December 6, 2018
When you desperately need IT support, who do you call? In this age of digital IT transformation and Hybrid IT environment, managing IT assets and support services has become critical for every organization. Whether you are a company of 500 or of 5 employees, IT support is essential to meet the tech needs of your…
January 5, 2018
What You Need to Know about Meltdown and Spectre What are Meltdown and Spectre? Meltdown and Spectre and are side-channel vulnerabilities that enable attacks based on information gained from the physical implementation of almost all CPUs manufactured since 1995. Essentially, normal interactions between operating system memory management and CPU optimization technologies could allow attacks…
November 21, 2017
The Internet is a powerful and sometimes scary tool that harbors education and mystery, while providing users anonymity for a price. Yes, the Internet may appear as a place for positive recreation and relaxation; however it also contains many dangers, such as ransomware, that can easily destroy computer systems. What is Ransomware and why does…
June 27, 2017
Updated June 28, 2017: New Ransomware, Petya: a global threat Many organizations worldwide are being crippled by a new variant of the Petya ransomware. The new variant, also known as Petrwrap *update: it seems some groups are referring to this outbreak as “NotPetya” and classifying it as a “Ransomworm”, has penetrated a number of vital network…
June 21, 2017
Missed our webinar “Guarding your business against ransomware”? We’ve got the presentation available for download here and the video will be ready shortly. In the meantime, feel free to contact us with your questions on Ransomware and how Layered Security – combined with end user training – can safeguard your business not only from ransomware but many of the…
May 17, 2017
Protect your business from WannaCry and future ransomware threats We’re providing a quick action list to reduce the spread and impact of WannaCry, the ransomware which affected 200,000+ systems in 150 countries starting on Friday May 12. While the situation is very serious, the solution for stopping this breed of ransomware is now clearly documented and…
May 12, 2017
Is your data an easy target for social engineering hacks? For a process called ‘penetration testing’ a credit bureau recently hired a security company (run by a well-known former cybercriminal skilled in a variety of break in techniques) – to devise ways to breach security in their IT systems, to look for openings in…
April 5, 2017
Making the most out of customer satisfaction surveys. Internal QA scores and customer satisfaction surveys don’t always reach the same conclusions. For example, an end-user customer at a hospital has trouble logging into his medical application. He calls up the help desk. The agent checks the customer’s user enrollment. He discovers the ID in…
March 16, 2017
3 easy ways to get more from your tech support Hi-tech product & service companies recognize that providing technical support is not just to address user issues in areas such as installation, connectivity, compatibility or product registration. It’s a great place to harness and mine valuable customer insights and product data. With the proper attention to data collection…