INFORMATION TECHNOLOGY FOR SMBs

Our blog articles archive includes it security tips, cybersecurity alerts, state of IT reports, and tips on information technology for small and medium size businesses.

Twitter Hacked in Coordinated Social Engineering Attack

Twitter stated that the company detected what they believed to be “a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.”  Twitter CEO Jack Dorsey tweeted several hours later that it was a “tough day for us at Twitter.” Twitter acknowledged that some users’ features may have been disabled as it investigated: “You may be unable to Tweet or reset your password while we review and address this incident.” About

Read More »

Has your info and password been hacked? – Latest breach had compromised billions of records

A hacker claims to have breached the backend servers belonging to a US cyber-security firm and stolen information from the company’s “data leak detection” service. The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches. The databases have been collected inside DataViper, a data leak monitoring service managed by Vinny Troia, the security researcher behind Night Lion Security, a US-based cyber-security firm. See original source here. powersolution.com

Read More »

Protecting Yourself from COVID-19 Fraud

Through powersolution’s membership of the Cyber Health Working Group (CHWG)*, a new phishing campaign has been detected and reported on. This phishing campaign is designed around COVID-19 themed emails that contain a link to a phishing page that attempts to collect credentials for multiple banks. The attackers then use the information collected to extort funds from the victims. An example of the phishing email follows: If the link is clicked, it redirects to the following website: Email header analysis shows

Read More »

Top 10 Computer Virus Symptoms [Checklist]

Computer virus symptoms are a not cast in stone, but rather a moving target. Just like with the human viral conditions, they evolve through generations – which in computer technology terms may mean weeks or even days. Some symptoms may not necessarily mean an infection – for example, if you are sneezing, you do not necessarily have a flu, it may be just an allergy – which means different cause, and different treatment methods. Same with computers – if your

Read More »

A HIPAA Risk Assessment is Mandatory: How to Avoid Audit Troubles

As a professional in the healthcare field, you obviously are very familiar with HIPAA, that ever-present reminder that data security is an issue that is always running in the background behind every activity that takes place in a medical professional’s workplace––as well as almost every supporting business that works with them. Everyone who works with personal health information (PHI) is aware that they are responsible for keeping that data secure. HIPAA is a few decades old, so the revelation that

Read More »

Did you know? Tax preparers must develop a written Information Security plan

Every tax professional in the US is a potential target for well-funded and technologically sophisticated cybercriminals who aim to steal your clients’ data. Often their goal is to steal data to steal your EFINs or CAF numbers and impersonate their victims and to file fraudulent tax returns. Cybercriminals use several avenues, including email, fax and phone to trick unsuspecting individuals and firms into giving up computer passwords, e-Services passwords and to take remote control of your computer systems and entire

Read More »

The cost of downtime for small business

Downtime is not a question of it is happens, but when it happens. Is your business a downtime statistic? 24% of companies said they experienced a full data disaster? 44% of small businesses have been a victim of a cyber attack? Average midsize companies have 16 to 20 hours of network, system, or application downtime per year? Data loss means downtime, and downtime will impact your bottom line. To be unprepared is not worth the risk. Many compliance regulations, like

Read More »

Ensure Employee Well-Being for Business Continuity

Communication during and following an emergency presents a variety of challenges. So, crafting an employee safety and communication plan that works is absolutely essential. The specifics will vary widely from company to company, but your emergency safety and communication plan must address the following: How the company will ensure employees are safe during a disaster event How it will communicate essential information to employees following the event The first part will depend heavily on the nature and location of your

Read More »

Best Practices for Financial Services IT

If your company identifies as a financial service business that doesn’t have the IT resources to  effectively recover from a major outage, make sure you’re weighing all of the factors around the costs of downtime. Here are the facts: US businesses lose $12 billion annually due to data loss. 93% of companies that lose their data center for 10+ days file for bankruptcy within one year. In a 2017 survey by the Depository Trust & Clearing Corporation, 78% of financial

Read More »

Financial Companies Have a False Sense of Security

While you may be taking some precautions, such as securing and backing up your sensitive data, sometimes that’s not enough. There is a common misconception that data is safe if backed up once a day, but this outdated practice is no longer sufficient for several reasons: If you forget to perform the backup or the backup process fails, you’re not protected. If you only back up your files once a day, you’re left vulnerable to the loss of an entire

Read More »

11 Slow Computer Issues you must fix right now

Reason #1: Your computer was running for a long time without a reboot.   What is a Boot? What’s a Reboot? Is it the same process as a Start and Restart? There are lots of explanations, definitions, and plain nonsense. Some are great valid technical definitions hard to digest for someone not involved in IT. I’ll give you the super easy answers. First of all, Boot and Reboot is the same as Start and Restart. Just more “technically inclined” of

Read More »

3 Major Differences between Managed Services and a ‘Break-Fix’ Model of Tech Support

In a nutshell, Managed Services is a planned, proactive model of support, and not a chaotic, reactive break-fix approach. Lets review 3 major differences: 1. Range of Services: In a traditional reactive approach most often then not small business services rely on a “computer guy” whose services they think they can afford, and only when they need them. This limits the knowledge and experience level and diversity of the tech support to just one or few persons. A proactive Managed

Read More »