logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Email us at support@erickson.solutions

Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

E-mails that you receive have hidden information included with them that tells the story of how they arrived in your Inbox. This information can be very useful to us. For example, we might ask you to send us the e-mail headers of an e-mail when we need to determine how an e-mail got past the spam filtering or why a particular e-mail was delayed in...

Read More

Phishing attempts are on the rise.  A phishing e-mail is one that is sent to you in the hopes of getting you to open an attachment or click on a link.  That attachment or link actually infects your system or tries to get you to enter login/password information so it can steal data from you.  More details on phishing can be found here and here. We...

Read More

Ransomware is the offshoot of malware in which a hacker crafts a package such that, once deployed to your system, your files become encrypted and you are forced to pay the hacker a 'ransom' in real dollars to decrypt the data. The most widely known variation of ransomware to date has been Cryptolocker. Ransomware made big inroads during 2012 and 2013, but was curtailed in...

Read More

One question we frequently get asked is if social media sites like Facebook and Twitter are "safe" for workplace use. The answer is a tough one because it depends a great deal on how individual users utilize these services. Consider the following three examples: Sally gets on Facebook, Twitter, and LinkedIn a couple times a day to post updates for your company. Occasionally she also checks...

Read More

Heartbleed is a security flaw in OpenSSL, a widely used data encryption standard, that gives hackers the ability to extract data from inside the stream of communication that would normally be considered secure. The vulnerability was detected by researchers including an analyst for Google.  Specifically the Heartbleed vulnerability is in the machines that power services that handle secure transactions for banking and shopping, as well...

Read More

RTF files.. standing for Rich Text Format.. have been around a long time.  They are an alternative to saving files in the familiar *.doc or *.docx formats.  However, according to a recent warning from Microsoft, *.rtf files are being used to compromise systems when viewed in Outlook or Word. The *.rtf files can use weaknesses in Microsoft Word to allow a hacker to gain access to...

Read More