Category: Newsletters

Robocalls – Are they Legal?

IN THE NEWS – ELIJAH Digest | April 18, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A Robocall is an automated telephone call which delivers a recorded message (as if from a robot), typically on behalf of a political party or telemarketing company. In 2017, 5% of all cell phone calls were robocalls. In 2018 the number rose to 30%. In 2019, the number is expected to rise to 50% and have a major impact on data and cybersecurity. So, are these legal? The short answer is yes. The Federal Telephone Consumer Protection Act of 1991 allows for the non-commercial robocalls to most residential telephone lines. After receiving more than 215,000 consumer complaints in 2014 alone, the U.S. Federal Communications Commission (FCC) strengthened and clarified its regulations protecting consumers from unwanted robocalls and spam emails and texts. The Commission issued a package of declaratory rulings in June 2015 that… Read more »


What Are The 3 Key Things You Should Be Doing For Your Company’s Cybersecurity?

IN THE NEWS – ELIJAH Digest | April 04, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. From a one person business to a 10,000+ person business, Cybersecurity applies to companies of all sizes. Not only do all businesses need it, but most businesses need to improve it. Cyber criminals and hackers are getting more creative and aggressive every day, and the average cybersecurity team is struggling to keep ahead. So, what should you do today? Plan All businesses need to develop a plan for a potential cyber-attack. But what works for one business may not work for the next business. One size does not fit all. There are several guidelines that need to be considered before creating a plan. You also need to understand the business, how it works, and where your critical business operations fit into it. Do you need to protect customer data? Or your data? Do… Read more »


Data Breach – Can it really happen to you?

IN THE NEWS – ELIJAH Digest | March 21, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. A data breach can happen to any company, even if they have security systems protecting their network. One of the largest sources of data breaches stems from employee errors – usually employees that do not even realize that what they are doing is hazardous. Recently, an employee at a medium-sized company decided to copy photographs and downloaded documents from his smart phone to his company computer. He attached a USB cable to his computer and connected it to his phone. He copied the photographs and documents to his computer. What the employee didn’t know was that there was a malware infection imbedded in one of the documents that started the process of the data breach for the entire company. The employee did not have any security software on the smartphone. In just the… Read more »


Email Spoofing – Is the email really from the person you think it is from?

IN THE NEWS – ELIJAH Digest | March 7, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. We’ve all received scam emails from strange addresses and fake accounts. By now, these messages are easy to spot. What’s tougher and more worrisome, is email spoofing—defined as when a hacker purposely alters part of an email or email address to make it appear as though it was written and transmitted by someone else. Often, the sender’s account and/or domain name are formatted to appear as if the email is coming from a legitimate source. Cybercriminals can easily create an email address that, upon quick glance looks exactly like yours: president@nnyompany.com instead of president@mycompany.com. Some hackers can even temporarily take over your email domain, sending spam messages from your actual address that you might not notice unless a client or contact points it out to you. The toughest email spoofs to combat are… Read more »


What is Computer Forensics?

IN THE NEWS – ELIJAH Digest | February 21, 2018 On December 1, 2006, the Federal Rules of Civil Procedure was amended to formally allow for electronic data discovery in litigation cases. Computer Forensics is defined as the analysis of computer hard drives (or the analysis of digital media), where the examiner searches for company data, intellectual property, internet history, and can even find hidden files on a hard drive. Additional work may include the investigation of email messages, to verify that they are not tampered with, forged, or deleted. Call logs, documents, are also included. Data recovery from GPS units, phone systems, car computer systems, game consoles, iPods, iPads, Tablets, MP3 players, USB flash drives, SD cards, smartphones. Recovery of data may include missing/deleted ( by now, most people realize that even if you delete a document from your computer, a forensic examiner should be able to recover it)… Read more »


Cybersecurity Managed Services – How Secure Is Your Email From Infection?

IN THE NEWS – ELIJAH Digest | February 7, 2019 How often do you visit the Web – not just opening a web browser and surfing to your favorite website, but using your email as well? In 2018, less than 5% of all email is managed by an Exchange Server, which means that 95% of all email relies on the internet. Internet mail is defined as opening up a web browser or an Outlook client to access your email. This can include mail from the following sources, as an example: Gmail.com Yahoo.com Sbcglobal.net Comcast.net Outlook.com The question becomes – how secure is your mail? Is there a mail service that is blocking your mail from hackers or from infections? Probably not, unless you are using software specifically for this purpose. One of the software products that can be used for this purpose is Advanced Threat Protection. This software, offered by… Read more »


Make Cybersecurity Your 2019 New Year’s Resolution

IN THE NEWS – ELIJAH Digest | January 24, 2019 With the arrival of 2019, comes new motivations and resolutions. For 2019, the one thing every computer user should focus on is Data and Cybersecurity. After a long, busy year full of hacks, breaches, and ransomware infections, 2018 ended with an avalanche of fresh cybersecurity news. Weather Channel, for instance, was accused of having its mobile app track user location information for illicit reasons. Also making headlines was Marriott International – having acknowledged that its monumental 2018 breach, which exposed the reservation records of nearly 400 million users, included the loss of 5 million unencrypted passport numbers. Other nefarious schemes continue to proliferate. Hackers have recently started targeting Microsoft Office users through a phishing scheme that pretends to be an Office 365 non-delivery message. A prompt appears asking users to click “Send Again” before leading to a website that appears… Read more »


Internet of Things set for growth in 2019?

IN THE NEWS – ELIJAH Digest | January 10, 2019 January is an important month in technology history: the opening of the first underground railway service in London in 1863; in 1927, the first commercial transatlantic phone service was made available; the ordering of the development of a space shuttle program by President Nixon in 1972; and the unveiling of Mac OS X in 2000. In January 2019, the Internet of Things seems poised to really take off (“IoT”). IoT, as defined by Wikipedia, “is the network of devices such as vehicles and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled.” The most common IoT device is your Smartphone. Other examples include wireless thermostats, doorbell cameras, smart watches, Amazon… Read more »


Data & Email Management

IN THE NEWS – ELIJAH Digest | December 13, 2018 How do you communicate with your co-workers and clients that you will be out of the office? Do you take the same care in drafting your out-of-office message that you do with drafting your emails? Here are some of the messages that we have recently received from clients that are out on vacation or traveling for business: “I am out of the office on vacation. Thanks, (name)” “I am out until the 20th.” “I am out of the office with limited access to email and voicemail. My response may be delayed.” “Thank you for your email. I am currently out of the office.” “I am out of the office. I will respond to you upon my return. Thanks.” While it is clear that the person is out of the office, there is not much more being conveyed. For example, items… Read more »


Manage Your IT – Time to plan for the demise of Windows 7

IN THE NEWS – Elijah Digest – November 29, 2018 Manage Your IT – Time to plan for the demise of Windows 7 On January 14, 2020, Microsoft will stop supporting one of the world’s favorite operating systems, Windows 7. That’s 415 days from today. On that date, Microsoft will no longer issue security patches or fix flaws and bugs. You can still run the Windows 7 operating system – but be at your own risk. Here are some answers to the most commonly asked questions. Why talk about this now? As you start to plan your budget for 2019, consider factoring in the cost of upgrading or replacing any desktops or laptops running Windows 7. These upgrades and replacements should be rolling several months in advance to transition smoothly and avoid any down time or costly interruptions. Do I really need to take action? When Microsoft ended support for… Read more »