Locky. CryptoLocker. CryptoWall. Many names and variants exist for 2016’s biggest threat to IT security and productivity, but the outcome is extremely predictable. A user clicks a link in an email, opens an infected email attachment, or visits an infected website, and unknowingly invites the ransomware malware to encrypt files on their machine. If the […]
Hijacked
Chances are good that you, or a coworker, have encountered a browser message that caused quite a panic. It may have said: WARNING! YOUR COMPUTER MAY BE INFECTED! System detected potentially malicious viruses. To Remove Viruses, Call Tech Support Online Now: ############. The message also shows my IP address and service provider information or, Your device […]
Set Sail: Meraki Switch Promotion
Ahoy there! Exciting news up ahead: From now until July 30, 2016, first time Meraki Switch customers are eligible for a special promotion. When you buy any MS Switch with a 1-year cloud management license, you will be automatically upgraded to a 5-year license at no additional cost. That’s 4 years on us! Current Meraki […]
Monthly Network Reports
It’s the 1st of the Month; for many ITS clients, that means monthly network usage reports are available from Meraki firewalls, switches and wireless access points. While this data is available at any time from the Meraki dashboard, it’s also nice to receive the month-at-a-glance reports in your inbox. The reports often initiate conversations about […]
How Important is that Google Doc?
Google Apps for Education and Business users are the targets of a phishing scheme that has been circulating the internet for several years, but has seen a sudden uptick in recent weeks in our geographic area. Users receive an email that looks like this: Hovering over the link in my mail client […]