logo

Client Resources

24/7 Support

Are you a client needing urgent support?


Call us at (913) 538-5576

*Charges may apply

Submit a Ticket
Pay an Invoice

Security Tag

Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Over 50 percent of organizations don’t have an Insider Risk Response Plan and 40 percent don’t assess how effectively their technologies mitigate insider threats.1 Even though 59 percent of IT security leaders expect insider risks to increase...

Read More
a

Here is your Erickson Solutions TOP TEN list of ways to improve your technology security both in your personal life and in your business. Need details on any of these or help implementing them? Contact us! Be suspicious of all links and attachments in e-mail.. social engineering and phishing attacks are everywhere.  Don't fall for the fake efax e-mails, UPS delivery failures, or "your account is...

Read More

We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert.  While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window. REAL ALERTS Will include the vendor logo, vendor product name, and details on the problem.  For example, a Symantec anti-virus alert will...

Read More

Hackers are increasingly targeting Microsoft Office 365 accounts.   And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection.  We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised. Why is Office 365 attacked so often and why are...

Read More