(847) 796-3177 [email protected]

Blog

Latest business-wide and industry-specific IT tips, security advisories and business IT news.

Blog Posts

QNAP Released Firmware Patches

QNAP Released Firmware Patches

QNAP, a Taiwan based provider of network-attached storage (NAS) devices announced security updates on Friday that address nine security weaknesses, including a critical issue that could be exploited to take over an affected system. "A vulnerability has been reported...

2021 Top Exploited Vulnerabilities

2021 Top Exploited Vulnerabilities

A joint Cybersecurity Advisory (CSA) released by authorities of the United States, Australia, Canada, New Zealand and the United Kingdom provides details on the top 15 common vulnerabilities and exposures (CVEs). These are vulnerabilities that were routinely exploited...

Johannesburg held for ransom by hacker gang

Johannesburg held for ransom by hacker gang

A hacker group known as the Shadow Kill Hackers is holding Johannesburg, South Africa's largest city, for ransom. They are demanding 4 bitcoins from Johannesburg authorities, or they'll upload stolen city data on the internet. The deadline is October 28, 5 pm, local...

Yet Another Exposed Database Found

Yet Another Exposed Database Found

Researchers said they have found a publicly accessible database containing almost 28 million records—including plain-text passwords, face photos, and personal information—that was used to secure buildings around the world. Researchers from vpnMentor reported on...

Ransomware and malware attacks have more than doubled

Ransomware and malware attacks have more than doubled

Multiple state and local governments have been set back this year onto their heels by ransomware. With attacks like the RobinHood ransomware attack in May that the city is still recoring from, ransomware attacks have been an almost daily part of the news. According to...

48% of Employees Have More Access Than Needed

48% of Employees Have More Access Than Needed

A new study of over 700 full-time US employees revelead that 48% of employees have access to more company data than they need to perform their jobs. 12% of employees said they have access to all company data. You may have complete trust in your employees but mistakes...

HIPAA Basics For Providers

HIPAA Basics For Providers

What's HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Breach Notification Rules protect the privacy and security of health information. The blog post below will help you understand the HIPAA Basics your business needs to...

What is a vCIO?

What is a vCIO?

IT complexity is a growing challenge for all businesses, regardless of size. The reason is that IT is now integral to virtually every business process. Every company now needs a plan, devised by professionals, for support, security, data protection, business...

4 Things To Know About Securing Your Small Business

4 Things To Know About Securing Your Small Business

Greater Risks for Small Businesses Small businesses often experience a greater risk from hackers, malware and other security threats. We've all seen the headlines, things like 'Data Breach', 'Small vendor a key tool used in a bigger attack' and others. Small...

Automatic Printing of Attachments in Outlook

Automatic Printing of Attachments in Outlook

Outlook can be configured to automatically print attachments from incoming emails. To do that you need to add a script in Outlook by following the instructions below. Once you've performed all of these steps, Outlook will automatically print attachments from incoming...

Value of IT Security in Business

Value of IT Security in Business

The Problem Business leaders do not always see the value when it comes to IT Security. They often do not see it as a competitive advantage either. Even though high-profile cases (hacks, ransomware attacks etc.) help, the vast majority continue to operate under the "it...

Protecting your business email account explained

Protecting your business email account explained

Background Over the last year, cyber criminals have continued to increase their use of social engineering rather than automated exploits, scaling up people-centered threats and attacks that rely on human interaction. They have found new ways to exploit “the human...

Business Password Security Checklist

Business Password Security Checklist

Business Password Security Explained Protecting your business from data theft and malicious attacks doesn't have to be hard. Simply following the password security checklist (further down in this post) can greatly improve the security of your business at no cost to...

We're Here To Help!

Office

830 Eagle Dr

Bensenville, IL 60106

Hours

M-F: 8am – 10pm
S-S: Closed

Call Us

(847) 796-3177