logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Email us at support@erickson.solutions

Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Security Tag

[vc_row css=".vc_custom_1584808454760{padding-top: 12px !important;}"][vc_column][vc_column_text]Over the past three weeks we have helped dozens of our clients move thousands of their users to remote-work/work-from-home (WFH) environments. While usually we at Erickson Solutions Group (ESG) keep our blog focused on non-marketing topics, we have been asked to share a few quick words on the products and services we can implement for clients who are just now moving to...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Understanding the Risk In the news recently are two new system risks.. Meltdown and Spectre. These impact devices across the IT spectrum.. from Windows to Macs to Linux/Unix.  Even devices such as iPads and other tablets can be at risk.  The two risks exist at the chip/chipset level of the devices and leave them vulnerable to cyber attackers trying to access and exploit sensitive information. Meltdown affects...

Read More

A very serious exploit for Apple systems running the High Sierra OS has come to light.  You can read more about it here: https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/ For a short-term fix Apple suggested this: https://support.apple.com/en-us/HT204012 In working on a long-term fix, Apple created another issue in which file shares/sharing is broken.  You can read more about that one here: https://www.macrumors.com/2017/11/29/apple-macos-high-sierra-file-sharing-fix/ While a fix for that is pending, the manual steps to fix it are...

Read More

UPDATED - July 11, 2016 with latest Avast and AVG security issues. Google has discovered that AVG Free will weaken your Google Chrome settings and expose personal data to hackers.  Details here. Back in September as we originally reported, AVG announced that it will collect and sell your browser history and data to advertisers (or anyone).  They stated: We collect non-personal data to make money from our free...

Read More

As you roll out Windows 10 in your business, or as you begin to upgrade your home systems to Windows 10, the following are a few steps ESG recommends that will secure the OS and avoid possible performance issues.  This is an evolving list.. designed to target systems that will be used in a production business environment.. we will continue to make updates as new tweaks and fixes are...

Read More