of these nodes and it becomes incredibly difficult – if not downright impossible – to decrypt.
Due to its anonymity and secrecy, the dark web is incredibly popular with people who have malicious intentions. However, cyber attackers aren’t the only ones using it—Everyday criminals, pedophiles and even terrorist groups regularly communicate via the dark web.
The dark web is home to many criminal activities—including a market for illegal goods, drugs and firearms where transactions are made via Bitcoin. A frightening example of the “worst” use of the dark web is the “Assassination Market.” This is exactly what you think it is – a place where users can pay money to have someone assassinated.
The Dark Web Impacts Businesses Around the World.
If you think that the dark web doesn’t have the potential to affect your business, you should think again. It’s home to the cybercriminals who want to steal your data. According to one study conducted by the Norwich University, the total amount of revenue generated by criminal activities on the dark web exceeds $100 million per year. Criminals also use it to develop, share and test new cyberattacks before a “launch” against businesses throughout the world.
When you consider the fact that the cost of a single data breach now averages $3.62 million ( about $141 per compromised record), you see why the dark web is so popular with cyber criminals.
Law enforcement agencies are having difficulty penetrating the dark web’s “murky waters.” It’s very difficult to “bust” someone who’s planning a massive cyberattack, and the use of Bitcoin also makes tracking illegal funds very challenging.
However, stopping these people is certainly not impossible. In recent years, many agencies have had success in both bringing down illegal websites and arresting the users behind them. For example, Ross Ulbricht, the person who created perhaps the most well-known drug market in the history of the web, The Silk Road, is now in jail. A feature film is planned about his life–However, he’ll have to watch it from behind bars.
Be Vigilant, and Stay Off the Dark Web.
To protect your business from cybercriminals on the dark web, you must be vigilant. Knowing as much as possible about how to fend off cyberattacks before they have a chance to do damage, is key.
The team at {company} understands these challenges. We’ll work with you to create a comprehensive security plan to protect your business in {city} from data breaches, malware or other cyber threats. Contact our security professionals at {phone} or {email} to schedule your no-obligation consult.
by Felicien | Sep 1, 2017 | Education
The IRS is warning of a new ransomware threat that is targeting businesses throughout the United States.
On August 28th, 2017, the IRS sent out a bulletin advising people to beware of a phishing strategy now employed by criminals. Upon first glance, the new ransomware seems to come from either the IRS or the FBI…but it’s not.
Here’s the official bulletin from the IRS: https://www.irs.gov/newsroom/irs-issues-urgent-warning-to-beware-irs-fbi-themed-ransomware-scam
In its warning to the public, the IRS stated that “The scam email uses the emblems of both the IRS and the Federal Bureau of Investigation. It tries to entice users to select a “here” link to download a fake FBI questionnaire. Instead, the link downloads a certain type of malware called ransomware that prevents users from accessing data stored on their device unless they pay money to the scammers.”
IRS Commissioner John Koskinen said, “This is a new twist on an old scheme… People should stay vigilant against email scams that try to impersonate the IRS and other agencies that try to lure you into clicking a link or opening an attachment. People with a tax issue won’t get their first contact from the IRS with a threatening email or phone call.”
Email, Social Media, and Text Messaging
The thing that the IRS emphasized is that the IRS does NOT use email, social media, or text messaging to communicate with U.S. citizens regarding personal tax issues.
The message from the FBI regarding its communication procedures is nearly identical.
So if you get an email, social media message, or text message that claims to be from the IRS or the FBI DO NOT CLICK on the links.
If you have any questions, go directly to the IRS or FBI websites and call the numbers listed there for assistance.
Have you already fallen victim to this scam?
Don’t pay the ransom.
IRS representatives said, “Victims should not pay a ransom. Paying it further encourages the criminals, and frequently the scammers won’t provide the decryption key even after a ransom is paid. Victims should immediately report any ransomware attempt or attack to the FBI at the Internet Crime Complaint Center, www.IC3.gov. Forward any IRS-themed scams to phishing@irs.gov.”
So, what do you do instead of paying the ransom?
Call a professional IT team such as {company} to survey your data recovery options and help you get through this with as little pain as possible.
Two Questions
How well is your network set up to block ransomware attacks?
Have your employees been trained to spot phishing and social engineering ploys?
Keep criminals away from your company and your confidential data!
Let the professionals of {company} help you fortify your business IT infrastructure and train your employees in safe computing. Contact us now at {phone} or {email}
by Felicien | Aug 31, 2017 | Education
Phishing attacks are deadlier than ever. Here’s how to train your employees to watch out for them.
Phishing schemes send duplicitous emails to businesses in an attempt to infect computers with malware. They’re successful when an employee clicks a suspect link/attachment, or gets tricked into giving up financial information.
When it comes to data security, phishing threats get less attention than more “active” malware attacks—And that’s too bad, because today’s phishing schemes are deadlier than ever.
Gone is the broken grammar from Nigerian princes. It’s been replaced with professional, detailed messages containing legitimate-looking logos and intelligent language.
They’re so good that even tech experts get fooled.
A successful phishing attack could cost your company anywhere from thousands to millions of dollars. Protect your business—Here are eight tactics to put in place.
Encourage Suspicion.
Studies reveal that employees fall for phishing scams because they’re trained to always be “nice.” As a result, they comply with email requests from “clients” without any question. Experts advise taking a suspicious approach to all emails. If an email message “feels wrong, listen to your gut.” Train your employees to follow their instincts when it comes to suspect emails.
Scrutinize URLs and Addresses.
You should always carefully examine all email addresses and URLs. With phishing emails, they tend to be a bit “off.” The URL won’t match the directions given in the message, or it won’t be the real web address, rather a similar one. The same is true of email addresses, and company logos, watermarks, and signoffs. If you simply glance at this information, you may be fooled. If you take closer look, you’ll realize it’s a counterfeit. Train employees what to look for if they come across an unexpected email, and to always pay attention to the details.
Think About the Message and Logo.
Phishing scams can be very subtle. Advanced phishing attempts may take over email clients to send messages from what appear to be very reputable sources. This is why it’s essential to stop and think before taking action—especially when money or sensitive information is involved.
Train your employees to examine the message. Is it unusual? Is it unexpected given what they know about the project or client? If they get a message that says, “Wire $5,000 right away for patent rights or we will lose this market,” this should raise warning bells—Why didn’t this person make a call or explain this in person? Any emails that focus on a disaster or emergency like this should be immediately suspected.
If You Don’t Know the Person, Stay Away from the Email.
Don’t recognize who the email is from? Then don’t do anything. This policy protects employees from phishing emails that get through your spam filters. If the email is from an address they don’t recognize, they should ignore the message. If necessary, they should forward it to the appropriate account manager and ask if it’s legitimate. It’s always worth taking a little extra time to confirm messages, rather than falling for a phishing scheme.
Call for Confirmation.
It’s amazing how many people don’t do this, even with extraordinary requests. Successful phishing emails depend on you not calling the sender and asking what’s going on. Calling the sender can destroy the most careful phishing attempts. (At the highest level, phishing may include fake phone numbers or rerouting, but this is quite rare.)
To get around this, phishers may include a message that says, “I will be out of the office today, but this request requires your immediate attention. Please don’t try to contact me, just download/click link/send money/ or (do some other stupid thing).” If you see a message like this, the first thing you and your employees should do is pick up the phone and call, especially when important data is involved.
Stay on Top of the Latest Phishing Schemes in Your Industry.
Phishing schemes vary between industries (based on how much money can be conned out of particular businesses). Research the phishing schemes trending in your industry, and what warning signs to look for. A variety of services offer intelligence reports for this very purpose. You can also visit security zines and forums that focus on your industry. These are typically updated with the latest cyberattacks.
Block Access.
Eventually, companies reach a size where trusting employees to avoid phishing attacks becomes very difficult. It’s important to use strong firewalls and updated security filters to block access to any dangerous or illegitimate sites (the same goes for downloads, etc.). This is essential to mitigate damage once phishing emails are opened. Phishing scams can’t hurt your business if they can’t upload malware.
Adopt Email Authentication Standards.
Email authentication standards are improving all the time. They provide an excellent way for companies to stop spoofing attempts both to and from your organization. Basically, it authenticates senders and makes sure that an email really did come from that sender. This tactic also makes it more difficult to spoof emails from your company. The current standard is DMARC (Domain-based Message Authentication, Report and Conformance). So, if your business is a target of phishing scams, look into adopting this standard for added protection.
An issue worth noting is that DMARC is relatively new and underused. It may not be compatible with all software and services. So, this is the time for a serious consultation with your IT experts to discuss implementing authentication. The process is highly effective, and worth your time.
Need help protecting your business in {city} from phishing attacks? {company} is ready to help. We specialize in data services and security, and can find the right approach for your business. Contact us at {email} or call us at {phone} for a no-obligation, complimentary consult.