Category: Newsletters

ELIJAH Digest | February 7, 2018

IN THE NEWS Subject: Cybersecurity Managed Services – How Secure Is Your Email From Infection? How often do you visit the Web – not just opening a web browser and surfing to your favorite website, but using your email as well? In 2018, less than 5% of all email is managed by an Exchange Server, which means that 95% of all email relies on the internet. Internet mail is defined as opening up a web browser or an Outlook client to access your email. This can include mail from the following sources, as an example: Gmail.com Yahoo.com Sbcglobal.net Comcast.net Outlook.com The question becomes – how secure is your mail? Is there a mail service that is blocking your mail from hackers or from infections? Probably not, unless you are using software specifically for this purpose. One of the software products that can be used for this purpose is Advanced Threat… Read more »


ELIJAH Digest | January 24, 2018

IN THE NEWS Subject: Make Cybersecurity Your 2019 New Year’s Resolution With the arrival of 2019, comes new motivations and resolutions. For 2019, the one thing every computer user should focus on is Data and Cybersecurity. After a long, busy year full of hacks, breaches, and ransomware infections, 2018 ended with an avalanche of fresh cybersecurity news. Weather Channel, for instance, was accused of having its mobile app track user location information for illicit reasons. Also making headlines was Marriott International – having acknowledged that its monumental 2018 breach, which exposed the reservation records of nearly 400 million users, included the loss of 5 million unencrypted passport numbers. Other nefarious schemes continue to proliferate. Hackers have recently started targeting Microsoft Office users through a phishing scheme that pretends to be an Office 365 non-delivery message. A prompt appears asking users to click “Send Again” before leading to a website that… Read more »


ELIJAH Digest | January 10, 2018

IN THE NEWS Internet of Things set for growth in 2019? January is an important month in technology history: the opening of the first underground railway service in London in 1863; in 1927, the first commercial transatlantic phone service was made available; the ordering of the development of a space shuttle program by President Nixon in 1972; and the unveiling of Mac OS X in 2000. In January 2019, the Internet of Things seems poised to really take off (“IoT”). IoT, as defined by Wikipedia, “is the network of devices such as vehicles and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled.” The most common IoT device is your Smartphone. Other examples include wireless thermostats, doorbell cameras, smart watches,… Read more »


ELIJAH Digest | December 13, 2018

IN THE NEWS Data & Email Management How do you communicate with your co-workers and clients that you will be out of the office? Do you take the same care in drafting your out-of-office message that you do with drafting your emails? Here are some of the messages that we have recently received from clients that are out on vacation or traveling for business: “I am out of the office on vacation. Thanks, (name)” “I am out until the 20th.” “I am out of the office with limited access to email and voicemail. My response may be delayed.” “Thank you for your email. I am currently out of the office.” “I am out of the office. I will respond to you upon my return. Thanks.” While it is clear that the person is out of the office, there is not much more being conveyed. For example, items 1, 3, 4,… Read more »


Elijah Digest – November 29, 2018

IN THE NEWS Manage Your IT – Time to plan for the demise of Windows 7 On January 14, 2020, Microsoft will stop supporting one of the world’s favorite operating systems, Windows 7. That’s 415 days from today. On that date, Microsoft will no longer issue security patches or fix flaws and bugs. You can still run the Windows 7 operating system – but be at your own risk. Here are some answers to the most commonly asked questions. Why talk about this now? As you start to plan your budget for 2019, consider factoring in the cost of upgrading or replacing any desktops or laptops running Windows 7. These upgrades and replacements should be rolling several months in advance to transition smoothly and avoid any down time or costly interruptions. Do I really need to take action? When Microsoft ended support for the Windows XP operating system in 2014,… Read more »


Elijah Digest – November 15, 2018

IN THE NEWS Data Breach – What Would You Do If You Received An Email Like This? Imagine receiving an email from yourself telling you that the sender is really a computer hacker that has taken possession of your computer and knows everything about you: your passwords, what websites you go to, and other things that you would prefer to keep private. And, if that’s not bad enough, the hacker now wants money to go away. Would this scare you? It did for one of our clients. Both the CEO & COO received the following email within hours of each other: If you received this email, what would you do? Should you pay the hacker? In most circumstances, the short answer is NO. This particular email was simply a scare tactic to convince them to pay. The prevailing belief is that if you pay them once, you will pay them… Read more »


Elijah Digest – November 1, 2018

IN THE NEWS Better Data Security: Don’t Be Tricked By A Phishing Email Every day we get hundreds of emails. Every day, we are pressed for time to get our work done. Every day, we open emails with attachments, sometimes without even thinking. For many, it is simply now a reflex. But, we must be vigilant and cautious of what messages we read. There are hackers and cyber thieves we need to be on guard for. Hackers and other criminals are getting better at trying to gain access to our private information through the use of Phishing email. Phishing is an email that appears to be from a legitimate company asking you to provide sensitive information. This is usually done by a link in an email message that will take you to the company’s website to fill in your information. But, the “company’s website” is actually an image of the… Read more »


Elijah Digest – October 18, 2018

IN THE NEWS October 2018 Is Cybersecurity Awareness Month National Cybersecurity Awareness Month is commemorating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online, while increasing the resiliency of the Nation during cyber-threats. Most of us have heard the term Cybersecurity, but what does it mean? Cybersecurity is defined as the protection of internet-connected systems, including hardware, software and data, from cyberattacks. This is comprised of both physical security and application security. One of the most challenging elements of cybersecurity, is the continuous evolving nature of security risks. Historically, we have been reactive to events that have occurred, such as the 2018 attack on Under Armour’s MyFitnessPal application in late February. This cyberattack compromised usernames, email addresses and… Read more »


Elijah Digest – October 04, 2018

IN THE NEWS Latest website cybersecurity attack affecting over 50 million users: Facebook On Friday, September 27, 2018, the website www.facebook.com was hacked due to an application vulnerability. Approximately 2.5% of Facebook’s more than 2 Billion monthly active users were affected. This equates to over 50 million people. Facebook says that the attackers could see everything in the victim’s profile. Facebook isn’t alone as many sites were attacked by hackers in 2018. This list includes British Airways, Orbitz, and Under Armour. Complete list can be found at: https://en.wikipedia.org/wiki/List_of_data_breaches Do you think that your website isn’t vulnerable? So, let’s ask a question. Is it True or False: Cyber Hackers only access large websites. Answer: False. Even a small website can generate a substantial amount of money Cybercriminals and web hackers can make money with your compromised website by distributing malware, spam and can set up e-mail spam servers and phishing sites.… Read more »


Elijah Digest – September 20, 2018

IN THE NEWS Employee Data Theft As employers, we usually train then share our company secrets and documentation with our employees. We also inform our employees that regardless of where the Documentation and Intellectual Property is stored – on computers, tablets, smart phones, etc. – this information and data belongs to the company and that it needs to be safeguarded. Despite this, roughly two thirds of all departing employees take company data when they leave. When an employee that quits, gets fired, or otherwise leaves, AND keeps company data, it is called Employee Data Theft and is often the subject of law suits and violations of law. In their final days, employees can often deliberately or inadvertently retain possession of client lists, trade secrets, and other important information. Some employees are predictably more likely to engage in fraud, embezzlement and other types of misconduct. Disgruntled employees, who may not be… Read more »