<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

Windows 7 Reached End of Life - What Now?

On January 14, 2020, Microsoft Windows 7 reached end of life.  What does this mean?  Microsoft is no longer providing technical support, software patches, or security updates for Windows 7.  If your firm is still running on Windows 7, you are probably questioning – what do I do now?  Windows 7 will still work, however, it is strongly recommended to update your systems to the latest software, such as Windows 10, as soon as possible.  

Topics: Microsoft Windows Cybersecurity Boxtop

2019 Year in Review

2019 was yet another successful year of innovation and development here at Tabush Group.  We launched a new service, continue to innovate Boxtop, and also provided meaningful industry insights.  As we kick off 2020, we reflect on 2 topics that were the most popular and compelling to you.

Topics: Cloud IT Insights Cybersecurity Boxtop Cloud for Business

5 Ways to Prevent a Phishing Attack

The vast majority of data breaches today are phishing attacks, occurring when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims.  In our last blog post, It’s Only Getting Worse, we describe both phishing and spear phishing tactics and why it is imperative for businesses to take precautions to protect themselves. 

Topics: Cybersecurity IT Best Practices Phishing

It's Only Getting Worse

Recently, a company called me to discuss concerns about their IT security.  This company, based in the US but doing business with clients and vendors in many parts of the world, has been inundated with phishing emails.  The difference here is that these phishing emails are not just generic ones that pretend to be Microsoft Office 365 or UPS trying to steal passwords, but rather, they are spear phishing.  Spear phishing involves impersonating actual people associated with the company, like executives or vendors, in attempts to steal money or proprietary information.  These schemes are becoming more and more common.

Topics: IT Services Cybersecurity Phishing

The Rising Popularity of Office 365 Among Cybercriminals

Microsoft Office 365 is growing in popularity as one of the most professional and functional cloud software suites available.  Microsoft estimates it is now being used by 1 in 5 business users, putting this cloud-based service on the radar of cybercriminals.  The greatest popularity of Office 365 resides in the financial and professional services and manufacturing sectors, which are rich with potential plunder for these criminals.

Topics: Cybersecurity Cyber Attacks Office 365

Top 5 Reasons CPA Firms are Moving Their Desktops to the Cloud

Today's world is interconnected and professionals often have a need to never be far from their clients.  This is especially true for CPAs who require constant access to their work, especially during tax season, to best serve their clients. With this increased need for accessibility comes greater security concerns.  One solution that has emerged for CPA firms to address these, and other needs, is cloud. Our cloud solution, Boxtop, eliminates the need for IT infrastructure by utilizing cloud as a virtual desktop.
Topics: Cybersecurity Boxtop Cloud for Accounting

This Can Happen to You, Too. Are You Ready?

Last week it was revealed that Arizona Beverages, a large beverage supplier in the US, experienced a massive ransomware attack in March.  Weeks later, the company is still struggling to recover from this attack.

Topics: Cybersecurity Cyber Attacks

Beware of this Security Vulnerability

Most cloud providers have a huge vulnerability and it's up to businesses to close this big security gap. Sound scary? It is.  But it does not have to be.

Topics: Cybersecurity Phishing