working from home

Adjusting to the New Normal

Adjusting to the New Normal is the Only Way to Success As remote working becomes a norm, creating a digital workspace that empowers employees to work with agility and resiliency has become extremely critical. From enabling access to centralized resources from a greater range of devices to allowing seamless, real-time communication across departments, streamlining the file sharing and document management …

Lady Gaga & Springsteen’s Law Firm Hacked

Attackers compromised a law firm, stealing a huge trove of data on A-List celebs. The media & entertainment law firm of Grubman Shire Meiselas & Sacks suffered a vicious cyber attack.  The 756GB in stolen files appears to contain data on dozens of high profile celebs, also including Mariah Carey, Cam Newton and John Oliver. The ransomware attack was perpetrated by a group called “REvil,” also …

cyberattack

Cyber readiness starts with awareness

News emerged in a new report last week that just 10% of European and US firms are “cyber ready”, despite surging attacks. The study from insurer Hiscox — which spanned the UK, US, Germany, Belgium France, Spain, and the Netherlands — should be something of a wake-up call for IT and cybersecurity leaders. SMEs, in particular, are said to be in the …

Proud Sponsors of The Association of Legal Administrators

Invincia Technologies is proud to sponsor the ALA Central Florida Chapter’s signature event, the Business Partner Showcase. Invincia’s executive team, including Scott Dollar and Bill Rutherford, attended the event February 28th at the Tampa Bay History Center. They spent the day showcasing Invincia Technologies IT Serucity services and  networking with Tampa’s top legal administrators. The Association of Legal Administrators (ALA) …

Attack Campaign Using Fake Browser Updates to Deliver Ransomware and Banking Malware

Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware. Sucuri reported that the attackers inject either links to an external script or the entire script code into a compromised webpage. In both cases, this code creates a message box informing the user that a critical error resulted from an outdated version of …

EMAIL SECURITY

Finally – A Complete Email Protection Plan

Email Protection Complete Email Protection Requires a Layered Defense Between 75% and 90% of targeted cyber-attacks start with an email. Email-borne attacks interrupt business operations, cause financial damage, and compromise business integrity. Barracuda protects you by extending traditional email security with a multi-faceted approach that protects all aspects of your email infrastructure. Gateway Defense Layer Stop Advanced Threats Before They …

Microsoft Office 365 outage?

Ensure business continuity during downtime Yesterday, Office 365 experienced a significant outage for more than a day across Europe, leaving customers unable to log in to Exchange Online to read, respond, send, or receive new emails. This isn’t the first time that Microsoft has experienced outages. Just a few months ago, in November 2018, Office 365 users experienced issues trying to log …

Backup and Recovery

Firewall Security Solutions

Any business with an internet and intranet that allows its employees access to the Internet and corporate resources, implement firewall security solutions to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. For ideal network security, a firewall is often installed in a specially designated computer separate from …