Contact Us Today!

Microsoft Security Updates February 2020 – Release Notes

Microsoft Security Updates February 2020 – Release Notes
Microsoft’s February security updates releases include updates for the following applications:
• Microsoft Windows
• Microsoft Edge (EdgeHTML-based)
• Microsoft Edge (Chromium-based)
• ChakraCore
• Internet Explorer
• Microsoft Exchange Server
• Microsoft SQL Server
• Microsoft Office and Microsoft Office Services and Web Apps
• Windows Malicious Software Removal Tool
• Windows Surface Hub

This link has the full list of what updates are included : ADV200003

The following links have FAQs with additional information about the named update, along with any known issues or special steps to complete the installation.

What is a Priority 1 Outage?

WHAT IS A PRIORITY 1 OUTAGE?
Within a managed service provider, the words "we have a priority 1" creates an immediate sense of urgency and a call to arms.  A priority 1 outage means a client is experiencing a loss of service.  We sit up straight and come to attention because our client has lost access to a technical service that allows them to conduct their day to day business.

Five Security Solutions to Protect Your Organization from Cyber Attacks

Five Security Solutions to Protect Your Organization from Cyber Attacks
Your organization is under attack! Cyber crime is a global business, and the cyber criminals profit by preying on organizations that are not prepared to defend themselves.
Did you know…

There is a ransomware attack every 14 seconds
1/2 of all cyber security attacks are targeted at small businesses
Most small businesses go out of business within 6 months of a cyber attack
The cyber crime economy has grown to $1.5 trillion / year

I'm assuming that your organization already has the security basics in place like firewalls, antivirus & backups.

Read more 1 Comment

WPA3 Wireless Security

Wireless networking isn’t going anywhere, and neither are the “bad guys” who are interested in penetrating your wireless network security. For this reason, we have wireless encryption like WEP, WPA, and WPA2. The next best thing is here, WPA3. Listed below are some great new features.

Tips to Protect Your Smartphone

In today’s world, almost everyone owns a smart phone device. Not only do cyber criminals want to hack into your computer, they also want to gain access to your phone. Many people fail to realize that just because your phone is close by your side and not in someone else’s’ possession, that your information is safe and secure.

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months' time, Flash will be gone from Office 365 for good.

System Views vs My Views – Part Two of Two

Sharing "My Views" with Teams
In Part One, I talked about the differences between System Views and My Views. I also mentioned that whenever possible to filter by dynamic values (current user, manager, territory, last month, next year, etc.).

What if you work for a company that has several different divisions and your user base works across multiple divisions? They would want to have access to their views but they don't necessarily have to see all of the views for all of the other divisions.

Help, my Office 365 account was hacked!

So you just got a call from one of your clients telling you that they received a strange e-mail from you with an attachment.  You know you haven't e-mailed them in days.  What could be going on?  You check your sent mail folder and to your surprise there are hundreds of sent messages to everyone in your contact list.