December 16th, 2022 by admin
Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...
Read Full Story »
Tags: cyber security, data protection, data security, email, hacking, malware, security, Solutions
Posted in: Security
September 21st, 2022 by admin
Leading MTSP Shares How to Protect Businesses from Cybercrime
CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), is educating small to mid-sized business (SMB) owners on how they can protect their organizations...
Read Full Story »
Tags: cyber security, data protection, hacking, Press Release, ransomware, security, service, Solutions
Posted in: Press Releases
August 6th, 2021 by admin
Leading Managed Technology Services Provider Shares How SMBs Can Protect Themselves from Cyberattacks and Ransomware Threats
CONCORD, CA – ATS Communications, a leading managed technology services provider (MTSP), recently shared that some of...
Read Full Story »
Tags: cyber security, data protection, hacking, network security
Posted in: Press Releases
March 13th, 2018 by admin
The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...
Read Full Story »
Tags: cyber security, hacking, malware, security threats, security
Posted in: Security
February 12th, 2018 by admin
At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...
Read Full Story »
Tags: data protection, data security, hacking, IT Support , IT, security threats, security
Posted in: Security
February 8th, 2018 by admin
A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....
Read Full Story »
Tags: business continuity, business plan, cyber security, disaster recovery, hacking
Posted in: Security
January 29th, 2018 by admin
Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...
Read Full Story »
Tags: cyber security, hacking, IT Support , IT, security threats, security
Posted in: Security
January 16th, 2018 by admin
Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...
Read Full Story »
Tags: anti-virus, hacking, IT Consulting, IT Security, IT Support , IT, security threats, security
Posted in: Security
October 24th, 2017 by admin
A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...
Read Full Story »
Tags: desktop management, hacking, security threats, security
Posted in: Security
September 23rd, 2017 by admin
ATS Communications a leading provider of unified communications has announced that the company is certified to provide cybersecurity solutions to SMBs (small to mid-sized businesses) to protect them from the barrage of cyber-attacks that occur every...
Read Full Story »
Tags: cyber security, hacking, malware
Posted in: Press Releases
July 11th, 2017 by admin
If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...
Read Full Story »
Tags: hacking, IT Consulting, IT Security, IT Support , IT, security threats, security
Posted in: Security, Knowledge
January 27th, 2017 by admin
There's been a lot of talk lately about data protection, hackers, best practices for emails and storage - we can understand if you're a bit worried about your business. Much of our work these days runs through networks and servers. Is your business taking...
Read Full Story »
Tags: anti-virus, cyber security, data protection, hacking, network, spam
Posted in: Data, Security, Solutions
November 23rd, 2016 by admin
In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack.
According to CNET, the Yahoo hack is the largest data breach...
Read Full Story »
Tags: cyber security, hacking, IT Consulting, IT Security, IT, password, security threats, security
Posted in: Security
May 3rd, 2016 by admin
Today we'd like to pass along a critical security advisory to all our customers:
If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...
Read Full Story »
Tags: advice, end of life, hacking, security threats, security
Posted in: Support, Security, Knowledge
March 30th, 2016 by admin
If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...
Read Full Story »
Tags: anti-virus, cyber security, hacking, security threats, security
Posted in: Security, Knowledge
March 23rd, 2016 by admin
Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over.
...
Read Full Story »
Tags: cyber security, hacking, malware, ransomware, security threats, security
Posted in: Security, Knowledge
March 15th, 2016 by admin
Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...
Read Full Story »
Tags: hacking, IT Consulting, IT Security, IT, security threats, security, smart devices
Posted in: Security