Florida City Paid Big Bucks To Hackers Using Ransomware  

The city of Riviera Beach, Florida is the latest high-profile victim of a ransomware attack. Recently, the city council voted to pay more than $600,000 to a hacking group to regain access to data that had been locked and encrypted via ransomware nearly a month ago.  That is in addition to the $941,000 the city […]

Sudden Bluetooth Issues Could Be Due To Microsoft Update

Be advised, according to a recently published Microsoft support document, certain Bluetooth devices may experience pairing and connectivity issues after installing the latest Windows 10 update. The bulletin reads in part, as follows: “These security updates address a security vulnerability by intentionally preventing connections from Windows to unsecure Bluetooth devices.  Any device using well-known keys […]

Fusion Technology Solutions: Cloud Solutions to Accelerate Business Growth

We know that cyber attackers are also making use of cloud-based AI solutions to steal sensitive data. Be it using machine-learning algorithms or any other technologically-driven technique, attackers make use of every possible approach to exploit an organization’s data. Scenarios such as this are now propelling companies to leverage cloud-based security solutions and machine-learning algorithms […]

RSVP Site Evite Suffers Data Breach

The hacker who calls himself ‘Gnosticplayers’ has been busy and prolific.  Over the years, he’s sold more than one billion user accounts on the Dark Web.  His most recent product is more than ten million user records for the social planning and e-invitations service, Evite. ZDNet researchers first discovered the data for sale on the […]

How do I find and manage shadow IT and rogue devices, and put policies in place to ensure we remain secure?

Picture this: your sales team leader excitedly tells you about their new plan to use cloud apps and the latest devices to become more mobile and better reach clients. As the security advisor, your first thought is that more endpoints mean more risk for data security.

With the tools from Microsoft 365, you don’t have to stress anymore. You can analyze the risk of each app used, monitor for login attempts from suspicious devices, and protect sensitive data wherever it travels–all through Microsoft 365.

Don’t let security concerns stand in the way of progress. Give your IT team the tools they need to help the rest of your business thrive.

Defend, protect, secure. IT heroes in action.

The IT professionals in your office do far more than just help you reset your password or recover files from a crashed computer. From the first thing Monday morning onward, these heroes are hard at work protecting your organization.

IT is always at the ready to respond to threats when detected through tools like Windows Defender Advanced Threat Protection and Cloud App Security, all while laying the groundwork to avoid future attacks.

The security features in Microsoft 365 can help your IT heroes perform their jobs more effectively. Give them the help they deserve with tools that benefit your entire organization. Contact us to learn more.