<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

5 Ways to Prevent a Phishing Attack

The vast majority of data breaches today are phishing attacks, occurring when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims.  In our last blog post, It’s Only Getting Worse, we describe both phishing and spear phishing tactics and why it is imperative for businesses to take precautions to protect themselves. 

Topics: Cybersecurity IT Best Practices Phishing

It's Only Getting Worse

Recently, a company called me to discuss concerns about their IT security.  This company, based in the US but doing business with clients and vendors in many parts of the world, has been inundated with phishing emails.  The difference here is that these phishing emails are not just generic ones that pretend to be Microsoft Office 365 or UPS trying to steal passwords, but rather, they are spear phishing.  Spear phishing involves impersonating actual people associated with the company, like executives or vendors, in attempts to steal money or proprietary information.  These schemes are becoming more and more common.

Topics: IT Services Cybersecurity Phishing

The Rising Popularity of Office 365 Among Cybercriminals

Microsoft Office 365 is growing in popularity as one of the most professional and functional cloud software suites available.  Microsoft estimates it is now being used by 1 in 5 business users, putting this cloud-based service on the radar of cybercriminals.  The greatest popularity of Office 365 resides in the financial and professional services and manufacturing sectors, which are rich with potential plunder for these criminals.

Topics: Cybersecurity Cyber Attacks Office 365

Top 5 Reasons CPA Firms are Moving Their Desktops to the Cloud

Today's world is interconnected and professionals often have a need to never be far from their clients.  This is especially true for CPAs who require constant access to their work, especially during tax season, to best serve their clients. With this increased need for accessibility comes greater security concerns.  One solution that has emerged for CPA firms to address these, and other needs, is cloud. Our cloud solution, Boxtop, eliminates the need for IT infrastructure by utilizing cloud as a virtual desktop.
Topics: Cybersecurity Boxtop Cloud for Accounting

This Can Happen to You, Too. Are You Ready?

Last week it was revealed that Arizona Beverages, a large beverage supplier in the US, experienced a massive ransomware attack in March.  Weeks later, the company is still struggling to recover from this attack.

Topics: Cybersecurity Cyber Attacks

Beware of this Security Vulnerability

Most cloud providers have a huge vulnerability and it's up to businesses to close this big security gap. Sound scary? It is.  But it does not have to be.

Topics: Cybersecurity Phishing

Sitting Ducks: What You Can Do to Protect Yourself from the Next Cyberattack

Not long ago I read, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” an eye-opening article on Wired about a massive cyberattack that happened roughly a year ago in 2017. If you have 15 minutes, I highly recommend reading it. If you don't, then allow me to summarize: In 2017, NotPetya malware infected large companies such as Merck, Maersk, and others (companies with huge IT teams and thousands of employees), and literally brought their entire operations to a grinding halt for days, if not weeks, costing them upwards of $300 million in damages per company.

Topics: Cybersecurity IT Best Practices Boxtop Cyber Attacks

Your Law Firm is Evolving. So Should Your IT.

The business of owning and running a law firm constantly evolves, but has seen vast change, particularly over the last few years.

Topics: Data Backups Cybersecurity Law Firm IT Cloud for Business Cloud for Law Firms