PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

The Benefits of Antivirus and Email Filtering

December 16th, 2022 by admin

A fish hook in a credit card. Phishing concept.

Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...

Read Full Story »

Posted in: Security

Educating Customers on the Importance of Cybersecurity Insurance

September 21st, 2022 by admin

A blue lock with a human hand pointing at the lock

Leading MTSP Shares How to Protect Businesses from Cybercrime CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), is educating small to mid-sized business (SMB) owners on how they can protect their organizations...

Read Full Story »

Posted in: Press Releases

Attackers Have Successfully Hit the Nation’s Largest Corporations - Their Onslaught on SMBs Will be Worse - Are You Prepared?

August 6th, 2021 by admin

A person in a hoodie holding a laptop with one hand while the other draws a USB closer, with a stylized binary overlaid on top of the figure

Leading Managed Technology Services Provider Shares How SMBs Can Protect Themselves from Cyberattacks and Ransomware Threats CONCORD, CA – ATS Communications, a leading managed technology services provider (MTSP), recently shared that some of...

Read Full Story »

Posted in: Press Releases

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Security

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Security

Cybersecurity Certification

September 23rd, 2017 by admin

Security

ATS Communications a leading provider of unified communications has announced that the company is certified to provide cybersecurity solutions to SMBs (small to mid-sized businesses) to protect them from the barrage of cyber-attacks that occur every...

Read Full Story »

Posted in: Press Releases

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Security, Knowledge

Cyber Security with ATS

January 27th, 2017 by admin

There's been a lot of talk lately about data protection, hackers, best practices for emails and storage - we can understand if you're a bit worried about your business. Much of our work these days runs through networks and servers. Is your business taking...

Read Full Story »

Posted in: Data, Security, Solutions

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Security

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Red and yellow depiction of a ringing alarm clock with hands at 12:15

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...

Read Full Story »

Posted in: Support, Security, Knowledge

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Security, Knowledge

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Security, Knowledge

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Security