On September 26, 2017 at the Microsoft Ignite in Orlando, FL, Microsoft announced the next perpetual release of Office is scheduled for the second half of 2018. According to the Microsoft site, “Office 2019 will add new user and IT capabilities for customers who aren’t yet ready for the cloud. For example, new and improved inking features—like pressure sensitivity, tilt effects, and ink replay—will allow you to work more naturally. New formulas and charts will make data analysis for Excel more powerful. Visual animation features—like Morph and Zoom—will add polish toRead more
A free software download, CCleaner, used for personal computers and Android phones for removing junk programs and cookies has been compromised by Hackers.
According to MSN News, “A version of CCleaner downloaded in August included remote administration tools that tried to connect to several unregistered web pages, presumably to download additional unauthorized programs, security researchers at Cisco’s Talos unit said.”
The full article can be found here.
If you have installed this software and have questions about uninstalling, updating or blocking from download (if your systems can), please email firstname.lastname@example.org and we will provide guidance.Read more
As a longtime Microsoft partner, we’re deeply invested in the Microsoft platform and recommend, implement and support all that is Microsoft including the wildly popular Office 365 platform. During this past July at Microsoft Inspire, the annual partner conference, Microsoft CEO Satya Nadella introduced Microsoft 365 which includes Office 365, Windows 10 and Enterprise Mobility + Security (watch Satya Nadella announce Microsoft 365). So what does this mean for our SMB customers?
Basically, Microsoft is rolling our Microsoft 365 Enterprise and Microsoft 365 Business to “help companies empower their employees, unlockingRead more
Businesses need a next-gen email security solution that offers comprehensive threat prevention capabilities. A multilayered approach to email security ensures protection for business communications.
Cyber threats are evolving rapidly from mass spam attacks to advanced forms of targeted attacks and we want to make sure you’re protected with a next-gen email security solution.
Read this Solution Brief to learn about:
- The increased importance of next-gen email security
- The critical capabilities that your next-gen email security solution should include
- How SonicWall’s next-gen email security solutions will protect your business
Don’t let these type of attacks hold your data hostage.
In this free guide, you’ll learn how ransomware works and the tactics cyber criminals use to infiltrate your organization. You’ll also get advice on how to safeguard your company against the latest ransomware attacks.
Get this ebook: How ransomware can hold your business hostage and learn about:
Various types of ransomware attacks and how they’re delivered
How to detect vulnerable areas in your IT environment
Ways to block threats, such as phishing emails and malicious advertising
Steps to protect against hidden malware in encrypted traffic
We recommendRead more
Get your copy of this brief to discover the top five ways your firewall sandbox can fail. Plus, learn how your business can stay ahead of advanced persistent threats (APTs) and prevent cyber criminals, hackers and malware from invading your network.
Find details on how you can:
Stop emerging attacks at the gateway
Block evolving, polymorphic and dynamic zero-day threats
Remain one step ahead of APTs and prevent network intrusions
Lower costs and complexity with an effective multi-layer sandboxing solution
We recommend SonicWall Capture ATP (Advanced Threat Protection) service to protect your organization. Watch a liveRead more
2016 was a highly active attack year. Ransomware alone increased by well over 100%, showing that cyber criminals remain aggressive on all fronts.
- Ransomware was the payload of choice for spam campaigns and exploit kits
- Internet of Things devices were compromised on a massive scale
- The fall of dominant exploit kits left a void for smaller exploit kits
- Android remained a popular and risk-prone target
Last week we saw another sneaky phishing scam making the rounds, but this time involving PDFs (which are usually considered “safe” file formats). Basically, users receive an email with a PDF attachment named nm.pdf.
The following screen shots are EXAMPLES of the phishing scam – DO NOT OPEN, ACCEPT OR ENABLE ANY WARNINGS IN DOCUMENTS.
Upon opening the PDF, users are prompted to open a macro-enabled Word document.
Once the Word document has been opened, users are asked to click “enable editing.”
Then another screen prompts users to “enable content.”
After clicking the prompts, the
I think it’s safe to say we are all familiar with ransomware, but even if you have been out of the loop for a bit, here’s a quick refresher. Ransomware gains access to your PC and encrypts files through:
phishing emails which contain malicious attachments that begin running a script on download or open
when a user visits an infected website and a download or install is activated
though social media applications or file sharing applications
Long story short, it makes sense to trust your intuition and never accept, click, download, etc. anything thatRead more
In today’s digital world, security prevention against cyber-attacks is a conversation we have regularly with our SMB customers. While securing and protecting the network from obvious vulnerabilities is an excellent starting point, we also discuss and recommend end user education as another potential foothold cyber criminals aim to exploit. Our friends at SonicWALL have written an article that explains how to identify and protect against cyber-attacks.
Cyber-attack Strategy #1 – Bombard networks with malware around the clock
Many next-generation firewall (NGFW) vendors offer some form of network-based anti-malware technology as part of a multi-layered securityRead more