<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

5 Ways to Ensure Your Firm's Data is Secure

There is an increase in the frequency and efficacy of data breaches that can bring a firm’s operations to a standstill. Data breaches are often the result of vulnerable hardware and software where security measures may be weak or out of date, presenting an opportunity to hackers and ransomware. Far too often, businesses do not realize they are victims of breaches for days or even weeks, and by then, there is often nothing that can be done to repair the damage.

Topics: Cybersecurity IT Security Encryption Email Best Practices

Security Update: Office 365 Phishing Attempts

We recently sent a message to our clients warning them of an increase in phishing activity. We find it to be so rampant that we wanted to make this information available to the public as well.  For help with your business IT and security contact Tabush Group.

Over the past few weeks, we noticed an uptick in ‘phishing’ emails, which appear to be from Microsoft Office 365 or other popular cloud service providers, trying to get recipients to provide their log in credentials or other sensitive information. While we employ many layers of defense from top vendors for email filtering and content security for our clients, the bad guys are hard at work trying to beat the security systems; and sometimes, these things get through.

We want to provide you scenarios that you and your colleagues should be mindful of. Always be suspicious of anything that appears out of the ordinary, including:

Topics: IT Security Phishing Email Best Practices Microsoft Office Office 365

3 Ways to Tame Your Email

In his 2002 song “Darkness,” Peter Gabriel states “I have my fears / But they do not have me.” Email is the best and worst thing to happen to business in the last 25 years. Best because it’s simple, fast, free, and accessible instantly from just about anywhere on the planet. Alternatively, because it is so simple, fast, and free, it’s also become so overly abused, which is why it’s also the worst (let’s all remember that for hundreds of years before 1996, businesses ran just fine without email).

For too long, email controlled my life – with dozens of folders overflowing with messages, dings and buzzes interrupting just about everything I did, and lengthy threads involving too many recipients and replies. While Outlook was not my employer (as far as I knew, I had never received a paycheck from Microsoft), it was the focus of most of my days in the office, and when I was out of the office, whichever PDA/smartphone I was carrying that year would fill in until the next morning.

My email had me, I did not have email.

Topics: Productivity Small Business Email Best Practices

How to Protect You and Your Business from the Latest Wave of Email Scams

Phishing emails (emails which appear to be from a legitimate sender, asking for personal or financial information) have been around for many years. However, in the last few months we’ve seen a big rise in spear phishing (scam email specifically targeting a company or person) and ransomware (viruses which encrypt files on your computer and network, and demand a ransom payment to have the files unlocked). These threats are very real for anyone using email.

Topics: Small Business IT Best Practices Email Best Practices Computer Viruses and Malware Protection