Why do hackers want to attack small businesses?

Check out this article on the 5 reasons your small business is a target!

Read Here

Here are some scary statistics for you?  Are you in the red or green?  If so, call us today!

Adobe to pull plug on Flash, ending an era…

Adobe Systems Inc’s Flash, a once-ubiquitous technology used to power most of the media content found online, will be retired at the end of 2020, the software company announced Tuesday

Read More Here: https://bit.ly/2tAFGZw

End Users – Are they the leak?

Ask yourself, how much money will I spend to keep my company safe from hackers?  Most people think they can do this with Firewalls, Antivirus, Backups, etc.

Read hear about who your biggest problem resides with?

5 Types of People You Don’t Want Managing Your IT Solutions

Our team believes that most are unintentionally allowing an attack to happen but if you are spending on the above and not on educating your team are you just throwing money away?

What is Ransomware?

Not sure what Ransomware is?  Read Here to learn!

The Biggest Cyber-security Disasters of 2017: So Far!

Check out this list of the Biggest Cyber-security disasters of 2017

The scary thing is these are the ones that hit the news!  Our team is seeing more and more targeted attacks to smaller businesses with far less resources.

Are you prepared, call or email us to find out using our FREE SECURITY assessment.

Read about the list here

Fish Tank and Hacking!

How’s this for creative hacking!

Use a fish tank control system to get onto a casino’s network and run amuck.

Read more here

Quick Tip: How to create an email template in Outlook

For some this may be a no brainer, but do you send the same emails to people on a regular basis?  Did you know you can create an email template in Outlook so you just click on it and fill in the missing details?
Here’s a simple way to create a template:
  1. Open a new email
  2. Type in the standard information (even highlight the areas regularly changed)
  3. Click on the FILE tab (top left) and choose “save as”
  4. In the dialog box type the file name you want to save the file as
  5. in the “Save as type:” box chose “Outlook Template”
  6. Click Save (NOTE: don’t change the location you save it in!)

To use your template:

  1. Click on the New Items button (next to the New Email button)
  2. In the drop down choose More Items and then Choose Form.
  3. In the “Look In” box (top of the box that pops up) chose “user templates in File System.”
  4. Highlight your template and say open
  5. Voila you have an email template to use!

HP Laptop Users BE AWARE!

HP Laptop Audio Driver Logs Keystrokes

Swiss cyber security firm, Modzero, discovered a keylogging feature present in the Conexant HD Audio Driver that comes preinstalled on 28 HP laptop models. This driver records all keystrokes made on the system and saves the information to a local file that can be accessible to any party or software that is aware of its location. If that file does not exist, the driver will pass all keystrokes in real-time to a local API. The NJCCIC recommends users and administrators of HP laptops that include the Conexant HD Audio Driver Package version and earlier review the Modzero Security Advisory and use the suggested workaround to mitigate this threat until a permanent fix is released.

HIPAA Breach Penalties Start!

Check out the article below. These types of enforcement actions were bound to start!  If you think you’re safe because you’re a small company, be sure to read this.  I doubt many small start ups can overcome a fine like this.  If you’re interested in finding out your status, please call or email us today!  We provide a free security assessment and are able to review your procedures, ensuring you are doing everything in your power to keep your data safe.

Read Here


5 Types of People You Don’t Want Managing Your IT Solutions

5 Types of People You Don’t Want Managing Your IT Solutions

Working with a team of people with varying personalities and skill sets can be a good thing. Diverse people bring different viewpoints, opinions, and perspectives to the table. This oftentimes leads to more innovative outcomes.

When it comes to your IT solutions, hiring the right person is key. But there are some personality types that can implode even the greatest team dynamic. Here are the top five people you would never want managing your IT solutions:

The Know-It-All

This type of person is an attention seeker. They try and “wow” people with their clever remarks and technical knowledge when, in reality, their input isn’t really needed.

Sure, they may know the IT jargon and have the technical prowess to manage your IT solutions. But they’re not that much fun to be around, and will most likely push your buttons too far one day. No thank you.

The Yes Man or Yes Woman

Ah, the people-pleasers. This person is someone who thinks they can do it all – without considering the actual implications of taking on multiple projects and responsibilities. They make promises they can’t keep, which can lead to disappointment and instability. And in the IT realm, repeated mistakes and unfulfilled expectations are simply intolerable.

The Passive-Aggressive Type

Do you leave post-it notes to deal with conflict and avoid those cringe-worthy confrontations? Do you pretend everything’s okay when you’re actually upset or hurt? You may be the passive-aggressive type. This kind of person will make it hard for you to communicate your problems to. When you need IT support quickly and efficiently, you rely on direct, honest answers rather than a phony response.

The Gossip

This type of person goes without much explanation. They spread rumors about others (oftentimes behind their backs) and bend the truth for their own enjoyment. Whether its for the sake of entertainment, to cover up their own insecurities, or to feel a sense of self-importance – the office gossip is someone you’d never want in charge of your technology.

Just imagine the power they’d have being responsible for protecting your personal information!

The Control Freak

AKA type A personalities. Competitive, self-critical, and (at times) hostile, these people tend to overreact to the smallest things. They’re unbending in their approach to problem-solving, even when they’re in the wrong. They’re not a team player, yet they always have to be in the loop.

An IT manager should be someone with exceptional team skills. They’re constantly managing conflicts, negotiating and communicating with their team, as well as making important decisions for continuous improvement.

At Dynamic Strategies, we’re dedicated to providing quality IT solutions and support – without any of the emotional baggage. Get in touch to find out what makes us great to work with.