logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Phishing attempts are on the rise.  A phishing e-mail is one that is sent to you in the hopes of getting you to open an attachment or click on a link.  That attachment or link actually infects your system or tries to get you to enter login/password information so it can steal data from you.  More details on phishing can be found here and here. We...

Read More

Ransomware is the offshoot of malware in which a hacker crafts a package such that, once deployed to your system, your files become encrypted and you are forced to pay the hacker a 'ransom' in real dollars to decrypt the data. The most widely known variation of ransomware to date has been Cryptolocker. Ransomware made big inroads during 2012 and 2013, but was curtailed in...

Read More

One question we frequently get asked is if social media sites like Facebook and Twitter are "safe" for workplace use. The answer is a tough one because it depends a great deal on how individual users utilize these services. Consider the following three examples: Sally gets on Facebook, Twitter, and LinkedIn a couple times a day to post updates for your company. Occasionally she also checks...

Read More

Heartbleed is a security flaw in OpenSSL, a widely used data encryption standard, that gives hackers the ability to extract data from inside the stream of communication that would normally be considered secure. The vulnerability was detected by researchers including an analyst for Google.  Specifically the Heartbleed vulnerability is in the machines that power services that handle secure transactions for banking and shopping, as well...

Read More

RTF files.. standing for Rich Text Format.. have been around a long time.  They are an alternative to saving files in the familiar *.doc or *.docx formats.  However, according to a recent warning from Microsoft, *.rtf files are being used to compromise systems when viewed in Outlook or Word. The *.rtf files can use weaknesses in Microsoft Word to allow a hacker to gain access to...

Read More

Update - April 10, 2014: Microsoft and ESG support for Windows XP has now ended.  Please read below to see how this impacts your business and what steps we recommend! Original Post - February 2014: By now you have likely heard from numerous sources including national media, Microsoft, and our ESG Blog that support for Windows XP will be ending April 8, 2014.   How  will...

Read More