Over the last few years, there has been a meteoric rise in cybercrime, with nothing to indicate that rates will decrease anytime soon. Why would they? Bad actors and cybercriminals can make a pretty penny by attacking businesses, and they are only becoming more equipped and experienced in doing so.
Attention: You Aren’t Safe Listen up: if you are still using Windows 7–or much worse yet, Windows Server 2008 R2– and these machines are connected to a network that is connected to the Internet, that network is in jeopardy. Microsoft has retired support for both operating systems and will no longer provide crucial security updates and bug fixes making them vulnerable to cyberattacks. What Moves Should You Make? You need to do what you can to upgrade away from Windows 7 or Windows Server 2008 R2. What If You Can’t Upgrade? If your company depends on legacy titles that are only compatible with these systems, there are things you can do to protect your network. They include: Make sure firewall and antivirus are up to date – There are still risks when you keep systems running these OSs connected to your network, but by upgrading firewall and antivirus you’ll have a better chance at keeping unwanted entities off of these systems. Update other software – Along with security solutions, you’ll want to make sure other pieces of software you run on the platform are updated. For example, Google Chrome has stated it will support Chrome on Windows 7 until July 2021. Take resources offline – If your Windows 7 or Windows Server 2008 R2 systems are taken offline, they are effectively quarantined away from the rest of your computing resources. What Are Your Options Going Forward? You will need to upgrade. For Windows 7, you can upgrade to Windows 10 or you can look to the cloud. There are options offered, such as the Windows 365 bundle, that delivers Windows 10 Pro, customizable security, and Microsoft Office 365 for a monthly fee per user. Regardless of what you choose, you need to get crucial business computing systems off of Windows 7. For Windows Server 2008 R2, you’ll need to upgrade to a supported version of Windows Server. Knowing that this can come with massive upfront costs, Microsoft also provides migration solutions though their Azure cloud services. If you are still using unsupported Microsoft operating systems, you need to start planning your upgrade today! Call the IT experts at GeekboxIT to get started moving your business’ critical computing resources away from vulnerabilities by giving us a call at (336) 790-1000.
Malware is a bad thing. It’s right there in the name, as the prefix mal– comes from the Latin malus, which literally translates to “bad.” So it only makes sense to try to keep it out of your business. Let’s discuss a few basics to form the foundation of your greater cybersecurity strategy.
It won’t be long before Microsoft retires two of its most popular operating systems – but hopefully, you already knew that. Microsoft has made a point of reminding Windows 7 users that they need to upgrade before January 14 – and yet, many users haven’t done so.
Wait! If you haven’t read part one of our Facebook privacy blog yet, you may want to do that before reading this one. If you’re ready, we’ll be taking an in-depth look at your Facebook settings to make sure that your account and its data are as secure as possible. If we’re being honest, protecting this kind of data hasn’t seemed to be one of the platform’s strong suits – and user privacy has been the star of many lists of concern.
Two billion users strong, Facebook is one of the Internet’s most popular websites… which has frequently put the tech giant in the spotlight when it comes to how secure the data you’ve entrusted to them (in addition to what they’ve collected) really is. Today, we’ll discuss how you can access the information Facebook has on you.
Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.
We go into great depth on how to protect your desktop and laptop computers from malware and other malicious threats. In fact, one of the first steps you take anytime you are setting up a new computer is to install antivirus and other security programs. You do this because an unprotected device presents substantial risk. With the way people are using their smartphones today, it’s a solid practice to outfit your mobile device with the security software needed to maintain the security of your data.
Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.
A lot of computing is done today using cloud computing – basically, making use of the computing power, space, and applications that a provider has on their infrastructure as if they were your own. Doing so can provide a very specific benefit to your security, but, have you ever wondered how the cloud itself is protected?