TSTS Event: Small Business Trends for 2020

  Explore five crucial trends for small businesses in 2020: cloud computing, collaboration, mobility, security, and managed services. Led by Kathy White, senior tech advisor with Twin State Technical Services, who has more than 35 years of IT experience. She will provide insight on the top five tech areas you will not want to ignore…

Continue reading

Cyber Security Tips

There has been a tremendous uptick in cyber attacks this year. We are getting at least a call per week, sometimes a couple a week, on significantly compromised businesses calling for help. The following are some common factors that we see in these cases and some tips to help improve you cyber security. Common Factors…

Continue reading

General Virus Prevention for Businesses

Hello Everyone, We’re sending this out to educate you about the risk of malware—malicious software—and virus prevention best practices. The best way to understand how to avoid malware is understanding how infections occur, what different types of infections do, and the most common virus prevention practices. General Ways Infections Occur: There are too many ways…

Continue reading

Maintaining Regular Backups

Properly maintaining backups can financially benefit your business. Sometimes, it could even save your business. Several weeks ago, a popular encryption based virus made its way around the Quad Cities . . . again. This particular virus, Cryptowall, tricks users into opening a malicious file which infects their computer. Cryptowall can then spread throughout your…

Continue reading

New Phone Scams on Businesses, Please Send Your Cancelled Check

  Ever since the invention of the telephone, there have been money wiring scams. Throughout the decades, these scams have taken many forms. There are times when the cons are more difficult to recognize. Regardless of how it has been dressed up, non-legitimate requests for  money have the potential to be devastating to your organization.…

Continue reading

How to spot a suspicious email

We have been blogging about the Crypto Virus for some time now because of the serious nature of this threat. We want to make sure that your business and employees are armed with the knowledge of how to handle a suspicious email and attachments. In the example below, you will see a perfect example of how…

Continue reading

Resurgence of a Crypto Locker Variant

We are informing all our clients that we have seen a resurgence of a very dangerous virus variant to the Crypto Locker, which destroys computer data, programs, and files quickly. Rebuilding and restoration from backup is often the only alternative once you are infected. Please inform your employees to be especially vigilant. The virus bypasses AV…

Continue reading