<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

Sitting Ducks: What You Can Do to Protect Yourself from the Next Cyberattack

Not long ago I read, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” an eye-opening article on Wired about a massive cyberattack that happened roughly a year ago in 2017. If you have 15 minutes, I highly recommend reading it. If you don't, then allow me to summarize: In 2017, NotPetya malware infected large companies such as Merck, Maersk, and others (companies with huge IT teams and thousands of employees), and literally brought their entire operations to a grinding halt for days, if not weeks, costing them upwards of $300 million in damages per company.

Topics: Cyber Attacks Cybersecurity Boxtop IT Best Practices

10 Simple Ways to Protect Your Business from a Cyber Attack

Small businesses, especially law and accounting firms that deal with sensitive data and financial transactions need to be concerned about cybersecurity. Cyber attacks are becoming more sophisticated and more rampant every day. Luckily, there are some very important – and often inexpensive – things every organization can do to protect themselves.

Topics: Cyber Attacks Cybersecurity IT Best Practices

Top 5 Lies in IT Services

The IT business is loosely defined. If you surveyed 100 IT companies, you would learn just as many different ways of doing things. Every company needs the right IT resources for their business and making the right matches can be a challenge.

Topics: IT IT Services IT Best Practices

How to Protect You and Your Business from the Latest Wave of Email Scams

Phishing emails (emails which appear to be from a legitimate sender, asking for personal or financial information) have been around for many years. However, in the last few months we’ve seen a big rise in spear phishing (scam email specifically targeting a company or person) and ransomware (viruses which encrypt files on your computer and network, and demand a ransom payment to have the files unlocked). These threats are very real for anyone using email.

Topics: Small Business IT Best Practices Email Best Practices Computer Viruses and Malware Protection

Safe Internet Browsing - Best Practices

The Internet is a dangerous place. Unfortunately, due to the lack of central control and ownership, and the fact that the Internet is accessible from anywhere in the world, including many countries without proper law enforcement, there are many fraudulent traps out there looking to steal people’s personal information and money.

While having proper antivirus and anti-malware software is important, it’s also important to always follow safe browsing practices to ensure your data stays private.

Topics: IT Best Practices Internet Browsing Computer Viruses and Malware Protection