<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

Security Update: Office 365 Phishing Attempts

We recently sent a message to our clients warning them of an increase in phishing activity. We find it to be so rampant that we wanted to make this information available to the public as well.  For help with your business IT and security contact Tabush Group.

Over the past few weeks, we noticed an uptick in ‘phishing’ emails, which appear to be from Microsoft Office 365 or other popular cloud service providers, trying to get recipients to provide their log in credentials or other sensitive information. While we employ many layers of defense from top vendors for email filtering and content security for our clients, the bad guys are hard at work trying to beat the security systems; and sometimes, these things get through.

We want to provide you scenarios that you and your colleagues should be mindful of. Always be suspicious of anything that appears out of the ordinary, including:

Topics: IT Security Microsoft Office Email Best Practices Office 365 Phishing

Cyber Security Awareness Month

Did you know that October is National Cyber Security Awareness Month?

It's a great annual reminder for you to take a look at what you and your company are doing to protect your business and systems from potential cyber attacks that could cripple your operations and cost you thousands of dollars in lost revenue.

Topics: IT Security Cybersecurity Cyber Attacks

Cybersecurity Concerns for Small Businesses


Cyberattack = an attempt by hackers to
damage or destroy a computer network or system


Due to several highly publicized data breaches at well-known large brands, cybersecurity has been a hot topic in both tech and main stream media recently. Just because the topic of data protection is currently at the forefront of news reports, it’s important to be aware that it’s in fact always a relevant and important topic. Additionally, it’s just as important for small and midsize businesses (SMBs) as it is for large corporations. A lack of security in your IT infrastructure can lead to an interruption in the ability of your team and business to function.The New York Times recently profiled several small businesses whose operations were put in jeopardy because of cyberattacks.

Topics: IT Security Small Business Computer Viruses and Malware Protection Cybersecurity

IT Security: Always Relevant, Always Necessary

Your company’s IT system and its performance is at the forefront of your business and the security of your information is of the utmost importance. Whether it is perceived to be relevant to your firm or not, it is important to realize that any organization’s protection is salient.

There are many perceptions, programs and headlines that buzz within the technology industry. Lately, many of those have revolved around one thing: The security of your information and the privacy that it should have.

Topics: IT Security

Technology Progresses, Security Gets Worse

Technology has been progressing at an amazing rate, especially over the past 20 years. Think back to 1994 and you probably couldn't imagine the Smartphone, DVR, Netflix, Wifi, GPS, or Facebook. Despite these amazing innovations, we seem to be going backwards when it comes to digital security. Viruses, malware, spam, and hacking are much bigger problems than ever before, and it seems to be getting worse. How could this be???

A few months ago I wrote about the Target credit card breach, asking how it could happen. In the past few years it’s also happened to Marshalls/TJ Maxx, the California DMV, Michael’s, PF Chang’s, Neiman Marcus, Sally Beauty, and I'm sure many others that didn’t make the headlines. Then there are the thousands of personal PC's containing years of family photos and videos which may have been maliciously destroyed.

Topics: IT IT Security Technology Insights

The Target Hack: How could it happen?

Unless you've been living in a bubble without access to the news or Internet for the past 3 months, you've heard about the massive security breach that Target suffered. Hackers were able to get into Target's computer system and download over 110 million credit and debit card numbers. While we don't know who these 110 million lucky winners are, you can rest assured that if you weren't in that group, someone very close to you was.

Last week, more details on how the attack occurred were released. Apparently, Fazio Mechanical, a HVAC contractor who does work for Target, had someone hack into one of their PC's through a targeted phishing attempt. Fazio's systems were set up with certain access to Target's system to communicate work orders, invoices, etc. The hackers used that connection to access Target's database containing credit card numbers, and somehow downloaded it all from there. This is shameful at best.

Topics: IT Security IT Insights Breach

Memphis Data Breach Caused by Unsecure Emails

An employee of the Regional Medical Center in Memphis, Tennessee, sent out three unsecure emails that contained the private health information and Social Security numbers of approximately 1,200 patients. The medical center is notifying patients of the HIPAA breach.

Topics: IT Security

Simple Yet Effective Password Advice

Our team of IT security specialists stumbled upon this simple yet effective password security video. This short video talks about having strong passwords that are hard to guess but easy to remember.

Topics: IT Security Password Protection