(If you haven't read part 1, you can do so here.) In this article, we'll talk about Google Drive File Stream. Perhaps you've used the free Google Drive. Unless the document you create or open a Google doc of some sort (doc, sheet, slide, etc.) you have to download it,...
Security Products and Services
QNAP NAS appliances at risk of malware
Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...
3 Things to Watch for in Preventing Business Email Compromises (BEC)
Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.
What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.
DNS Firewalls: A New Tool to Protect your Business
If your computer connected to a DNS Firewall instead of a regular DNS and you typed in “yotube.com” (note the missing “u” from “you”), the attack will be thwarted. Yotube.com is a known phishing site that tries to download malware (viruses, worms, ransomware, botnets, etc.) to anyone who mistakenly tries to visit it.
Twitter Hacked: What is Social Engineering?
Yesterday, Twitter announced that it had been hacked. Hackers seemed to target a number of accounts belonging to cryptocurrency companies and executives as well as VIP accounts of Joe Biden, Barack Obama, Kanye West, Bill Gates, and Elon Musk and others. The target...
Google is Getting Rid of Password Authentication
Google has announced that, starting February 15, 2021, it will no longer authenticate users with just usernames and passwords. "What!?!" That's right. Less secure applications that only use a username and password to grant access or permission--applications like...
Windows Users: Don’t Force Upgrade 2004
Like front door locks, your computer is only as secure as it's last patch release. Keeping computers updated to the latest stable release should be an important part of your IT provider's tasks. That said, Windows 10's May Release (release 2004) was a big package and...
New Google Meet Features
If you're a G-Suite subscriber, you're probably using Google Meet for your virtual meetings. If you're not, then why not? It's free and included in your subscription. Google has recently made a couple of changes to Meet which are long overdue: Tiled Views: Up to now,...
Copying Files from Home and Office
So you're spending your time between home and office these days (or if you're lucky the lake and the office). How do you get any work done when all your files are on the office server? In an ideal world, your business would support you by: Using a distributed...
New to Digital Advertising?
Here's a Quick Primer on PPCs A key concept in digital advertising is "Pay Per Click" or PPC. With PPC, people can see your ad hundreds or thousands of times and it costs you nothing. You only pay when they click on your ad and engage with your website. The price per...
How VOIP Can Support Virtual Workspaces and Save You Money
Atlas is a Jive VOIP reseller and consultant. Why VoIP? VoIP service can: Save you money on your existing phone service (40% or more) Save you on long-distance (North American long distance rates are less than 1¢ a minute) Keep your existing published...
Do you Know What a Data Breach Can Cost You?
It's great when our systems work properly, when viruses and malware is kept out, computers don't crash, and our business location is available and humming smoothly. Sadly, sometimes things happen to interrupt our business' normal operations. In a recent study, 96% of...