logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Email us at support@erickson.solutions

Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Author: ESG Team

Zoom has been a fast-growing tool during the work-from-home (WFH) migration of 2020.  It is a bit of a hero for offering free-for-individuals teleconferencing and meeting capabilities.  And, it is a fairly low-cost (often free depending on meeting size) and a robust way for businesses, schools, and communities to interact with the public.  However, Zoom has a dark side due to security risks, improper settings,...

Read More

[vc_row css=".vc_custom_1584808454760{padding-top: 12px !important;}"][vc_column][vc_column_text]Over the past three weeks we have helped dozens of our clients move thousands of their users to remote-work/work-from-home (WFH) environments. While usually we at Erickson Solutions Group (ESG) keep our blog focused on non-marketing topics, we have been asked to share a few quick words on the products and services we can implement for clients who are just now moving to...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

It's been almost a year since half of Americans had their sensitive personal information exposed due to the Equifax data breach.   The latest stats in 2018 since that breach: 22 million individuals have become victims of ID theft since the Equifax breach ID theft is America's fastest-growing crime, affecting more people than car theft and home burglaries combined Thieves will wait up to 10 years (or more)...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Understanding the Risk In the news recently are two new system risks.. Meltdown and Spectre. These impact devices across the IT spectrum.. from Windows to Macs to Linux/Unix.  Even devices such as iPads and other tablets can be at risk.  The two risks exist at the chip/chipset level of the devices and leave them vulnerable to cyber attackers trying to access and exploit sensitive information. Meltdown affects...

Read More