30 Jul 2019

Can you spot when you’re being attacked?

2019-08-23T07:58:39-07:00

Email phishing is a stealth tactic to trick employees into giving up personal information hackers then use to launch a cyberattack. How vulnerable are your employees? Asking employees to take this quick online quiz will help you assess the risk. GeeksHD can help you address the results with cybersecurity awareness training.

Can you spot when you’re being attacked?2019-08-23T07:58:39-07:00
30 Jul 2019

Exposing the Top 4 Myths of Cloud Security

2019-07-30T08:08:55-07:00

Security breaches and their business impact make the headlines frequently, underscoring the need for more stringent security. In fact, 74% of IT leaders say security concerns are what holds them back from moving to the #cloud. What is the reality? Get the real story from this eBook on four common myths about cloud security and #MSCloud facts. To get started, contact us to have your questions answered about Windows 10 and Office 365 solutions from GeeksHD.

Exposing the Top 4 Myths of Cloud Security2019-07-30T08:08:55-07:00
30 Jul 2019

Protect your network from watering hole attacks

2019-08-23T07:58:24-07:00

With evil elements continuously developing novel ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of the curve. Protect yourself from cybercriminals by learning more about their methods. Here are some tips to deal with the threat of watering hole attacks:

What are watering hole attacks?

Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware.

The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer.

But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.

With […]

Protect your network from watering hole attacks2019-08-23T07:58:24-07:00
29 Jul 2019

Customer Story: Dell

2019-08-23T07:58:12-07:00

Dell wants to provide a world-class digital experience for their team members and that begins by providing them with a modern desktop experience. To make the shift to a modern desktop, Dell wanted to ensure that they would not only see an increase in productivity but an increase in security as well. This is an important part of transitioning to a modern desktop, and at GeeksHD, we take it seriously. We've helped businesses just like yours to plan, integrate, and refine their modern desktop solutions. Contact us to find out how we can help you shift to a modern desktop today.

Customer Story: Dell2019-08-23T07:58:12-07:00
29 Jul 2019

Increase Productivity and Security with Windows and Office

2019-07-29T14:12:46-07:00

According to @BCG, 61% of employees believe effective business tools are vital to offering faster services. Work smarter, not harder. Protect your everyday business, while saving time and resources. With #Windows 10 and #Office365, you can increase productivity, ensure security, and reduce cost. Get modern with GeeksHD and Microsoft.

Increase Productivity and Security with Windows and Office2019-07-29T14:12:46-07:00
29 Jul 2019

These Are The Five Most Dangerous Email Attachments

2019-07-29T12:06:48-07:00

If you worry about employees clicking on malicious email attachments, check out this article from Forbes. It highlights the 5 file types employees are most likely to see in a malicious email and how to spot them. For a deeper dive, contact GeeksHD to request a full training session.

These Are The Five Most Dangerous Email Attachments2019-07-29T12:06:48-07:00
29 Jul 2019

The best tips when backing up your Android data

2019-08-23T07:57:50-07:00

A cyberattack or hardware failure can wipe out invaluable personal and work-related data on your device, so it’s best to back them up. This doesn’t just apply to desktops and laptops but to mobile devices as well. Android phones and tablets store plenty of important data, which means they need to be backed up, too. Here’s how to do just that.

Take advantage of cloud services

The best way to ensure your data is safe is to back it up in the cloud. When you power up your Android device for the first time, make sure to sign up for a Google account. This will give you access to 15 GB of free Google Drive storage, with optional additional space for a monthly fee.

Any Google Docs or Sheets file you create on your phone will automatically be saved to your Drive, so if you ever lose your phone, you can retrieve your files by simply signing in to your Google account from a different device.

If you’re not a fan […]

The best tips when backing up your Android data2019-08-23T07:57:50-07:00
26 Jul 2019

Common virtualization problems and solutions

2019-08-23T07:57:34-07:00

Having an effective virtualized data storage system is crucial for your business. It increases efficiency, productivity, and revenue. While its setup can be fairly easy, it also has its own pitfalls. Here are three common virtualization problems and how best to resolve them.

Poorly structured storage from the get go

Within a virtualized data storage framework, information is grouped into tiers based on how quickly it needs to be accessible when requested. Most networks will have to organize data into three different tiers to avoid breaking the bank.

For example, you probably don’t need to access archived data as fast as the images on your eCommerce website.

Without a virtualization expert on hand, organizing these data could quickly go off the rails. Consult with your managed IT services provider (MSP) to plan where various data types will be stored and what’s the most effective way to set up your data storage framework.

Inadequately maintained virtualized storage

You need to regularly update your virtualized data storage plan so […]

Common virtualization problems and solutions2019-08-23T07:57:34-07:00
25 Jul 2019

What to do when your Mac is hit with malware

2019-07-25T08:00:55-07:00

Macs may be heralded as more secure than their competitors, but they too can be hacked. Malicious programs that appear like harmless files or apps can infect your computer and cause it to slow down to a crawl. If this ever happens, you must be able to remove the malware quickly before the infection gets worse.

Minimize the threat

Containment is the top priority when your Mac is hit with malware. The first thing you should do is to disconnect your device from the internet to prevent malware from spreading and making it vulnerable to hackers.

Then, reboot your computer in safe mode (hold the Shift key when the Apple logo appears) so you can run only mission-critical programs while you resolve the issue. Since most files aren’t active in safe mode, malicious programs are easier to remove. You should also open Activity Monitor, which can be found in the Utilities folder, to disable any non-essential apps.

Even if you are in safe mode, assume that your activities are being monitored by […]

What to do when your Mac is hit with malware2019-07-25T08:00:55-07:00
24 Jul 2019

Telemedicine to help transform healthcare

2019-08-23T07:57:14-07:00

Physicians in some parts of the world still make house calls, but they are becoming rare. Today, most patients either go to a clinic or hospital, make a quick trip to a pharmacy for instant relief, or get treatment at home via telemedicine. Although this medical practice might not sound familiar to some, it has been around for years.

Making telemedicine work

A key element in making telemedicine work is technology, which comprises of video-teleconferencing equipment, a fast and stable internet connection, and advanced telemedicine software. These elements are indispensable because this special type of medical practice requires highly visual interactions.

Healthcare businesses and individual medical practices with telemedical capability also need to comply with the regulations of the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and other healthcare legislation. Mostly, these regulations involve compliance with the handling and storage of personally identifiable patient data.

To make telemedicine effective, healthcare providers need to exert as much effort in following the […]

Telemedicine to help transform healthcare2019-08-23T07:57:14-07:00
Go to Top