logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Author: ESG Team

E-mails that you receive have hidden information included with them that tells the story of how they arrived in your Inbox. This information can be very useful to us. For example, we might ask you to send us the e-mail headers of an e-mail when we need to determine how an e-mail got past the spam filtering or why a particular e-mail was delayed in...

Read More
a

Here is your Erickson Solutions TOP TEN list of ways to improve your technology security both in your personal life and in your business. Need details on any of these or help implementing them? Contact us! Be suspicious of all links and attachments in e-mail.. social engineering and phishing attacks are everywhere.  Don't fall for the fake efax e-mails, UPS delivery failures, or "your account is...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More