N-Line Technologies takes a probing look at how Microsoft Office 365 addresses the cyber-security concerns of small business owners like Bryce McDonald, whose company, Day1 Wake, delivers wakesurf boards to customers across the country. Bryce knows that, wherever he goes, Office 365 multi-layer security is working 24/7 to safeguard the integrity of his business data. Contact us–we’d love to show you how Office 365 can do the same for businesses in Midland, Odessa, and the Permian Basin.
In this video, N-Line Technologies explores how Office 365 works overtime to safeguard the business data of entrepreneurs like Bryce McDonald, owner/operator of Day1 Wake, a company that makes wakesurf boards for customers around the world. While giving Bryce unprecedented freedom and flexibility, Office 365 provides multiple layers of security, which Microsoft monitors 24/7. Contact us to learn how Office 365 can do the same for you. 432-279-0671
We love this new short clip from Microsoft. It highlights the incredible amount of secure data storage each license of Microsoft Office 365 provides through OneDrive for Business. One Terabyte to be exact!
It’s not just the amount of data storage that matters, but also its safety. With Office 365, small businesses don’t need to worry about losing precious time, or information, because everything that you need most is backed up and secure.
Contact us today to find out how we can help you do the same!
If your hard drive is going bad, chances are strange things are happening and you’re a little panicked. It’s where you put your digital memories, your household files and maybe that thesis you’ve been working on for months. As far as you’re concerned, that hard drive IS the computer and failure is not an option. Perhaps it was overheated, knocked around or came from the factory with a flaw.
Sorry to say, but eventually all hard drives will fail. So how do you know if it’s definitely the drive and what should you do?
Start by watching for these signs:
Computer slowing down: Because most hard drives contain moving parts, the slower it gets, the slower your computer gets. It’s a bit like a record player, with spinning plates and a needle whipping from side to side. Your hard drive may eventually take longer to spin up and longer to retrieve files, which will have an impact on everything from booting up to playing games.
Blue screen of death: A classic Windows error, this is when your computer locks up to only show a blue screen with an error code, which while it does mean something specific has gone wrong, can always be translated loosely to ‘nope, not today’. The more often your computer does this, the more severe the problem is.
Not booting up: During the initial bootup stage, your computer is loading a program stored on the hard drive – it’s your operating system. If some of the files have a problem or can’t be found, Windows won’t boot. Errors vary, but the outcome is the same.
Corrupted files: Sometimes a file won’t open because the computer says it is corrupted. Some essential pieces of the file are missing, and unlike a book where a missing page is only inconvenient, it’s a deal breaker for computer files.
Noises: You’re familiar with the normal noises your computer makes, but as the hard drive fails the noises can change. You might hear clicking, grinding or even a sci-fi phaser noise. Noises will get louder or speed up during heavy file access.
Whenever something is clearly wrong, the key is to stop and turn your computer off. Continued use can result in more data loss. Even if you don’t have a backup yet, turn it off now because the large task of backing up can cause extra strain on an already delicate hard drive. It’s tempting to hurry and try to get a quick copy of your files, but in these cases, it’s not about time – it’s about the extra spinning, scratching, warping and electrical charge, all dissolving your precious data with each access.
Bring it to us and we’ll do all we can to retrieve your data. Call us at 432-279-0671 or click our handy Contact Form.
On June 27, 2017, the “Petya” ransomware strain began spreading widely impacting a large number of organizations, particularly in Europe.
Petya ransomware encrypts the master boot records of infected Windows computers, making affected machines unusable. Open-source reports indicate that the ransomware exploits vulnerabilities in Server Message Block (SMB). It has two layers of encryption: one that individually encrypts target files on the computer and another one that encrypts NTFS structures. This approach prevents victims’ computers from being booted up in a live OS environment and retrieving stored information or samples. Additionally, after the encryption process is complete, the ransomware has a specialized routine that forcefully crashes the computer to trigger a reboot that renders the computer unusable until a $300 ransom is paid.
N-Line Managed Antivirus protects you against this virus attack. For those of you not subscribed to our Antivirus product, you should update your Antivirus immediately and run Windows Update to make sure your system is fully patched and thus protected against the SMB fault that this virus exploits.
If you need assistance please contact us or call 432-279-0671
Working from anywhere is now as simple as accessing the internet on your device. Managers, owners, and employees are all embracing the flexibility of working while traveling, making it the new global norm. But while you were in the office, you were protected by professionally designed firewalls, security infrastructure, and robust software. As soon as you step away from the building, those protections disappear, leaving your device and the data inside at great risk.
Cyber attackers love to collect any data they can obtain, often preferring to hack first, assess value later. It doesn’t help that almost all data can be sold, including your personal details, those of your clients and suppliers, as well as your proprietary business data. These days, the information stored on your device is usually worth much more than the device itself.
Here are 3 ways a hacker will attack:
Flaunting Opportunity: Whether your employee left their laptop at a café or a thief stole the phone from their pocket, the outcome is the same – that device is gone. Hackers will take advantage of any opportunity to gain access to a device, including taking them from hotel rooms and even asking to ‘borrow’ them for a few minutes to install spyware, before handing it back.
Spoofing a Wi-Fi Hotspot: We’ve all come to expect free Wi-Fi networks wherever we go. Hackers will take advantage of this trust to create their own free, unsecure network, just waiting for a traveler to check a quick email.
Intercepting an Unsecure Network: Hackers don’t need to own the Wi-Fi network to steal content from it. Data traveling across an unsecure network is visible and available to anyone with the right software.
It’s okay, you don’t need to lock all employees inside the building or cancel all travel plans. Taking these four precautions will increase cyber safety and help protect your business data while on the go.
- Make a backup before you travel: In the event your device is lost or damaged, you’ll be able to replace the device with a new one and quickly restore all the data from a backup, all with minimal downtime.
- Don’t use public Wi-Fi: Wait until you have access to a secure network before going online – even just to check email.
- Use passwords and encryption: At a minimum, make sure you have a password on your device, or even better, have full drive encryption. That way, even if your data storage is removed from the device, the contents are inaccessible.
- Act fast after loss: If your device is lost or stolen, immediately notify the appropriate people. This might include your IT provider so they can change passwords, your bank so they can lock down accounts, and any staff who need to be aware of the breach so they aren’t tricked into allowing further breaches.
Need help with mobile cyber security? Call us at 432-279-0671
WannaCry Ransomware Explained: Is Your Business At Risk?
You’d be hard-pressed to miss May’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning.
Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. But by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong.
What is WannaCry?
The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay. In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.
How It Spread So Fast
It seems WannaCry may be a ‘computer worm’ that self-replicates and spreads, rather than a phishing attack that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours.
Why Some Businesses Were Safe
WannaCry could ONLY infect systems that have fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in
It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect your business from weeks of downtime and lost revenue, making attacks like this a non-issue.
With our managed services, we can make sure you stay up to date – and protected. Give us a call today at 432-279-0671.