Devious Tricks That Cybercriminals Use to Scam Businesses
Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but...
5 Problems That You Can Solve With Effective Document Management
Some people will tell you that there is only one constant in this world: change. Men and women in business, on the other hand, will tell...
Help! Why Did My Email Bounce Back?
If you send email regularly, you likely have received them — those notifications saying that the email you just sent was undeliverable....
What You Need to Know about SQL Server 2005's End of Support
Microsoft's support for SQL Server 2005 ended on April 12, 2016. This is not unexpected, as this software is more than a decade old. If...
5 Signs That You Might Be Outgrowing Your IT Infrastructure
As your company grows, your IT needs evolve. Your IT infrastructure must keep up with these changes. Updating the infrastructure often...
DocuSign Phishing Scam Targets Law Firms
This morning, I received an email from a client requesting that I review an email they received to confirm its legitimacy. The email came...
How to Spot Phishing Attacks
One of the main tools in a hacker's toolbox is the phishing attack. Hackers use these large-scale attacks to steal personal information...
6 Reasons to Use Remote Monitoring to Keep an Eye on Your Systems
Many IT service providers, including Electro-America, use remote monitoring tools, also known as "managed services," to gather...
Ransomware and the Case of the Hollywood Presbyterian Hospital
Ransomware- To pay or not to pay..... NOT- The answer is NOT to pay, or better yet, not to HAVE to pay. Allow me to explain. By now,...
Another Prevalent Scam- "Microsoft"
You're casually browsing the internet when all of a sudden a pop up appears on your screen saying something along the lines of "Microsoft...