Email Etiquette Guidelines – Best Practices

When the use of email became common in the early 90s, the business world changed. Email now takes up a significant portion of our workday: one study shows that workers spend 28 percent of their workweek reading and answering email.

While we try to work faster and more efficiently, we must not forget the social rules that accompany any form of communication. Here are some of the dos and don’ts of email etiquette and email best practices.

Continue reading “Email Etiquette Guidelines – Best Practices”

FTC Releases Cyber Resources for Small Businesses

Original release date: October 25, 2018

The Federal Trade Commission (FTC) has released new cyber resources for small businesses, including non-profit and charity organizations. These resources, which cover topics such as ransomware, phishing, and email authentication, aim to help smaller organizations protect their network and information.

Continue reading “FTC Releases Cyber Resources for Small Businesses”

CASE STUDY: Encrypting Ransomware Hits Small Business

Client Name: (business name removed)
Service Details: Business client, on-site consult, on-site support
Problem and Request: Client reported that they were seeing “ransom” messages appear on their computers, and that they couldn’t access files because they had been locked by a virus. They needed help restoring access to their files and securing their IT environment.

Continue reading “CASE STUDY: Encrypting Ransomware Hits Small Business”

CASE STUDY: Dental Office Software Upgrade

Client Name: Dr. R.
Service Details: Business client, on-site consult, on-site/remote project
Problem and Request: A dental practice with 20 workstations and a legacy practice management software application needed some extra help. We met with the doctor to learn more about his IT environment, discover tech pain points, and help determine which technology solutions could contribute to his immediate and long term business goals.

Continue reading “CASE STUDY: Dental Office Software Upgrade”

How to Spot a Phishing Email: Tips and Examples

Antivirus Software Isn’t 100% Effective

You probably already know that installing an antivirus software program and keeping it up to date is a critical step in protecting your computer. This essential software uses virus signatures provided by software vendors to look for malware and stop it before it infects your PC (or Mac).

silverleaf-cyber-security-7a-300x194

What you may not be aware of is that antivirus software does not offer total protection against malware infection. In fact, today’s malware authors will often use widely-available crypting services to ensure that their malware is completely undetectable by the majority of the antivirus software on the market.

Continue reading “How to Spot a Phishing Email: Tips and Examples”