FTC Releases Cyber Resources for Small Businesses

Original release date: October 25, 2018

The Federal Trade Commission (FTC) has released new cyber resources for small businesses, including non-profit and charity organizations. These resources, which cover topics such as ransomware, phishing, and email authentication, aim to help smaller organizations protect their network and information.

https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity

The above resources cover everything from cybersecurity basics to more detailed descriptions of ransomware, phishing, and tech support scams.

The FTC site also offers downloadable 1-3 page PDFs on topics such as “Talking Cybersecurity with your Employees” and “Physical Security”.

Cyber criminals target companies of all sizes, and knowing some cybersescurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack.

CASE STUDY: Encrypting Ransomware Hits Small Business

Client Name: (business name removed)
Service Details: Business client, on-site consult, on-site support
Problem and Request: Client reported that they were seeing “ransom” messages appear on their computers, and that they couldn’t access files because they had been locked by a virus. They needed help restoring access to their files and securing their IT environment.

Continue reading “CASE STUDY: Encrypting Ransomware Hits Small Business”

Email Etiquette Guidelines – Best Practices

Step 1: Basic Email Rules

Use professional salutations. Don’t use laid-back, informal expressions like, “Hey you guys,” “Yo,” or “Hi folks. It is good practice to avoid shortening anyone’s name. Say “Hi Michael,” unless you’re certain he prefers to be called “Mike.” Use Hi or Hello instead.

Continue reading “Email Etiquette Guidelines – Best Practices”

CASE STUDY: Dental Office Software Upgrade

Client Name: Dr. R.
Service Details: Business client, on-site consult, on-site/remote project
Problem and Request: A dental practice with 20 workstations and a legacy practice management software application needed some extra help. We met with the doctor to learn more about his IT environment, discover tech pain points, and help determine which technology solutions could contribute to his immediate and long term business goals.

Continue reading “CASE STUDY: Dental Office Software Upgrade”

How to Spot a Phishing Email: Tips and Examples

Antivirus Software Isn’t 100% Effective

You probably already know that installing an antivirus software program and keeping it up to date is a critical step in protecting your computer. This essential software uses virus signatures provided by software vendors to look for malware and stop it before it infects your PC (or Mac).

silverleaf-cyber-security-7a-300x194

What you may not be aware of is that antivirus software does not offer total protection against malware infection. In fact, today’s malware authors will often use widely-available crypting services to ensure that their malware is completely undetectable by the majority of the antivirus software on the market.

Continue reading “How to Spot a Phishing Email: Tips and Examples”

Stream for Success: Optimizing Your Internet & Wi-Fi Connections

Nowadays more and more people are consuming entertainment through Internet-based streaming services rather than through traditional cable/satellite television service.

Continue reading “Stream for Success: Optimizing Your Internet & Wi-Fi Connections”