PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

Blog Articles from ATS Communciations

The Benefits of Antivirus and Email Filtering

December 16th, 2022 by admin

A fish hook in a credit card. Phishing concept.

Antivirus and email filtering are important tools in keeping your computer safe from malicious activity. By regularly performing security scans and monitoring incoming emails, these programs can help protect you from online threats such as viruses,...

Read Full Story »

Posted in: Security

Educating Customers on the Importance of Cybersecurity Insurance

September 21st, 2022 by admin

A blue lock with a human hand pointing at the lock

Leading MTSP Shares How to Protect Businesses from Cybercrime CONCORD, CA - ATS Communications, a leading managed technology services provider (MTSP), is educating small to mid-sized business (SMB) owners on how they can protect their organizations...

Read Full Story »

Posted in: Press Releases

Attackers Have Successfully Hit the Nation’s Largest Corporations - Their Onslaught on SMBs Will be Worse - Are You Prepared?

August 6th, 2021 by admin

A person in a hoodie holding a laptop with one hand while the other draws a USB closer, with a stylized binary overlaid on top of the figure

Leading Managed Technology Services Provider Shares How SMBs Can Protect Themselves from Cyberattacks and Ransomware Threats CONCORD, CA – ATS Communications, a leading managed technology services provider (MTSP), recently shared that some of...

Read Full Story »

Posted in: Press Releases

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

Stylized stream of meta data against a dark background

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected...

Read Full Story »

Posted in: Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Security

Does Fintech Pose a Threat to Cybersecurity at Financial Services Companies?

January 29th, 2018 by admin

Sample portfolio summary being displayed on an iPad

Financial services companies should embrace a healthy dose of caution when implementing new fintech in their business. Fintech, or any technological innovation in the financial sector, is not inherently more or less secure than any other new technology,...

Read Full Story »

Posted in: Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Security

New Phishing Technique Hijacks Legitimate Conversations

October 24th, 2017 by admin

Hand holding up a clip-art style yellow lock, against a blue field of 1s and 0s

A new spear phishing technique, being used in a hacking campaign called FreeMilk, takes advantage of a Microsoft Office vulnerability in order to hijack existing email conversations to spread malware to high-profile targets. This new technique phishing...

Read Full Story »

Posted in: Security

Cybersecurity Certification

September 23rd, 2017 by admin

Security

ATS Communications a leading provider of unified communications has announced that the company is certified to provide cybersecurity solutions to SMBs (small to mid-sized businesses) to protect them from the barrage of cyber-attacks that occur every...

Read Full Story »

Posted in: Press Releases

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

Close up of a businessman holding a Microsoft smartphone in his hands

If your business is using 2-factor authentication or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security...

Read Full Story »

Posted in: Security, Knowledge

Cyber Security with ATS

January 27th, 2017 by admin

computer-1500929_960_720

There's been a lot of talk lately about data protection, hackers, best practices for emails and storage - we can understand if you're a bit worried about your business. Much of our work these days runs through networks and servers. Is your business...

Read Full Story »

Posted in: Data, Security, Solutions