ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Time-Saving Benefits to Outsourced Email Management

3 Time-Saving Benefits to Outsourced Email Management

You don’t have time to worry about managing your email solution, but it’s still a vital aspect of your business’s operations. You never know when someone will fall for a spam message, and you certainly can’t look over the shoulders of each employee to make sure they don’t. What’s the busy business owner to do? How can you get quality email management without it eating up too much time and effort on your part?

Continue reading
0 Comments
Featured

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

https://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

It’s a well-known fact that nothing in this world lasts forever (other than Twinkies), and this pertains to your technology more than perhaps anything else. The same solutions that you’ve been working with for years will also need regular updates and improvements in order to stay relevant to your organization.

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Today’s headlines are peppered with stories of major companies and institutions falling victim to a cyberattack. As a business owner, what’s your response to these gut-wrenching stories? If you write them off as fear mongering and believe that these attacks can never happen to your SMB, well, you’re wrong. They can and it’s up to you to prevent such a disaster.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Windows 10 Backup Hosted Solutions Office Hackers Technology Microsoft Business Business Computing Disaster Recovery Software Network Security Upgrade Workplace Tips Business Continuity Hardware Data Alert Malware Efficiency Ransomware Mobile Devices Save Money Email Windows Remote Computing Employer-Employee Relationship VoIP IT Services Microsoft Office Passwords Browser Quick Tips Hacking Server Computer Small Business Innovation Managed IT Services Operating System Managed Service Provider Business Management Social Media Network WiFi Facebook Mobility Password Virtualization Internet Social Engineering Health Communication Office 365 Flexibility Tech Support Work/Life Balance Networking IT solutions Risk Management Bandwidth Data Breach Application Private Cloud Customer Relationship Management User Tips Google Holiday Outsourced IT Cybercrime Smartphone Best Practice Gmail Office Tips Recovery Productivity Data Management Law Enforcement Productivity Telephone Systems Smartphones HaaS Marketing DDoS Internet Exlporer Remote Monitoring User Error Spam Blocking Patch Management Save Time Website Distributed Denial of Service Television VPN End of Support Fax Server Transportation Tablets Legal Collaboration Saving Money Public Computer Social Entertainment Wireless Technology communications Internet exploMicrosoft Employer Employee Relationship Mobile Device Budget Spam Politics WIndows 7 Bring Your Own Device Excel Advertising Wireless Hiring/Firing Hard Drives Lithium-ion battery Phone System App Social Networking Keyboard Mobile Device Management IT Support Miscellaneous Worker Memory Scalability Encryption BDR USB Managing Stress Public Cloud Black Market Consultant Notifications Going Green Current Events Customer Service Wi-Fi Mobile Computing Hybrid Cloud Chrome SharePoint Computers Maintenance Rootkit Applications Best Available Avoiding Downtime Cybersecurity Troubleshooting Firewall Artificial Intelligence eWaste Vendor Management Entrepreneur Computing Infrastructure Government Network Congestion Books Two Factor Authentication Windows 8 Environment Shortcut SaaS Education Settings IT Support Big Data Tablet Techology Cloud Computing Worker Commute Shadow IT Files Meetings Managed IT Services Emergency Electronic Medical Records Bloatware Retail Assessment Automobile

Blog Archive