logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Email us at support@erickson.solutions

Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Hacking Tag

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Hackers have been able to exploit a number of flaws in Adobe's Flash tool.  These flaws can be embedded in advertisements that run on popular (but highly insecure) websites like Facebook.  We say these sites are insecure because Facebook makes it revenue from advertising.. they have very little incentive to check the ads for content, as they are more inclined to let virtually all ads...

Read More

On December 14, 2014, reports began surfacing of a new infection impacting WordPress content management websites. This infection has been coined “soaksoak”. We at ESG began seeing the attempted attacks over the weekend of Dec 13/14 and as of the morning of Dec 15, as soon as a safe mitigation process was available, we began patching our servers to protect the sites of our clients...

Read More

Heartbleed is a security flaw in OpenSSL, a widely used data encryption standard, that gives hackers the ability to extract data from inside the stream of communication that would normally be considered secure. The vulnerability was detected by researchers including an analyst for Google.  Specifically the Heartbleed vulnerability is in the machines that power services that handle secure transactions for banking and shopping, as well...

Read More

RTF files.. standing for Rich Text Format.. have been around a long time.  They are an alternative to saving files in the familiar *.doc or *.docx formats.  However, according to a recent warning from Microsoft, *.rtf files are being used to compromise systems when viewed in Outlook or Word. The *.rtf files can use weaknesses in Microsoft Word to allow a hacker to gain access to...

Read More