Now that you know what EOL (end of life) means, let’s discuss what that means to your business. Previously mentioned in The Ping: End of Life, allowing end of life software on your network can leave you susceptible to malware and allow your company software to lose the ability to obtain updates and upgrades on either a server or desktop platform.

Read More

With every Microsoft product you purchase there is a known EOL, or End of Life. Simply put, it’s an expiration date for your software or licensing. The most common reason is due to advancements and/or changes in technology that lead to your current purchases becoming obsolete. That is not to say that the software or devices that you recently purchased aren’t advanced for their current life cycle, but at one time we also believed that Windows 95 was so advanced we couldn’t imagine we would ever need a new operating system again. Fast forward to 2019 and we are 8 OS versions past Windows 95 with Windows 10.

Read More

So you might have heard the buzzwords “2FA” or “Multi-factor Authentication” thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child’s Xbox Live account is now also prompting them to activate and use 2FA. Software you use at work, particularly credit card processing software, may also require card access or a 6 digit code. So that begs the question: what is multi-factor authentication?

Read More

Although Microsoft Office 365 has plenty of helpful features, sometimes you come across a need for which some 3rd party provides a plugin. Seeing that not all add-ons developers are created equally, we’ve tested and compared some to help you make an informed decision. Whether you need email backups, archival or encryption we’ve got you covered! All of the add-ons we review below have proven to be reliable, easy to use and capable to provide some level of security compliance feature as required by HIPAA, PCI, SOX and/or CJIS.

Read More

2019 is here, and it is a special year for all concerned due to many Microsoft products going End of Life (EOL) in January of 2020. We’ve covered the whys of EOL in previous pings, so in this edition we would like to remind you of the importance of keeping your servers updated and workstations rebooted when prompted. We discussed this necessity in The Ping: Updates and Upgrades, and we encourage you to review it. Staying ahead of the game will help prevent down time from malware and slow systems or hardware crashes. This edition of “The Ping!” should answer any lingering questions about Microsoft’s EOL policy and dates.

Read More

As the year draws to a close, we want to remind you of how important it is to stay diligent with your cybersecurity awareness training and security updates. This year, like years past, cybersecurity breaches have topped headline news and may have affected you personally. Let’s review some of the larger breaches and malware risks this year. These are security breaches that allowed someone or some group to access personal information, and they could even access some examples of how that information was used.

Read More

 For each area of concern with sensitive data, there are published guidelines to follow in order to achieve compliance. Reading and digesting the guidelines in whole can be a difficult task. There are decision making tools, technical requirement write-ups, security policies, and security procedures to pour through. So, without getting into the nitty gritty, we want to answer some of the frequently asked questions that come our way.

Read More