Trending IT Blog Articles:
The 2026 Hybrid Strategy: Why “Cloud-Only” Might Be a Mistake
Beyond Chatbots: Preparing Your Small Business for “Agentic AI” in 2026
We figured it out
so you don't have to
Hot Alerts:
Top Cybersecurity Challenges Facing New Jersey Businesses in 2026 (And How to Stay Protected)
Cyber Retaliation From Iran? Why U.S. Businesses Are on Alert in 2026
Why the EU Is Targeting TikTok’s “Addictive Design” — What It Means for Online Safety
Managing Cloud Waste as You Scale
30 Years of Innovation, Evolution, and Service
Powersolution.com Named CRN’s 2026 MSP 500 List in the Security MSP 100 Category
We know you are busy
Receive important IT and Security alerts via email and get a complimentary e-book, “Cybersecurity Essentials for Business Owners”
No worries. We keep you information private. You may cancel at any time.
For more information, see our Privacy Policy.
Vulnerabilities Fallout: Not all fixed by Recent Microsoft Patch Releases
In a past month, Microsoft has released patches for over 70 vulnerabilities in its products. The company has been under the fire from users and system administrators for quite some time. The pressure was following the stream of vulnerabilities, including two of a zero-day
PHI of 350,000 DHS Clients Compromised in Phishing Attack in Oregon
The Oregon DHS recently disclosed that the personal health information (PHI) of over 350,000 clients had been compromised in data breach. A phishing URL embedded into the spear-phishing email was clicked by nine employees, resulting in granting cybercriminals the access mailboxes of nearly 2
Advanced Phishing Threat: malicious emails posing as Adobe Acrobat or Microsoft Office365 message
We have received numerous reports and examples today of an advanced phishing email being used to harvest Office365 credentials. The email is sent through a compromised account of an individual that is familiar, such as a colleague, business partner, vendor, etc. The attacker gets
58% of cyber attack victims were small businesses – you could be next
Cybercrime is a big and nasty business. According to Cybersecurity Ventures, small business (organizations with fewer than 250 employees) becomes a prevalent and profitable target: 58% of them were cyberattack victims in the recent year, and the astounding amount of $6 trillion is expected
FaceTime bug poses privacy threat for individuals and businesses using the app
9to5Mac has discovered a significant bug in FaceTime app, and the news is running virally over social and major media outlets. Reportedly, when users start group FaceTime, they can immediately hear the audio coming from their phone, regardless of the other person accepting or rejecting
773 million records of email addresses were breached – Have you been pwned?
Today, one of the largest data breach data sets was released containing roughly 773 million unique records of email addresses and passwords. Microsoft Regional Director and MVP Troy Hunt obtained the original data set, titled ‘Collection #1’ from a hacker forum. The original data
Important Alert: NEW Office 365 Phishing Threat
A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case, the attack begins
10% of you are compromised by at least one of the passwords from the Top 100 List of 2018
Each year, SplashData., Inc, a leader in password management, analyses leaked passwords to find the top commonly used passwords. In 2018, SplashData, Inc. had five million passwords to work from, most of them from hacks in the US and Europe. According to the statistics,
Sextortion: what you should know of this new email scam
Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised you by accessing your computer via malware and recorded you or your household members in an intimate setting. They may
Top-Clicked Phishing Email Subjects
Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please – the top 10 are: Password Check Required Immediately Security Alert
[VPNFilter] Symantec Releases Tool to Check for VPNFilter Infection
On May 23rd researchers at Cisco discovered an advanced malware, named VPNFilter, which targets routers and Network Attached Storage (NAS) devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be found on the
Do You Have a Cybersecurity Program for Your Small/Medium Business?
As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks. According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.
Update: additional info on advanced malware, named VPNFilter
On May 23rd 2018 researchers at Cisco discovered an advanced malware, named VPNFilter, that targets routers and NAS devices in order to steal files, information, and examine network traffic as it flows through the device. More details can be found on the powersolution.com blog
Increasing risk of CEO Fraud Emails – What to Know and How to Protect Yourself
Your phone dings or your email client puts up an alert – a message from the CEO. This must be important. You open it, scan it quickly, and there is a note asking to transfer a sum of money. The next decision you make
Information Technology in the Manufacturing Industry
IT has impacted the manufacturing industry in many different ways, making advancements throughout the vertical, from the infrastructure of factories to the facilities’ front-office processes. Information technology has impacted the relationship between suppliers, equipment manufacturers (OEMs), logistics, and end customers. In our continuously evolving
Violating HIPAA regulations is a Crime that Can Lead to Serious Penalties
Attorney generals and district attorneys around the country, are increasingly taking HIPAA violations seriously. Criminal charges for violating HIPAA are serious. You should know that the federal government can bring criminal charges against companies and company employees under the Health Insurance Portability and Accountability
Do you believe in coincidences? Take take a closer look at pi
There are many important numbers in the universal math. Primal, odds, evens, irrational. And then there is one to rule them all. A mathematical constant, the ratio of a circle’s circumference to its diameter… what we all know – or should know – as pi. The Babylonians
Why Use a Corporate VPN when connecting to your network
Most corporate IT networks have various security products on the network providing some level of security – a firewall, Antivirus software, backup, etc. Even with these protections in place, without a VPN, employees are only protected while they are on the corporate network. With
Phishing Emails – Everyone is at risk
Phishing emails usually appear to come from a well-known organization and ask for your personal information – such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services, and companies with which you
Rising Business Costs in 2018: Fight Back By Outsourcing Your IT Services
Employers must always look for ways to counteract the ever-increasing costs of running their companies. 2018 won’t be any different. Once again it is rising cost environment for most SMBs. Health Care Costs Increase: Employers with healthy workforces often report a healthy bottom line
7 Must-Haves for a Secure Remote Access in Your SMB
Now that cloud technology has made access to information more convenient, with a promise to make your business life easier, the risk of data security has increased. Cloud servers are susceptible to attacks. Insecure or insecurely used remote access technologies – mechanisms that most security
How Downtime can Crush your Business
Did you know that 3 out of 4 SMBs fail the disaster recovery preparedness?According to the National Archives and Records Administration, only 10% of companies stay in business after experiencing 7 days of data center downtime. A third of all organizations have had some
Go beyond CTRL+C: here are 33 lesser-known shortcuts to help your workday
OK, we all know what CTRL+C and CTRL+V do. Throw in X and Z into the mix, and one may get comfortable using the keyboard. But did you know there are so many more shortcuts that can help you with your workload? It’s like
3 Important Rules to Follow for Public Cloud Security and Compliance
When using a public cloud host, you want to make sure your business remains compliant with rules and regulations applicable to your industry, while also keeping your data secure. To ensure the compliance and security, there are a few rules your SMB needs to
How to handle phishing attempts involving email scam [Screenshot]
Cybercrooks use clever schemes to defraud people every day. They often combine sophisticated technology with age-old tricks to get people to share personal information, send money or compromise access to their computer network. They use social engineering methods to convince people into doing things
In wake of recent ransomware attacks, importance of HIPAA compliance is vital to providers and business associates
In the wake of two recent global ransomware attacks, Airway Oxygen Inc., a privately held Michigan-based medical equipment provider reported that the mid-April ransomware attack had more than 500,000 patient records compromised. In what is believed to be one of the most severe ransomware
Hardware-as-a-Service (HaaS) model makes leasing computer equipment easier than purchasing
Hardware-as-a-Service (HaaS) is a procurement model that is similar to leasing or licensing. It refers to managed services where computer network equipment is leased through a provider. In other words, users lease provider’s tech assets rather than purchase them. In the HaaS model, hardware
Verizon.net Shutting Down Email – Avoid Direct Migration to Gmail
Over the last couple of months, Verizon.net has been notifying their customers that they are shutting down their email service, impacting millions of customers. Notices issued in recent days indicate a shutdown date of June 24, 2017. Verizon is encouraging Verizon.net users to migrate
Alarming Pop-ups: how to handle a browser hijacking
When browsing various website on the Internet, you might come across pop-ups – a common occurrence, and frankly, a nuisance. Some pop-ups are the sales chat window, some are advertisements. But there are also other, malicious types: false ads and scareware – the type that announces
Is your computer safe from WannaCry Ransomware? 9 tips to apply now.
As WannaCry Ransomware – a computer virus, malicious piece of software that restricts access to user files on a computer and displays demands for ransom payments to unlock access or restore files – claimed over 200,000 victims in 150 countries over this weekend, authorities









