ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Time-Saving Benefits to Outsourced Email Management

3 Time-Saving Benefits to Outsourced Email Management

You don’t have time to worry about managing your email solution, but it’s still a vital aspect of your business’s operations. You never know when someone will fall for a spam message, and you certainly can’t look over the shoulders of each employee to make sure they don’t. What’s the busy business owner to do? How can you get quality email management without it eating up too much time and effort on your part?

Continue reading
0 Comments
Featured

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

https://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

It’s a well-known fact that nothing in this world lasts forever (other than Twinkies), and this pertains to your technology more than perhaps anything else. The same solutions that you’ve been working with for years will also need regular updates and improvements in order to stay relevant to your organization.

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Today’s headlines are peppered with stories of major companies and institutions falling victim to a cyberattack. As a business owner, what’s your response to these gut-wrenching stories? If you write them off as fear mongering and believe that these attacks can never happen to your SMB, well, you’re wrong. They can and it’s up to you to prevent such a disaster.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Hosted Solutions Windows 10 Backup Hackers Office Technology Microsoft Business Business Computing Disaster Recovery Software Network Security Business Continuity Upgrade Workplace Tips Save Money Data Alert Malware Email Ransomware Hardware Efficiency Mobile Devices Browser Hacking Server Computer Small Business Windows Remote Computing Employer-Employee Relationship Quick Tips VoIP IT Services Microsoft Office Passwords Managed IT Services Mobility Password Virtualization Social Engineering Internet Business Management Health Facebook Operating System Managed Service Provider Social Media Innovation WiFi Network IT solutions Smartphone Risk Management Data Breach Recovery Productivity Private Cloud Marketing Holiday Communication Outsourced IT Tech Support Cybercrime Networking Best Practice Gmail Bandwidth Office Tips Data Management Law Enforcement Application Telephone Systems Productivity Smartphones Customer Relationship Management HaaS DDoS User Tips Google Internet Exlporer Office 365 Flexibility Work/Life Balance Avoiding Downtime Legal Collaboration Wireless Technology Public Computer Entertainment Internet exploMicrosoft Entrepreneur Mobile Device Employer Employee Relationship Bring Your Own Device Budget Windows 8 Politics Advertising Wireless Lithium-ion battery Hiring/Firing Mobile Device Management App Tablet Keyboard Miscellaneous Scalability Encryption Worker BDR Bloatware USB Public Cloud Remote Monitoring Black Market Notifications Going Green Current Events Website Wi-Fi Hybrid Cloud SharePoint Computers Maintenance Applications Rootkit Saving Money Cybersecurity Tablets Troubleshooting Artificial Intelligence eWaste Firewall Social Vendor Management communications Computing Infrastructure Government Network Congestion Books WIndows 7 Environment Two Factor Authentication Spam SaaS Shortcut Excel Education IT Support Settings Hard Drives Big Data Phone System Techology Social Networking Cloud Computing IT Support Worker Commute Shadow IT Files Managed IT Services Meetings Memory Emergency Managing Stress Electronic Medical Records Assessment Retail Automobile User Error Spam Blocking Consultant Patch Management Distributed Denial of Service Save Time Customer Service Television Mobile Computing Chrome VPN Transportation End of Support Fax Server Best Available

Blog Archive