Blog Archive

Email Best Practices

Email is a commonly used method of communication in both academic institutions and the corporate world. It is important to be vigilant about what is clicked on, downloaded, and transmitted, especially with the increase in social engineering tactics and spoofed domains. Threat actors may send phishing emails that appear to be from a trusted classmate,

Increase in Emotet Infected Emails

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has issued an alert after increased reports of a new round of emails containing Emotet infected attachments. Emails containing the Emtot infected attachments slowed during the summer, the threat actors behind the Emotet trojan continue to increase their activity, with a large uptick occurring starting in

Microsoft is delaying ending support for older versions of Windows 10 due to Coronavirus

Microsoft has announced an extension regarding their support for the older versions of their Windows 10 software. Initially, Microsoft had planned to stop technical support for Windows 10 this past week. However—due to the Coronavirus pandemic—the company has now extended the support up until October 13, giving IT administrators an extra six months. With IT

BYOD and Federal Wage Laws

As most everyone knows, Bring Your Own Device (BYOD) is an approach wherein organizations allow their employees to use their own smartphones and other devices in lieu of company-provided equipment. It provides convenience to employees interested in not having to carry around duplicate mobile devices. This policy can make employees happy, but it also presents

Human Resources Issues You Never Considered with BYOD

There is a great deal of discussion about the advantages and disadvantages of the policy of allowing employees to use their own mobile devices, primarily smartphones, instead of employer-issued devices that are to be used solely for work purposes. This policy, known as “bring your own device” (BYOD) can make employees happy, but it also

How Businesses Can Securely Work From Home (VPN Guidance)

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations. One solution many businesses are turning to is recommending employees to work from home to avoid potential illnesses. To help ease the burden on businesses, Microsoft, Google, LogMeIn, Cisco Webex,

Why choose psWorkplace for secure collaboration?

psWorkplace is a proven file sync and share service with over 10 years of experience serving the needs of businesses. psWorkplace provides the security, mobility, and control that businesses need to access, share, and collaborate on files internally and externally. Secure Collaboration, Built for Business Users everywhere are increasingly expected to work and collaborate anywhere,

6 Phases to Guide Your Small Business Through COVID-19 Planning and Response

Businesses have had to adjust very quickly to the global health crisis. It’s imperative to provide context to help successfully navigate these uncharted waters. This guide illustrates the different phases of needs and planning efforts during the COVID-19 crisis. Identifying which phase your business is currently in will help you develop guidelines and ongoing response

Reopening the Workplace After COVID-19: Technology Considerations

Returning to your establishment doesn’t necessarily mean you will be abandoning all of your Work From Home (WFH) set-ups. In fact, for most of you, your workforce will likely consist of remote workers for some time to come. In addition, workstations in your establishment may have been sitting idle while everyone worked remotely. Your technology

Benefits of letting your employees work from home

In the last several years, the concept of Work From Home (WFH) has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said, the pandemic event in 2020 essentially set the debate entirely aside, at least for the time being,

Increase in Business Productivity Phishing Scams

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC), in which powersolution is a member of, issued an alert around a new email threat. Cyber criminals are using fake business productivity suite emails to harvest credentials. Emails are mimicking SharePoint Online, One Drive, Drop Box share notifications as well as an awaiting message in Teams

Management Concerns About Work From Home Policy

1. Decrease in productivity A common concern is that when at home, where there may be many domestic or entertainment distractions, workers will be unable to settle in and focus on their work. Kids, pets, laundry, Netflix, etc. may represent a strong magnetic pull from the work at hand. 2. Oversight Many managers fear that

Work From Home Implementation: Policy Considerations for Small Business

In the last several years, the concept of Work From Home (WFH), also known as Telecommuting, has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said, the pandemic event in 2020 essentially set the debate entirely aside, at least

Data Security: What Can You Do To Mitigate Risk

Data security is important, but one main facet of data security is accessibility. Safe data is of no use to anyone if it becomes inaccessible. So as you make plans to defend against events which could threaten data security; plan to defend against events which would limit the use of that data to conduct your

4 Common Threats to Your Data

There are numerous ways data can be put at risk. A number of different events will have an impact on customers and pose a threat to your brand, as well as your ability to provide services 1. External Bad Actors – Clearly, this is the risk that gets the most headlines. Cyberattacks from hackers, foreign

How To Setup Your Workforce With a Secure Remote Access

COVID-19 pandemic made working remotely the new norm. Because of advances in mobile and networking technologies, employees are increasingly working from various locations, connecting to their offices online. This ability to work from anywhere can be a great benefit for employees who are looking for work-life balance as well as organizations that are committed to

How To Implement a Business Continuity Plan

Business continuity recovery plans can help businesses realize the following benefits: Ensure the highest level of data security Enhance business resiliency and maintain reputability Achieve maximum availability of mission-critical data Maintain continuity of business operations even in the harshest scenarios Have processes in place to minimize recovery time after a disaster Considering all these advantages,

Multiple Active Phishing Campaigns Targeting O365 Credentials

Multiple phishing campaigns have been identified targeting Microsoft Office 365 (O365) users in an attempt to steal login credentials. In one of the campaigns, the phishing email mimics an automated official notification from the Outlook team on behalf of the recipient’s organization. The email urges recipients to upgrade Outlook services within 24 hours to avoid

Penetration Tests Demonstrate Passwords are Still a Security Problem

Passwords continue to be a top security challenge for organizations, with penetration testers revealing that they can easily guess passwords in the majority of their engagements, according to the 2019 Under the Hoodie report published byRapid7. The new report, which documents the results of 180 pen tests carried out from September 2018 through May 2019,

Do You Have a Cybersecurity Program?

As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks.  According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.  Roughly 75% of these breaches are perpetrated by outsiders, while approximately

Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution industry awards
Scroll to Top