Data-Tech Blog

How was I suppose to know it was a fake email!

I have a friend who is in the Real Estate business. Email communication is absolutely vital to their company to be successful. Their 3 offices have 8-10 realtor agents in each office who all log into the same email system, which also holds their data base of clients, prospects and contacts. One of the agents received what appeared to be a legitimate email from the VP of operations. The message rea... Read More »

Five Best Practices for Advanced Threat Protection

Five Best Practices for Advanced Threat Protection Discover must-have capabilities for an effective sandbox environment. Advanced threats such as zero-day exploits and custom malware are on the rise. Today, organizations of every size are targeted by cyber criminals who continually seek, find and exploit holes in vulnerable software. They do this to gain access to networks, systems and data, often... Read More »

How To Avoid An Email Phishing Scam

Another Phishing Scam To Be Aware Of Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passwords, credit card, or other account info). The perpetrators then use this p... Read More »

Resolving Quickbooks Errors

Is your client complaining of QuickBooks Errors? Is their QuickBooks File Healthy? Take these steps first. Is your client complaining of QuickBooks Errors?  Is their QuickBooks File Healthy?  Take these steps first. 1.- Go to the folder that contains the QuickBooks file. Check the size of the .QBW (QuickBooks Company File), this can be done by pressing F2 once in the file If the client is in Quick... Read More »

Eight steps for better cyber security

Businesses are being urged to take eight simple steps to reduce the risk of cyber attacks. The federal government has released what it says is a new global standard for cyber security, developed by the Australian Signals Directorate to help businesses mitigate risk. The “essential eight” strategies will help protect business from ransomware, malicious insiders, emails being compromised... Read More »

Page 1 of 94123»