logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Email us at support@erickson.solutions

Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Security

Zoom has been a fast-growing tool during the work-from-home (WFH) migration of 2020.  It is a bit of a hero for offering free-for-individuals teleconferencing and meeting capabilities.  And, it is a fairly low-cost (often free depending on meeting size) and a robust way for businesses, schools, and communities to interact with the public.  However, Zoom has a dark side due to security risks, improper settings,...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

It's been almost a year since half of Americans had their sensitive personal information exposed due to the Equifax data breach.   The latest stats in 2018 since that breach: 22 million individuals have become victims of ID theft since the Equifax breach ID theft is America's fastest-growing crime, affecting more people than car theft and home burglaries combined Thieves will wait up to 10 years (or more)...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Understanding the Risk In the news recently are two new system risks.. Meltdown and Spectre. These impact devices across the IT spectrum.. from Windows to Macs to Linux/Unix.  Even devices such as iPads and other tablets can be at risk.  The two risks exist at the chip/chipset level of the devices and leave them vulnerable to cyber attackers trying to access and exploit sensitive information. Meltdown affects...

Read More

A very serious exploit for Apple systems running the High Sierra OS has come to light.  You can read more about it here: https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/ For a short-term fix Apple suggested this: https://support.apple.com/en-us/HT204012 In working on a long-term fix, Apple created another issue in which file shares/sharing is broken.  You can read more about that one here: https://www.macrumors.com/2017/11/29/apple-macos-high-sierra-file-sharing-fix/ While a fix for that is pending, the manual steps to fix it are...

Read More