Cloud

TECHLINQ – COVID-19 Update: Now More Than Ever, Proper Security, and Technology Support is Key

Written by: Anton Ruighaver, COO – TECHLINQ With the recent Coronavirus situation sending a shockwave through the world, many businesses are facing unprecedented uncertainty. Companies that were thriving are seeing a sudden and significant decline in their overall revenue, while businesses operating with thin margins are fearful of having to shut the doors permanently. Unfortunately, this is completely out of our control, and is the landscape we’re facing. I am devastated for those companies that have been forced to close due to new government stipulations imposed to stop the spread of the virus. Based on my observations to date, it seems that of businesses that remain open, few are actually addressing the situation in a thoughtful and logical manner. I’ve heard countless stories of small companies immediately laying off their entire staff, or a large majority of it. Others that … READ MORE »

Improve Internet Security With These Easy Tips

With over three billion internet users around the globe totaling roughly 40% of the population, the internet is rife with opportunities for hackers to steal users’ information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon. It therefore pays to take extra precautions when surfing the web. We’ve compiled these three easy tips that can amp up your online security. Tip #1: Use HTTPS Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security for its users. This layer encrypts data exchanged between a user’s browser and the web server that delivers the data that the user requests. To use a simpler comparison, imagine someone tapping your landline, but instead of getting to listen in on your conversations, they’ll hear people speaking in tongues instead. … READ MORE »

3 Ways to Browse the Web Safely at Work

Amidst the current climate of malware, hacks, and phishing scams, companies must take precautions when accessing the internet. Without safeguards, browsers that you or your employees use are vulnerable to cyberattacks that may cripple productivity and profit. Here are steps that your company should take to browse the net safely. Prevent browser tracking If you don’t like the idea of a third party (reputable or otherwise) being able to track your browsing habits, enable private browsing using built-in tools in your internet browser such as Chrome’s incognito mode. This offers protection against tracking by blocking third-party cookies as well as malware. Some browser extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter and Facebook. Block adverts While online ads may seem harmless, the truth is they … READ MORE »

Defend Against this New Office 365 Threat

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted towards users of Microsoft Office 365. You don’t want to be the next victim, so read up. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page. How does it work? The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page … READ MORE »

Why Analytics Are Important to Data Backups

Data is vital to your business. It’s how you keep records, track activities, and function as a business in general. However, with all of the data that your business generates on a regular basis, it can be difficult to keep everything backed up at all times. Fortunately, there is a way to better prioritize your data backups. Too much data may sound like a good thing, but depending on your organization, backing up everything à la minute may be out of your price range or just flat out impossible with the amount of information that you create. The problem then becomes: How do I structure my backup plan to prioritize the critical files? We believe the answer is analytics. In order to avoid backing up unneeded data, you’ll require a “smarter” backup solution. This is where an experienced MSP (managed … READ MORE »

Don’t Let Hackers Fool You with These Tricks

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing This is the most frequently used social engineering attack, especially against small businesses. Check out these frightening statistics: Kaspersky Labs revealed that its anti-phishing system prevented more than 107 million attempts to connect users to malicious websites in just one quarter of 2018. Barkly added that 85% of companies have fallen prey to this nefarious scheme. And PhishMe reports that the number of these scams is growing by at least 65% per year. How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal … READ MORE »

9 Cybersecurity Terms You Need to Know

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or consulting your tech support. Malware For a long time, the phrase “computer virus” was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware. Ransomware Don’t let all the other words ending in “ware” confuse you; … READ MORE »

Social Engineering Exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide. What is it? Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case. Basically, the adware uses Facebook Messenger to track your browser activity and pushes you to click on malicious ads or give out personal information. How does it work? By clickjacking and hijacking credentials of Facebook users, the adware is able to send messages to people in the victim’s contact list. If you’re one of … READ MORE »

2017 IT Essential #1: A Disaster Recovery Plan

When disaster strikes, organizations need to put their business continuity plans into action and recover their IT systems as quickly as possible. Failing to do so can mean serious financial and reputational repercussions. Despite this, investments in disaster recovery are set aside each year for high-tech IT investments, and every year companies and employees continue to suffer for it. Here are some reasons why disaster recovery is well worth your time, effort, and resources in 2017. DR isn’t a huge investment A common misconception about disaster recovery is that it’s a large, bank-breaking investment. Expensive data centers, networks, and server maintenance usually come into mind when a business owner is confronted with the idea of business continuity. And while that may have been true in the past, establishing a strong disaster recovery plan today is as simple as having a secure, compliant cloud-based … READ MORE »

4 Predictions for Web Services in 2017

The crystal ball certainly won’t be making an appearance anytime soon, so it’s time to start preparing for the far more realistic technology trends of the coming year. Investing in the right technology could be the thing that sets you apart from your competitors in the coming year, and all it takes is a little research and education. Until someone invents a crystal ball, you’re stuck with our professional projections on the state of web services in 2017. #1 On-premises servers will survive another year Cloud adoption will most likely continue its stellar rise, but that doesn’t mean it will be hard to find affordable service for your in-house server or data center. Based on a recent survey of companies that utilize cloud services, nearly half will continue operating some sort of on-site data management in response to perceptions of … READ MORE »