The Source Newsletter April 2018

Times are changing! You wouldn’t open your door to a criminal – don’t open your email “door” either. Systems is seeing a dramatic increase in ransomware attacks recently across all business types and sizes. Even with a best-in-class, layered and monitored security model, the risk of ransomware attack is present. This is because the last and most important line of defense is the end user. Read More Don’t sweep IoT security and training under the rug used with permission from Tektonika (HP) by Karen Gilleland When you drive home, your garage door opens as you arrive. That toy bear Santa gave your kids talks andRead More →

ransomware attack via email

You wouldn’t open your door to a criminal – don’t open your email “door” either. Systems is seeing a dramatic increase in ransomware attacks recently across all business types and sizes. Even with a best-in-class, layered and monitored security model, the risk of ransomware attack is present. This is because the last and most important line of defense is the end user. The majority of ransomware attacks are delivered via email, and many businesses facilitate employee education to better ensure their protection. Systems has tools to both assess your level of risk and provide ongoing end user training to businesses. It’s important to note thatRead More →

Passord Still Enough

Is my password still enough, or do I need more? Without question, security is critical these days. Whether it’s device, online, or mobile security, the need for protection is obvious, and the risk can’t be ignored. For years, that protection has centered on a login… and a password. But has that changed? Oh, that password. We’ve been reminded us for years not to write it down. Not to keep it anywhere that someone could find it. Which has made more than a few people prone to forgetting it. Show of hands, anyone? Then there’s the issue of using a unique password for every account. ConsideringRead More →

Cyber Security Old Typewriter

Cybersecurity with Managed Service, means increased security that is managed. Did you know your organization could be subject to data breach notification laws and possible fines for data breaches and losing sensitive client data? The fact remains that poor cybersecurity can lead to grave consequences, either financial or for your reputation. Common sense advice is that any organization should establish and maintain a plan for managing cybersecurity risks. This security plans should be informed by applicable laws and regulations. Are you concerned about the state of your security and your ability to protect your organization’s sensitive information? Managed IT services can help. Managed IT servicesRead More →