Author: Jon Isenberg

Data Breach – Can it really happen to you?

IN THE NEWS – ELIJAH Digest | March 21, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A data breach can happen to any company, even if they have security systems protecting their network. One of the largest sources of data breaches stems from employee errors – usually employees that do not even realize that what they are doing is hazardous. Recently, an employee at a medium-sized company decided to copy photographs and downloaded documents from his smart phone to his company computer. He attached a USB cable to his computer and connected it to his phone. He copied the photographs and documents to his computer. What the employee didn’t know was that there was a malware infection imbedded in one of the documents that started the process of the data breach for the entire company. The employee did not have any security software on the smartphone. In just the… Read more »


Email Spoofing – Is the email really from the person you think it is from?

IN THE NEWS – ELIJAH Digest | March 7, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. We’ve all received scam emails from strange addresses and fake accounts. By now, these messages are easy to spot. What’s tougher and more worrisome, is email spoofing—defined as when a hacker purposely alters part of an email or email address to make it appear as though it was written and transmitted by someone else. Often, the sender’s account and/or domain name are formatted to appear as if the email is coming from a legitimate source. Cybercriminals can easily create an email address that, upon quick glance looks exactly like yours: president@nnyompany.com instead of president@mycompany.com. Some hackers can even temporarily take over your email domain, sending spam messages from your actual address that you might not notice unless a client or contact points it out to you. The toughest email spoofs to combat are… Read more »


What is Computer Forensics?

IN THE NEWS – ELIJAH Digest | February 21, 2018 On December 1, 2006, the Federal Rules of Civil Procedure was amended to formally allow for electronic data discovery in litigation cases. Computer Forensics is defined as the analysis of computer hard drives (or the analysis of digital media), where the examiner searches for company data, intellectual property, internet history, and can even find hidden files on a hard drive. Additional work may include the investigation of email messages, to verify that they are not tampered with, forged, or deleted. Call logs, documents, are also included. Data recovery from GPS units, phone systems, car computer systems, game consoles, iPods, iPads, Tablets, MP3 players, USB flash drives, SD cards, smartphones. Recovery of data may include missing/deleted ( by now, most people realize that even if you delete a document from your computer, a forensic examiner should be able to recover it)… Read more »


Cybersecurity Managed Services – How Secure Is Your Email From Infection?

IN THE NEWS – ELIJAH Digest | February 7, 2019 How often do you visit the Web – not just opening a web browser and surfing to your favorite website, but using your email as well? In 2018, less than 5% of all email is managed by an Exchange Server, which means that 95% of all email relies on the internet. Internet mail is defined as opening up a web browser or an Outlook client to access your email. This can include mail from the following sources, as an example: Gmail.com Yahoo.com Sbcglobal.net Comcast.net Outlook.com The question becomes – how secure is your mail? Is there a mail service that is blocking your mail from hackers or from infections? Probably not, unless you are using software specifically for this purpose. One of the software products that can be used for this purpose is Advanced Threat Protection. This software, offered by… Read more »


Internet of Things set for growth in 2019?

IN THE NEWS – ELIJAH Digest | January 10, 2019 January is an important month in technology history: the opening of the first underground railway service in London in 1863; in 1927, the first commercial transatlantic phone service was made available; the ordering of the development of a space shuttle program by President Nixon in 1972; and the unveiling of Mac OS X in 2000. In January 2019, the Internet of Things seems poised to really take off (“IoT”). IoT, as defined by Wikipedia, “is the network of devices such as vehicles and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled.” The most common IoT device is your Smartphone. Other examples include wireless thermostats, doorbell cameras, smart watches, Amazon… Read more »


Data & Email Management

IN THE NEWS – ELIJAH Digest | December 13, 2018 How do you communicate with your co-workers and clients that you will be out of the office? Do you take the same care in drafting your out-of-office message that you do with drafting your emails? Here are some of the messages that we have recently received from clients that are out on vacation or traveling for business: “I am out of the office on vacation. Thanks, (name)” “I am out until the 20th.” “I am out of the office with limited access to email and voicemail. My response may be delayed.” “Thank you for your email. I am currently out of the office.” “I am out of the office. I will respond to you upon my return. Thanks.” While it is clear that the person is out of the office, there is not much more being conveyed. For example, items… Read more »


Manage Your IT – Time to plan for the demise of Windows 7

IN THE NEWS – Elijah Digest – November 29, 2018 Manage Your IT – Time to plan for the demise of Windows 7 On January 14, 2020, Microsoft will stop supporting one of the world’s favorite operating systems, Windows 7. That’s 415 days from today. On that date, Microsoft will no longer issue security patches or fix flaws and bugs. You can still run the Windows 7 operating system – but be at your own risk. Here are some answers to the most commonly asked questions. Why talk about this now? As you start to plan your budget for 2019, consider factoring in the cost of upgrading or replacing any desktops or laptops running Windows 7. These upgrades and replacements should be rolling several months in advance to transition smoothly and avoid any down time or costly interruptions. Do I really need to take action? When Microsoft ended support for… Read more »


Data Breach – What Would You Do If You Received An Email Like This?

IN THE NEWS – Elijah Digest – November 15, 2018 Imagine receiving an email from yourself telling you that the sender is really a computer hacker that has taken possession of your computer and knows everything about you: your passwords, what websites you go to, and other things that you would prefer to keep private. And, if that’s not bad enough, the hacker now wants money to go away. Would this scare you? It did for one of our clients. Both the CEO & COO received the following email within hours of each other: If you received this email, what would you do? Should you pay the hacker? In most circumstances, the short answer is NO. This particular email was simply a scare tactic to convince them to pay. The prevailing belief is that if you pay them once, you will pay them again – usually with the second payment… Read more »


Better Data Security: Don’t Be Tricked By A Phishing Email

IN THE NEWS – Elijah Digest – November 1, 2018 Every day we get hundreds of emails. Every day, we are pressed for time to get our work done. Every day, we open emails with attachments, sometimes without even thinking. For many, it is simply now a reflex. But, we must be vigilant and cautious of what messages we read. There are hackers and cyber thieves we need to be on guard for. Hackers and other criminals are getting better at trying to gain access to our private information through the use of Phishing email. Phishing is an email that appears to be from a legitimate company asking you to provide sensitive information. This is usually done by a link in an email message that will take you to the company’s website to fill in your information. But, the “company’s website” is actually an image of the real website and… Read more »


October 2018 Is Cybersecurity Awareness Month

IN THE NEWS – Elijah Digest – October 18, 2018 National Cybersecurity Awareness Month is commemorating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online, while increasing the resiliency of the Nation during cyber-threats. Most of us have heard the term Cybersecurity, but what does it mean? Cybersecurity is defined as the protection of internet-connected systems, including hardware, software and data, from cyberattacks. This is comprised of both physical security and application security. One of the most challenging elements of cybersecurity, is the continuous evolving nature of security risks. Historically, we have been reactive to events that have occurred, such as the 2018 attack on Under Armour’s MyFitnessPal application in late February. This cyberattack compromised usernames, email addresses… Read more »