Business
Focused
Technology

360Advisor - Page 6 of 7 - IT360

Ransomware: How to protect yourself

The global ransomware cyber-attack shut down hundreds of thousands of computers around the world over a few days by exploiting a software vulnerability. If you feel you may be at risk, there are several measures you can take to protect your computer and its data. Update your computer by installing patches from Microsoft, especially those […]

Posted: June 13, 2017 | View More »

Protect Your Small Business with these STOP. THINK. CONNECT. Tips:

Keep a clean machine: Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. When in doubt, throw it out: Links in […]

Posted: April 10, 2017 | View More »

Understanding Threats – The on-going online attack

You don’t need to be a cybersecurity expert to ensure that your business is protected, but it is critical that you understand the online threats to your company’s network. Awareness of key threats will enable you to employ practices and behaviors that limit your company’s risk. Today’s businesses face several major online threats: Spam Spam, […]

Posted: April 10, 2017 | View More »

2017 TRENDS

As we settle into another year, we cannot help but ask ourselves: What tech trends will we see in 2017 and beyond? Let’s take a closer look! 1.  Internet of Things (IOT) and Smart Home Technology: IOT is the idea that technology not only tracks data, but it also uses that information to contact other […]

Posted: February 14, 2017 | View More »

Automation in business

Automation:  the technique of making an apparatus, a process, or a system operate automatically We set up our “Out of Office” notice to let people know that we cannot respond to email while we are away for vacation.  This is the most basic form of automation that we perform in our businesses. Other examples include: […]

Posted: June 15, 2016 | View More »

Windows 10 is here Putting an end to older operating systems

Just a reminder that Windows 10 is here and you have until July 29th to receive it as a free upgrade from Microsoft.  After that date, the upgrade will cost $99. Support End Dates for Windows: Client operating systems Latest update or service pack End of mainstream support End of extended support Windows XP Service Pack […]

Posted: May 17, 2016 | View More »

Keyboard Shortcuts – Get the most out of your PC or Mac

This month, we thought we would share a couple of keyboard shortcuts that you may be able to take advantage of. There are keyboard shortcuts for doing almost anything in Windows.  Below are the ones we personally use the most often:   Alt+Tab Switch between open programs Alt+F4 Close current window Backspace Go to previous […]

Posted: April 14, 2016 | View More »

The evolution of junk mail and the modern spam filter

Like most of you, I get the regular “junk” through the post office. It comes in various forms: free money, credit card offers, high interest loans, and timeshares. I recognize these instantly (usually without even opening the envelope) and they go straight into garbage. Over time we have all developed the ability to distinguish the […]

Posted: March 17, 2016 | View More »

Breathe new life into older hardware

Hard drives have, for the most part, been the limiting factor when it comes to the speed of our computers. Waiting for computers to boot and programs to load can sometimes seem to take forever.   Add these tasks up during the course of a work day and waiting can turn into a significant amount of […]

Posted: February 16, 2016 | View More »

Storm Disaster. Lessons Learned.

Between Christmas and New Year’s, the Central Illinois area experienced freezing rain and strong winds, which brought about area-wide power and internet outages. Some of our clients were without power for at least four days. A few went without internet even longer. Around the same time, IT360 and other RiverFront properties experienced another flood of […]

Posted: January 15, 2016 | View More »

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT360 News
‘New VPN Configuration’ Email Tricks Microsoft 365 Users Out of Credentials

Scammers are taking advantage of the prominent use of VPNs by remote workforces to send out this very topically relevant phishing email that just wants to steal your credentials. Nearly one-third of users utilize a VPN to access work-related sites and services. From a cybercriminal’s perspective, that’s a significant chunk of people they can target. The shift to remote […]

Read more
IT360 News
BEC Isn’t Back; It Never Left

Business email compromise (BEC) attacks aren’t new, but they’re growing increasingly effective, according to Zeljka Zorz at Help Net Security. Zorz cites an article from BakerHostetler, in which two attorneys describe how BEC attacks work and why they’re so effective. The lawyers explain that BEC attacks involve targeted phishing attempts coming from spoofed or compromised email […]

Read more