Essential Settings for EOP and Office 365 ATP security

Techtron has been migrating to and managing Office 365 enviroments for some time now.  One of the most common scenarios we find is companies have left many of the security features set to default, which according to Microsoft and other leading experts is not recomended.  These settings are often neglected because everything seems to “just…

Do You Know Who Has Access to Your Systems?

This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security. The last time…

Stay Ahead of Hackers by Changing Your Passwords

We’re continuing to explore the topic of passwords and how they help keep your business data and systems secure in this next blog on when and how you should update your passwords. An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5!…

Strong Security Starts with Strong Passwords

We have been thinking a lot about client security lately. When we came across this blog series about passwords, we knew we had to share it with all our clients. It’s all too easy to think passwords are a nuisance—when really they’re essential to keeping your data and your business safe. If you use the…

Data Backup Essentials – What Every Company Must Know

Any loopholes in managing company data can have serious consequences. Take, for example, Morgan Stanley which had to pay up financier Ronald Perelman a whopping $1.45 billion, in part because the global giant could not produce all the critical email communication during the trial’s disclosure phase. Whether yours is a small, medium-sized, or large business,…

Multiple Security Flaws Found In Cisco Aironet Access Point Software

Cisco has disclosed 13 big security vulnerabilities in its most recent software security advisory for Cisco IOS and Cisco IOS XE. The company said that all administrators should review their devices to determine which version of this software they are using. Running an outdated version could mean their devices are exposed to some of these vulnerabilities, said…

‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’

A new form of malware, dubbed ‘Tarmac’ is making its appearance on Mac devices. What is Tarmac malware? How does it work? Tarmac is a ‘malvertisements’ or malicious ads discovered by security researchers. Tarmac malware is also known as OSX. Tarmac is actually a companion of Shlayer, an older program. The two viruses work together to infect…