>





From a Mobile Device
Scan QR code or click

The Dark Web


Posted on 3/7/2018




You've heard it on TV. The Dark Web. A place where Hackers already have your password and it is for sale, right along side your stolen ID. But what is the Dark Web? Is it a separate Internet? An underground website? A group of Hacker servers?



Well...

READ MORE

You get what you pay for - The Value of a trusted business relationship


Posted on 02/28/2018




One of the best, most succinct marketing ads I ever saw said simply:

"We Fix $10 Haircuts"




We all know that old adage "you get what you pay for", yet we still yearn for the "deal" - a special discount that tells us that we "beat the system". However, far too often that "deal" is just the sharp end of the hook, and the system ends up beating us.

As Red Adair, the famous oil well fire fighter, once said "If you think it's expensive to hire a professional to do the job, wait until you hire an amateur". Basically, we should pay well to do something once, or pay twice to fix it when it all goes south.

READ MORE

Ransomeware Horror Story

Posted on 12/1/2017




A True Ransomware Horror Story (and the Crucial Lessons Learned).

Original article by Rebecca Dobrzynski Oct 2016
Prologue

Not so many years ago, there were rumors of frightening things beyond the (fire)wall who could inflict terror and destruction upon any organization, even holding our electronic property for ransom. There were whispers that these attackers were the worst anyone had yet encountered, that we were defenseless, and soon, we learned the name of the feared monster: CryptoLocker.

At the time when even a local police department gave up trying to recover its files and just paid the ransom, I was overseeing operations for a 70-person organization that had six locations. “Operations” was shorthand for “wears many hats of disparate styles” — my duties ranged from writing to supervising administrative staff to, yes, maintaining the organization’s technology infrastructure.

This was not cutting-edge stuff. Most of the demand for technology support was around supplying equipment to new hires, troubleshooting printer errors, and scrubbing PUPs and other junk from computers a handful of times a month using free software tools. Easily something that any reasonably tech-savvy millennial could handle with the help of persistence and IT forums on the internet. Most of the time.

When I took the reins from my predecessor, she assured me I needed no IT expertise, despite a dubious relationship with our primary IT consultant and a casual comment about never having utilized the “other guys we have a contract with.”

"It’s mostly just making sure not everything falls apart at the same time,” she assured me.


Part I: The Attack

I started getting phone calls and people in my office. They couldn’t open some of the files they used daily that resided on the in-house server. It took no time at all to notice that there was something very wrong.

READ MORE

Click here for Free Assessment


For more more information, contact:

Pete Groman, President
Namorgy Network Solutions - GeekByTheWeek[TM]
pete@namorgy.com
972-454-0029
#NNSIT #ISpeakGeekDOTBIZ #GeekByTheWeek[TM]

Make Cybersecurity A Priority in a Small Business Early Stages


Posted on 11/12/2017




Make Cybersecurity A Priority in a Small Business Early Stages.html.


Article By David Kiger @ Business 2 Community

New small business owners have a long list of hurdles to overcome in the early stages. These can be complicated times, so avoiding a cybersecurity mess wouldn’t necessarily rank at the top of the priority list. But the dangers can be substantial.

A poll conducted by CNBC and SurveyMonkey shows that just 2 percent of small business owners surveyed reported that “they view the threat of a cyberattack as the most critical issue they face.” “That, in some ways, makes sense,” writes Chris Morris for CNBC. “Taxes and the cost of employee health care were two of the highest-ranking items and certainly are more front of mind on a day-to-day basis. But online security experts say that very lack of focus makes small businesses a lot more vulnerable.”

Hackers are on the attack, according to Morris, who writes that they have “breached half of the 28 million small businesses in the United States, according to the 2016 State of SMB Cybersecurity Report.”

And cybersecurity firm Datto estimates that the combination of costs, unreported incidents and time/productivity lost because of cyberattacks add up to $75 billion a year, in a story by The Atlantic.

What can small business owners do? For starters, make sure that cybersecurity is a priority. Ensure that the operating systems and software are updated on a consistent and frequent basis, and that the business has up-to-date anti-virus and anti-malware software. As Adam Fridman advises for Inc.com, “Don’t opt for a free version because these aren’t updated often enough.”

Here’s a look at some other cybersecurity tips for small businesses.



READ MORE

Click here for Free Assessment

For more more information, contact:

Pete Groman
Client Engagement Manager
CMIT Solutions Fort Worth
pete@namorgy.com
817-332-2648 opt 2
https://cmitfortworth.com
#CyberSecurity #CMITFortWorth #ISpeakGeekDOTBIZ #cmitfortworthdt @cmitfortworthdt

Enhance Your MS Excel Skills


Posted on 11/7/2017




Enhance Your Microsoft Excel Skills with These Supercharged Strategies.


When it comes to working with important data, no software dominates the business landscape like Microsoft Excel. Depending on your level of Excel expertise, however, you may dread that complicated spreadsheet with its confusing columns, rows, formulas, and tabs. Unless you look at Excel for its possibilities instead of its pitfalls — any manual task can be automated, any data set can be dominated, and any goal can be achieved.

At CMIT Solutions, we know how important Excel is to your day-to-day operations. So we’ve collected ten of our favorite tips and tricks to help make Excel work smarter, faster, and better for you. (Note: some functions work slightly differently in different versions of Excel.)

READ MORE

Click here for Free Assessment

For more more information, contact:

Pete Groman
Client Engagement Manager
CMIT Solutions Fort Worth
pete@namorgy.com
817-332-2648 opt 2
https://cmitfortworth.com
#CyberSecurity #CMITFortWorth #ISpeakGeekDOTBIZ #cmitfortworthdt @cmitfortworthdt

Bad Rabbit: The new worldwide ransomware outbreak


Posted on 11/7/2017




By George Cox, P.C. Periodicals

While all ransomware is bad, Bad Rabbit represents a new strain of ransomware.


I have had several different security alerts recently about a new ransomware attack called Bad Rabbit. The outbreak was first reported in Russia and the Ukraine and a few hours after the original outbreak, it hit Europe and the United States.

While all ransomware is bad, Bad Rabbit represents a new strain of ransomware. The Department of Homeland Security’s Computer Emergency Readiness Team issued an alert saying it had received “multiple reports” of infections. Russia’s Interfax news agency reported on Twitter that the outbreak shut down some of its servers, forcing Interfax to rely on its Facebook account to deliver news.

The outbreak appears to have started via files on a hacked Russian media website, using the popular social engineering trick of pretending to be an Adobe Flash installer. The ransomware demands a payment of about $275 from its victim, though it is not clear whether paying the ransom unlocks a computer’s files. You have just 40 hours to pay.

Bad Rabbit shares some of the same code as the Petya virus that caused major disruptions to global corporations in June, according to a researcher with the antivirus vendor Symantec Corp.

READ MORE

Click here for Free Assessment

For more more information, contact:

Pete Groman
Client Engagement Manager
CMIT Solutions Fort Worth
pete@namorgy.com
817-332-2648 opt 2
https://cmitfortworth.com
#CyberSecurity #CMITFortWorth #ISpeakGeekDOTBIZ #cmitfortworthdt @cmitfortworthdt

The Threat Is Real


Posted on 10/30/2017




The Threat Is Real


The Threat is Real from CMIT Solutions on Vimeo.



Click here for Free Assessment

For more more information, contact:

Pete Groman
Client Engagement Manager
CMIT Solutions Fort Worth
pete@namorgy.com
817-332-2648 opt 2
https://cmitfortworth.com
#CyberSecurity #CMITFortWorth #ISpeakGeekDOTBIZ #cmitfortworthdt @cmitfortworthdt

OUTSOURCE IT


Posted on 10/23/2017




Many business and entrepenuers look to Forbes when making business decisions. Making the decision to outsource key areas of your business is not something undertaken lightly, but can be a major contributing factor to success. Michael Evans of Forbes said it best:



"A 2014 Brookings Institution report concluded that business dynamism (the number of new U.S. businesses formed versus the number closed) has slowed dramatically over the last few decades, despite the record amount of money held by venture capital and banks for investments and loans to emerging growth business.

There are many reasons for this, but clearly one of the significant issues is cost: the money and time needed to set up a new business, including regulatory and compliance costs, labor, infrastructure, and more.

Depending on the type of business (manufacturing, services, or retail), these costs can amount to hundreds of thousands and even millions of dollars just to start a new business.

But there is a better way."


- Michael Evans, Forbes.com


And to paraphrase Michale Evans further:

Virtually every internal business function can be outsourced to a firm that will provide the service to your company, in many instances at a lower cost and higher quality than you could replicate yourself.

Every business uses outsourced services. Many businesses don’t deliver products directly to the customer or do their own audits or taxes, or self-insure the business. They outsource those functions that are not strategic but which must be performed to manage the business operations.

Technology, for example, is a key area to outsource:

Computer hardware, computer software, printers, cell phones, PDAs, website development and maintenance, high-speed Internet access, servers, security measures, IT consulting, etc. all come at a cost that is a significatnt portion of both of a company's startup and maintenance budget.

Key advantages of outsourcing IT include:

READ MORE.

Click here for Free Assessment


What You Need to Know about HIPAA Compliance and Email Security


Posted on 10/23/2017




What You Need to Know about HIPAA Compliance and Email Security.


by AppRiver Guest Blog in Talkin Cloud Blog

Compliance with the Health Insurance Portability and Accountability Act--or HIPAA--often keeps healthcare professionals up at night. Indeed, there is a great deal of misunderstanding and confusion on the topic.

HIPAA requires healthcare organizations to comply with specific security, privacy and breach notification rules for the storage and transmission of protected health information (PHI), including electronic data. Healthcare professionals should have a solid knowledge of HIPAA requirements. But healthcare providers who establish their own smaller practices need to understand the regulatory framework. This is important when it comes to transmitting sensitive information via email.

READ MORE.

Click here for Free Assessment


ARCHIVES:

Older Posts.
Our Sponsor

Namorgy Network Solutions is dedicated to providing cost-effective IT Managed Services to small and midsize businesses that want to improve their productivity. With our comprehensive approach to Managed Services, we are your single source for all things IT, fully committed to customer service excellence. Our fast and friendly team of experts is always thinking ahead to deliver the best service possible.



Pete Groman, President
Namorgy Network Solutions - GeekByTheWeek[TM]
pete@namorgy.com
972-454-0029
#NNSIT #ISpeakGeekDOTBIZ #GeekByTheWeek[TM]
CHAT
Have questions? Feel free to click the BLUE CHAT BUTTON at the bottom right during business hours. Or the "Contact us" button after hours. Thanks!
ADVERTISEMENT