Company Blog

Is Dropbox Secure? Is It Time To Drop Dropbox?

On May 4th, 2016, posted in: Security Threats by Comments Off on Is Dropbox Secure? Is It Time To Drop Dropbox?

Is Dropbox secure? We’ve previously covered the risk of Dropbox in the workplace. The risk is based upon which Dropbox plan you are utilizing. Due to rising data loss concerns and recent news of ransomware traveling via emailed Dropbox links, many Ontech customers are opting to prohibit Dropbox altogether in the workplace and move to OnCloud as..

read more

Build a Business Continuity Plan in Just 4 Steps

On May 4th, 2016, posted in: small-business-IT by Comments Off on Build a Business Continuity Plan in Just 4 Steps

Is your business continuity plan too complicated? Do you have a plan at all? First things first – what is business continuity and how is it different from disaster recovery? Often confused with disaster recovery, business continuity is a comprehensive approach involving strategic planning to ensure systems, processes and procedures remain functional in the event..

read more

Urgent: Badlock Vulnerability Discovered

On April 12th, 2016, posted in: Security Threats by Comments Off on Urgent: Badlock Vulnerability Discovered

There has been a critical security vulnerability discovered that affects all versions of Windows and Samba. Patches for this bug will be released TODAY, April 12th around 17:00 UTC or 12:00 p.m. Central Time. Security experts are calling this vulnerability Badlock.  Engineers at Microsoft and Samba are working together to get this problem fixed. At this..

read more

7 Network Security Solutions for Businesses: Where to Begin

On April 3rd, 2016, posted in: Security Threats by Comments Off on 7 Network Security Solutions for Businesses: Where to Begin

It’s difficult to ignore widespread media coverage of highly publicized cyber-attacks targeting large companies like Sony, Ashley Madison and even the US government. But it’s not only large organizations at risk; small and medium sized businesses are also vulnerable. In fact, recent statistics indicate more than 75% of companies are likely to become a target..

read more

The Risk of Browser Saved Passwords: It’s No Joke

On April 1st, 2016, posted in: Security Threats by Comments Off on The Risk of Browser Saved Passwords: It’s No Joke

It’s April Fool’s Day, but seriously, this is no joke. In fact, it’s an easy mistake to make and chances are high you’ve made this mistake within the past 30 days. Most of us have numerous passwords to keep track of on a regular basis for both business and personal life. While it may be..

read more

Don’t Be Fooled: These 5 Tech Habits Can Ruin Your Smartphone

On April 1st, 2016, posted in: Personal Tech Tips by Comments Off on Don’t Be Fooled: These 5 Tech Habits Can Ruin Your Smartphone

Smartphones are sophisticated devices we try to protect with shatterproof cases and screen protectors, but what about the inner workings of the smartphone? Most people don’t treat their phone as well as they should – sometimes simply because they don’t know any better. Here are 5 ways you might be ruining your smartphone without even..

read more

TeslaCrypt 3.0.1 Ransomware is Here – and It’s NASTY!

On March 31st, 2016, posted in: Security Threats, Virus Alert by Comments Off on TeslaCrypt 3.0.1 Ransomware is Here – and It’s NASTY!

According to Cisco security researches, all ransomware, (specifically TeslaCrypt 3.0.1 ransomware) has become the black plague of the internet. Over the last few years, we have covered Cryptolocker, CryptoWall 2.0, and CryptoWall 4.0 on our blog – and unfortunately, this ransomware is the most advanced yet. How TeslaCrypt 3.0.1 Spreads TeslaCrypt 3.0.1 is a nasty new..

read more

The Top 5 Cyber Security Threats Facing Businesses in 2016

On March 10th, 2016, posted in: Security Threats by Comments Off on The Top 5 Cyber Security Threats Facing Businesses in 2016

It’s hard to believe that just a few years ago, cyber security was low on the list of priorities for businesses. Today, now that many businesses are integrating remote data storage, mobile device management (MDM) and offsite data processing into their business, they’re giving cyber security a second look. In 2016, the number of businesses..

read more

7 Easy Ways to Keep Your Computer and Tech Safe in 2016

On March 2nd, 2016, posted in: Security Threats by Comments Off on 7 Easy Ways to Keep Your Computer and Tech Safe in 2016

You know the basics of computer security. Use strong passwords, keep your anti-virus up to date, do your online banking at home. But does that mean you’ve got all your bases covered? In this day and age? Not likely. So what can you do to keep your computer and mobile devices safe? Follow these simple..

read more

5 Cyber Security Basics Every Business Needs to Know

On March 2nd, 2016, posted in: Security Threats by Comments Off on 5 Cyber Security Basics Every Business Needs to Know

In 2016, cyber security is topping the list of priorities for many businesses. Larger businesses in particular are increasing their IT budgets to tighten up network security and maintain compliance. But according to the National Small Business Cyber Security Study, most small businesses aren’t doing enough to protect their businesses from cyber security threats. These..

read more