Chat with us, powered by LiveChat

Most Phishing Emails are Pretending to be from Your Own IT Department

As you probably know, phishing is an evil attempt to gain access to your private information – or to destroy your computer network – by sending an email that appears to be from a legitimate source. Often, these appear to be from a business with whom you already have an account, such as a credit card company, and the email requests that you update your information, and provide a link to do so. Clicking that link is like stepping on a land mine.

But the phishing trend for businesses is to send an email regarding a security threat – to play on your fears of dealing with a breach. As of 2015, 78% of known phishing emails were security related, and they posed as the company’s IT department, or its anti-virus vendor. And, of course, opening the link in that email causes the very breach you were trying to avoid.

Please be aware of this, and remind your employees never to open an email, nor click on a link in an email, without knowing the source. They should always check the sender’s email address – that’s usually a dead giveaway. Instruct you employees, that any email regarding a security issue should be forwarded, unopened, to a designated person in the company who is in charge of network security.

For more information about keeping your business secure against phishing, hackers, outages, and all other threats to your computer network, call us at 678-389-6200 or contact us online.

Businesses Robbed Blind

mPoweredIT Ensure Backup & Disaster Recovery_Man on computerWe ran across this disturbing security trend and wanted to make sure all businesses, especially smaller ones, are aware of it. Most business owners or managers assume that if they have a security breach, they’re going to know about it. They imagine systems failing or some other obvious calamity.

But what’s now happening is, on average, businesses are being “robbed blind” for six months before they become aware of the breach. And, 69% of those businesses only found out because an outsider informed them of it, such as law enforcement or a business partner.

The easiest way to prevent being robbed blind, or becoming a victim of any security threat, is to make sure you have real security measures in place, and those measures are constantly updated and monitored to stay on top of evolving threats. This is hard for small businesses, because it can be expensive to devote resources to network security. But, that’s why we’re here! mPowered IT is designed and priced to support small business. Take a look at how we can secure your business for a fraction of the cost of hiring IT staff.

For more information about keeping your business secure against threats to your computer network, call us at 678-389-6200 or contact us online.

Don’t Click that Link – USA Today

mPoweredIT Enforce Managed Security_hacker using computerAs your Managed Services Provider, we like to educate all our clients on best practices for keeping your business safe from hackers. One of the easiest ways for a hacker to wreak havoc on your computers, is for you or your employees to click a link in an email – without first questioning where it came from. You may think you already know not to open a link that looks suspicious, but the criminals who do this for a living have evolved their tactics, so many malicious links do to appear at all suspicious.

Here’s is an excellent article in USA today that really lays out what to look for, and how to avoid devastating your network with one bad click: Don’t click any link before asking these questions

Health IT and Accelerating Innovation



John Mamon, CEO of mPowered IT on Atlanta Business Radio

by CW Hall, Business Radio X

Click to hear the podcast

This week I sat down with experts from the healthcare IT sector. John Mamon is the CEO of mPoweredIT, an outsourced IT company that devotes expertise to the small to mid-sized medical practice, helping them manage their computer hardware, infrastructure, and software needs for far less than it typically costs to employ someone dedicated to these functions within the practice.

John talked about how often, in an effort to save money, small practices place responsibility for managing these facets on a practice manager, a clinician within the office, or even the doctors themselves.  Clearly this can take away from the core function of the office—taking care of more patients.

He shared a number of important concerns that can expose these offices to risk such as HIPAA requirements, downtime of equipment, ACA compliance, and others.  Each of these can create significant cost or loss of productivity when small offices attempt to handle things on their own.

mPoweredIT is able to scale their services to the needs of the practice, providing the full suite of IT management or taking over particular elements on behalf of the practice.  The company also partners with several other health experts who can provide additional support in areas such as billing/revenue cycle management, EMR selection, and others, to allow their clients to maximize productivity and profitability at the same time.

John introduced us to Harvey Shuster, of Emergence, a Georgia Medical Accelerator.  Harvey, a multiple-time entrepreneur, was one of the founders of Peachtree Software among others.  He and his team work with emerging healthcare technology companies, helping them to commercialize and bring to market their devices/technologies more quickly.

Harvey brought along Osama Hashmi, CEO/Founder of VitaminC.  This company adds an additional layer of automation and engagement to EMR systems.  Their software allows providers to contact patients and encourage follow-up visits where appropriate to facilitate care/outcomes while at the same time helping the practice to maximize its potential for seeing patients in need.

VitaminC integrates well with numerous EMR systems and has proven valuable to primary care doctors and specialists such as dermatologists, plastic surgeons, and others.

What you need to know about the End of Windows Server 2003

win2k3endisnearTechnical support and security updates from Microsoft for Windows Server 2003 will end on July 14th.

This means your server will be at a heightened risk for potential attacks and brings in to focus a number of important issues. Check out these three:

Important Issue #1

The hacker community will likely view unsupported systems as compelling targets. The more Windows Server 2003 users that remain after July 14, the greater the risks. Currently, there are millions of businesses running Windows Server 2003. Even the department of homeland security is concerned. Check out what they have to say here.

Important Issue #2compliance

Compliance violations for businesses on version 2003 are imminent. Companies that process regulated data – such as credit card payments or patient medical records – may be out of compliance. This could result in fines, or worse, being cut off from key partners.

Important Issue #3

If you have a security breach, you’re required to report it. A security breach occurs when there is a loss, theft, or other unauthorized access to sensitive information. 47 states now have security breach notification laws, meaning that businesses must immediately disclose a data breach to their customers. If you are breached, how will this impact the trust and integrity of your company? See state laws here.

OptionsSigninCloudsLet us help you keep your business protected and think through your options. Network security, cloud services, and IT support are our specialties.

Learn more about Network Security for:

Small Businesses
Small Schools

Web Analytics