PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

Keep Your Business Protected with Dark Web Scanning

March 1st, 2024 by admin

A person with a hoody in a dark room

Businesses face constant threats from cybercriminals lurking in the shadows on the internet. Among the most significant threats is the dark web, a clandestine corner of the internet where illegal activities thrive. It's imperative to stay ahead...

Read Full Story »

Posted in: Security

Improve Security with Remote Monitoring and Management

February 15th, 2024 by admin

A person in a suit holding a digital lock

Businesses face an increasing number of cyber threats in today's fast-paced digital landscape. With the growing complexity of IT infrastructures, ensuring robust security measures has become a paramount concern for organizations of all sizes. ...

Read Full Story »

Posted in: Managed IT Services, Security

How Email Security Can Protect Your Business

November 16th, 2023 by admin

A hand about to press a blue digital lock

In the digital age, email has become the lifeblood of business communication. The channel helps build relationships with clients and make final decisions, and vital information flows through it. However, this essential tool is also a prime...

Read Full Story »

Posted in: Security

Why Multi-Factor Authentication is Essential for Any Business

November 1st, 2023 by admin

A person unlocking their phone with facial recognition

In today's digital age, where data breaches and cyberattacks are rampant, safeguarding sensitive information is paramount for businesses of all sizes. Passwords once considered the primary line of defense, are no longer sufficient in the face...

Read Full Story »

Posted in: Security

How Staff Awareness Training Can Improve Network Security

September 18th, 2023 by admin

Employee looking for network security issues

Let's get real for a moment. Your office space, physically or virtually, is a hive of buzzing interactions, much like a forest teeming with life. However, what's invisible, yet omnipresent, is the undercurrent of network activity that sustains...

Read Full Story »

Posted in: Security

Protect Your Business with Endpoint Protection Services

June 1st, 2023 by admin

A graphical representation of a computer virus spreading through a network

Endpoint protection services are designed to protect computer systems, such as laptops, desktops, and mobile devices, from malicious attacks. Endpoint protection is an important component of a robust security plan because it can stop cyber-attacks before...

Read Full Story »

Posted in: Security

How Email Filtering Protects Your Business from Phishing Attacks

May 23rd, 2023 by admin

A businessman typing on a keyboard and there is a digital overlay over the keyboard with a sheild. Protection concept.

Email filtering is a process used to detect, block or divert emails that contain malicious content, fraudulent material, or spam. It is designed to help protect organizations from email-borne threats and ensure the security of their networks and systems....

Read Full Story »

Posted in: Security

How Video Surveillance Solutions Benefit Your Business

April 25th, 2023 by admin

 A photo of a security camera attached to a building

Video surveillance solutions for businesses are used to monitor and protect facilities, employees, inventory, the public, and much more. These systems provide a variety of features, such as motion detection, facial recognition,...

Read Full Story »

Posted in: Security

The Benefits of Antivirus and Email Filtering

December 16th, 2022 by admin

A fish hook in a credit card. Phishing concept.

Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...

Read Full Story »

Posted in: Security

Why Business Password Management Remains a Struggle

October 11th, 2022 by admin

Close up of hands using laptop and mobile phone, two-factor authentication, cyber security, password protection concept.

Do you think your password is secure? Everyone has their favorite password, which they tend to use everywhere. However, smart people know they shouldn't use something that can be guessed easily, such as 'password' or '12345'; however, once you start...

Read Full Story »

Posted in: Security

Stay Protected Against Any Unwanted Threats or Hackers - ATS Cyber Security Services to Keep Your Business Safe

August 3rd, 2022 by admin

A hacker in a hoodie holding a credit card in one hand and a laptop in another while standing in a server room

Hackers are a growing concern for most businesses. In order to protect against them, it is important to understand what they do and how they do it. While the term hacker may be new, hacking has been around for centuries. Because cyber security is...

Read Full Story »

Posted in: Security

How to Improve Your Remote Workforce's Security and Efficiency

December 31st, 2020 by admin

A man working from home at his desk talking on his smartphone

Many companies have made the switch to remote working this year due to the pandemic, doing their best to adapt to changing work culture. However, the struggle doesn't end with just establishing your remote operations. Now that you've reacted, it's...

Read Full Story »

Posted in: Cloud, Services, Security, Solutions

5 Things Businesses Need for a Successful Long Term Remote Workforce

June 30th, 2020 by admin

A man in a suit working on a tablet and a laptop, with his hands and technology being connected with bright orange dots and white lines that have a sphere in the center of it.

As the mandates for isolation and closure are slowly lifting, many business are finding themselves presented with a new challenge. What do they do with their newly founded remote workforces? While some choose to transition them back into the office...

Read Full Story »

Posted in: Support, Services, Security, Solutions

ATS Communications Provides Cybersecurity for a Remote Workforce

June 9th, 2020 by admin

A businessman working remotely in his home office

With businesses moving to a remote workforce, they face different challenges that they didn't deal with before. One of those challenges is how to keep your network secure while operating under a remote model. Here are some recommendations to ensure...

Read Full Story »

Posted in: Services, Security, Solutions

Be on the Lookout for Rising Number of COVID-19 Phishing Attacks

April 21st, 2020 by admin

A blue digital lock with various connected devices and a person hand pointing at the lock

Hackers will often look to exploit any weakness they can find, whether it is through technological means or through human curiosity and concern. With the rapid rise of COVID-19 across the globe, hackers are ramping up their phishing attack efforts....

Read Full Story »

Posted in: Security

Tips to Stay Productive, Cyber-Safe, and Get the Fastest Service

March 30th, 2020 by admin

A hooded figure representing a hacker is coming out of a laptop screen

ATS has collected tips and actual client experiences & lessons about how to stay productive, cyber-safe, and get the fastest service from us right now. What's Happening Right Now The support load continues to be heavy. Some clients did not shelter...

Read Full Story »

Posted in: Support, Security, Solutions

Email Filtering to Protect Your Business from Phishing Attempts

March 4th, 2020 by admin

Man wearing a white hooded sweatshirt and a mask holding a credit card and laptop

Your business's IT security is critical to its well-being and success. Your company likely stores copious amounts of sensitive data about your finances and your customers' information. Keeping this information protected is critical, and that's...

Read Full Story »

Posted in: Services, Security, Solutions

ATS Protects Your Network From Security Threats

January 16th, 2020 by admin

Blue shield with keyhole providing protection from cybersecurity

Protecting your data networks is one of the most important things your company can do. At ATS, our experience and expertise enable us to bring the most innovative cybersecurity solutions to the table. There are numerous types of cyberattacks,...

Read Full Story »

Posted in: Services, Security

IP Surveillance to Protect Your Business and Employees

January 9th, 2020 by admin

Silver Security Camera with a red light

Network security is a hot topic nowadays, and rightfully so. Protecting your data networks from hackers is one of the most important things your business needs to do. But, has your company taken the necessary steps to protect its physical location,...

Read Full Story »

Posted in: Security, Solutions

The Cybersecurity Workforce Gap and How It's Affecting Businesses

November 21st, 2019 by admin

eyes on a blue background with technology concepts

As cyber-attacks continue to intensify, businesses are having a hard time finding skilled cybersecurity workers to protect their operations. The cybersecurity industry has taken a significant hit with the labor shortage causing many companies to fall...

Read Full Story »

Posted in: Managed IT Services, Support, Services, Security, Solutions

The Importance of Understanding Your Cyber Security Risk Tolerance and Exposure

July 14th, 2019 by admin

Hooded figure in black with technical code

It is common for companies to underestimate their security risks and think that specific attacks could never happen to their business until it happens. While it is always essential to stay prepared no matter the likelihood of an attack,...

Read Full Story »

Posted in: Security, Solutions

How SMBs Are Dealing with Cybersecurity Threats in 2019

June 18th, 2019 by admin

Cybersecurity threat infographic.

Independent market researcher Vanson Bourne surveyed 850 respondents in small- and medium-sized businesses across the globe about cybersecurity. The findings illustrate the perception of their current state of security, versus the reality of the cyber...

Read Full Story »

Posted in: Security

Types of Phishing Attacks: Whaling, Deceptive, Pharming

May 25th, 2019 by admin

Discrete hacker looking for vulnerable code

Phishing attacks occur when communication that appears to be reputable is fraudulent. These sorts of scams are made to extract personal and sensitive information from victims such as social security numbers, addresses, bank information, and more. People...

Read Full Story »

Posted in: Security

The Importance of Cyber Security

May 9th, 2019 by admin

Password and data security lock

Throughout 2018 data breaches were a typical story from corporations of every size. The stories either tell of a breach that happened during the year or they're about ones that occurred years ago. Those common press releases about how their client's...

Read Full Story »

Posted in: Services, Security

ATS Knows Security

January 29th, 2019 by admin

Lock

Your business needs a dependable and robust cybersecurity solution, plain and simple. As technology continues to advance and new threats are coming to the forefront, it is essential to have the proper security and management behind you to ensure...

Read Full Story »

Posted in: Security

Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Shadowy Figure Overlaid with Digital Code on Dark Background

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. ATS offers great network...

Read Full Story »

Posted in: Security

Keeping Your Data Safe

August 10th, 2018 by admin

Keeping Your Data Safe

As technology gets more advanced, so do the bad guys. That’s why at ATS we make your network security our priority and help you avoid disruptions to your operations! From ransomware to the dark web and all the email scams in-between, criminals...

Read Full Story »

Posted in: Security

Managing Automatic Updates: Balancing Security With Convenience

July 10th, 2018 by admin

Business mobile phones and other items on a table

Running automatic updates for applications and operating systems helps protect your company's digital devices, but those updates can harm productivity if not well managed. Unpatched software is the single biggest security risk in the workplace, so it's...

Read Full Story »

Posted in: Security, Solutions

Key Strategies to Boost IT Security in the Workplace

June 20th, 2018 by admin

Conference room

Businesses have more to worry about than ever when it comes to dealing with new forms of cyber-attacks. The shift to a BYOD workplace adds even more challenges to protecting your digital assets. While hardware and software solutions continue to improve...

Read Full Story »

Posted in: Support, Security

Which Industries Are Most Likely to be Targeted with Cyber Security Threats?

May 21st, 2018 by admin

Doctor in white scrubs wearing a stethoscope and with a pocket full of pens

To understand why some industries are targeted in cyber attacks more often than others, it's important to understand what drives hackers and what makes a target appealing. Of the two, hackers are easier to understand: According to a Verizon data security...

Read Full Story »

Posted in: Security

7 Ways to Keep Work Secure on Employee Personal Devices

May 14th, 2018 by admin

Blond-haired business man looking at mobile phone while leaning against a window

Technology improvements have made it easy for employees to get work done on their personal devices from anywhere. However, that freedom comes with additional security risks and requires extra diligence to keep data secure. Safeguarding information is...

Read Full Story »

Posted in: Security

5 Email Disasters: How a Service Like ATS Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Security, Solutions

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Security

10 Cyberattacks Your Business Should Defend Against

March 29th, 2018 by admin

Two CCTV security cameras on a pole with a blue sky behind them

Cyberattacks are a major security concern for any business that uses the Internet. Even if your company doesn't have a website, hackers can go after your email address and business service accounts. Though they represent one of the more severe risks of...

Read Full Story »

Posted in: Security

Cybersecurity and C-Level Execs: Protecting Data While On the Go

March 26th, 2018 by admin

Silhouette of a businessman standing in front of window blinds in an office

While all employees need to be mindful of security, the nature of C-level executives makes them more attractive targets for hackers. That means it's necessary for them to take greater precautions. According to TechRepublic, C-level executives are more...

Read Full Story »

Posted in: Security

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Security

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security

HTTPS: Securely Sending Personal And Private Information

December 28th, 2017 by admin

Stylized graphic with a white lock, blue 1s and 0s in a sphere, and 2 computer monitors

Avoid costly data security breaches by training your staff to check for secure connections when handling private information on the Internet. Secure Hyper Text Transfer Protocol, or HTTPS, is a technology legal, healthcare, and financial businesses use...

Read Full Story »

Posted in: Security, Solutions

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Security

Alternative Employee Device Security: Fingerprints, Facial Recognition, and Iris Scans, Oh My!

October 17th, 2017 by admin

Stylized magnifying glass resting on three oversized fingerprints

So far, 2017 has been an eventful year for increasing access to password-alternative smartphone and laptop unlocking techniques. Notably, Samsung added Face unlocking to the Galaxy S8 line and Apple introduced Face ID on the iPhone X. Of particular note,...

Read Full Story »

Posted in: Security

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Security, Solutions

Adobe Flash: The Rumors of My Death Have Been Greatly Exaggerated...Until 2020

August 29th, 2017 by admin

Finger pressing a pale blue touchscreen of icons against a pixelated background

Adobe Flash, the web content standard the Internet loves to hate, will soon meet its ultimate demise: Adobe will finish phasing out the platform in 2020. Flash, first introduced in the early 2000s, has been on a gradual decline for almost as long as it...

Read Full Story »

Posted in: Security, Knowledge

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

Email application displaying '1 New Message' on a smartphone screen

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses...

Read Full Story »

Posted in: Managed IT Services, Security

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Stethoscope, glasses, and pills resting on a paper ECG readout

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry...

Read Full Story »

Posted in: Managed IT Services, Security

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

White security icon spotlighted on a dark field of colorized programming code

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are,...

Read Full Story »

Posted in: Managed IT Services, Security

Is Your Office Router Secure?

July 25th, 2017 by admin

Netgear ProSafe GS108T router with 4 Ethernet cables plugged into it

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question,...

Read Full Story »

Posted in: Managed IT Services, Security

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Security, Knowledge

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Support, Security

Recent Ransomware Attacks

May 19th, 2017 by admin

cyber attack

As you may have already heard, there was a major ransomware attack across the globe recently. On May 12th, WannaCry/WCry 2.0 infected thousands of computers, taking the user's data hostage and demanding bitcoins to release it. We can't know how many...

Read Full Story »

Posted in: Support, Security

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

White email envelope icon with several red, pink, and gray circles behind it

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat....

Read Full Story »

Posted in: Security

The Battle for Cyber Security

March 27th, 2017 by admin

Cyber Security

We’ve been noticing an alarming trend regarding cyber security. Actually, more so a lack of security. One of the best practices on the frontline of security is your password. Unfortunately, this is an area that a lot of people will gloss over, often relying...

Read Full Story »

Posted in: Services, Security

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

Skull and crossbones symbol drawn with 1s and 0s

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this...

Read Full Story »

Posted in: Security

Cyber Security with ATS

January 27th, 2017 by admin

There's been a lot of talk lately about data protection, hackers, best practices for emails and storage - we can understand if you're a bit worried about your business. Much of our work these days runs through networks and servers. Is your business taking...

Read Full Story »

Posted in: Data, Security, Solutions

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Security, Solutions

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Managed IT Services, Security

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of...

Read Full Story »

Posted in: Security

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Security

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Backup, Security

Surveillance

September 13th, 2016 by admin

Make sure your staff and business is protected from crime with our video surveillance systems. Our surveillance systems are beneficial to any size business. With detail that surpasses analog cameras, you are able to capture events in your office or at...

Read Full Story »

Posted in: Security

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Managed IT Services, Security, Knowledge

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Support, Security, Knowledge

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

Businessman reviewing 3 papers while poised to write on one with a fancy pen

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP...

Read Full Story »

Posted in: Security, Knowledge

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Data, Security

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Security, Knowledge

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Red and yellow depiction of a ringing alarm clock with hands at 12:15

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...

Read Full Story »

Posted in: Support, Security, Knowledge

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

Clip art of a red rotary telephone

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers...

Read Full Story »

Posted in: Security

Network Security

April 12th, 2016 by admin

Protecting vital business information is a priority of any business. ATS can help ensure that your network, users, and data are protected from continually evolving threats.  A firewall is often installed in a specially designated computer separate from...

Read Full Story »

Posted in: Security

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

Clip art of two badges, one red with an 'X' and the other green with a check mark

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks...

Read Full Story »

Posted in: Security

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

Silhouette of a running man carrying a giant 1 Euro coin, against a blue digital cityscape

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed...

Read Full Story »

Posted in: Backup, Security, Knowledge

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Security, Knowledge

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Security, Knowledge

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Security

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Security

Network Security

January 29th, 2016 by admin

At ATS, protecting your business’s valuable information is a top priority. With the help of our industry-leading partners, we deliver high performance network security solutions that help you protect your network, users and data from continually evolving...

Read Full Story »

Posted in: Services, Security

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

'Do Not Enter' traffic sign of a red circle with a white horizontal line

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with...

Read Full Story »

Posted in: Security

Video Surveillance Benefits

December 11th, 2015 by admin

Video Surveillance does so much more than just protect your business and inventory, it also protects your employees and enforces safe work conditions. ATS's video surveillance solutions benefit businesses of every size by providing HD cameras, mobile...

Read Full Story »

Posted in: Security

Video Surveillance

July 15th, 2015 by admin

While video surveillance does help to protect your business from crime, that is not all it does. It also... Protects your staff in case of customer disputes Enforces safe work conditions allows you to see whether procedures and protocols are being...

Read Full Story »

Posted in: Security

CryptoLocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

Example screenshot of having been victim to CryptoLocker

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for...

Read Full Story »

Posted in: Data, Security