ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Time-Saving Benefits to Outsourced Email Management

3 Time-Saving Benefits to Outsourced Email Management

You don’t have time to worry about managing your email solution, but it’s still a vital aspect of your business’s operations. You never know when someone will fall for a spam message, and you certainly can’t look over the shoulders of each employee to make sure they don’t. What’s the busy business owner to do? How can you get quality email management without it eating up too much time and effort on your part?

Continue reading
0 Comments
Featured

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

It’s a well-known fact that nothing in this world lasts forever (other than Twinkies), and this pertains to your technology more than perhaps anything else. The same solutions that you’ve been working with for years will also need regular updates and improvements in order to stay relevant to your organization.

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Today’s headlines are peppered with stories of major companies and institutions falling victim to a cyberattack. As a business owner, what’s your response to these gut-wrenching stories? If you write them off as fear mongering and believe that these attacks can never happen to your SMB, well, you’re wrong. They can and it’s up to you to prevent such a disaster.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Hosted Solutions Windows 10 Backup Office Hackers Technology Microsoft Business Computing Disaster Recovery Business Software Network Security Business Continuity Upgrade Workplace Tips Efficiency Mobile Devices Data Save Money Alert Malware Ransomware Email Hardware Microsoft Office Passwords Browser Hacking Server Small Business Computer Quick Tips Employer-Employee Relationship Windows Remote Computing VoIP IT Services Innovation Social Media WiFi Mobility Network Password Virtualization Business Management Social Engineering Internet Facebook Health Managed IT Services Operating System Managed Service Provider Flexibility Work/Life Balance Customer Relationship Management User Tips Google IT solutions Outsourced IT Risk Management Smartphone Private Cloud Productivity Holiday Recovery Productivity Marketing Cybercrime Communication Best Practice Gmail Tech Support Office Tips Networking Data Management Law Enforcement Telephone Systems Smartphones Bandwidth HaaS Data Breach DDoS Application Internet Exlporer Office 365 App Distributed Denial of Service IT Support VPN Hard Drives End of Support Worker Social Networking Fax Server Managing Stress Legal BDR Collaboration Consultant Entertainment Wireless Technology Transportation Memory Internet exploMicrosoft Mobile Device Current Events Mobile Computing Chrome Budget Best Available Politics Bring Your Own Device Computers Advertising Rootkit Wireless Avoiding Downtime Cybersecurity Lithium-ion battery Keyboard Mobile Device Management Firewall Vendor Management Miscellaneous Scalability Network Congestion Encryption Windows 8 Customer Service Entrepreneur USB Two Factor Authentication Public Cloud SaaS Black Market IT Support Notifications Tablet Wi-Fi Going Green Hybrid Cloud Cloud Computing SharePoint Applications Managed IT Services Bloatware Maintenance Electronic Medical Records Troubleshooting Artificial Intelligence Assessment eWaste Remote Monitoring Website Computing Infrastructure Spam Blocking Tools Government Save Time Books Television Environment Shortcut Saving Money Education Settings Big Data Techology Public Computer communications Worker Commute Shadow IT Tablets Files Employer Employee Relationship Social Meetings WIndows 7 Emergency Excel Retail Automobile User Error Hiring/Firing Spam Phone System Patch Management

Blog Archive