Please ensure Javascript is enabled for purposes of website accessibility

Guillermo Aquino

Don’t let a “ghost” prepare your tax return….avoid being “ghosted” by your tax preparer?

Identity theft knows no limits and every year the IRS warn taxpayers to avoid unethical tax return preparers, known as ghost preparers. Ghosting is a form of identity theft that usually occurs on a dead person for monetary gain. Cyber criminals can often get away with ghosting because it can be months after a person dies before entities like credit reporting agencies, the Social Security Administration, and the IRS receive, share or register death records. Many of us have heard of being “ghosted” after a death, but have you ever been ghosted by your tax preparer?

Unfortunately, many have, and they’re often met with serious consequences. …

read more

Remote Work Poses Data Breach Dangers During Coronavirus Lockdown

There was a time when unexpected events would shut down the world for days or even weeks? Not anymore. Technology has helped create options for people to stay connected through less than ideal conditions. This new social reality, unfortunately, means new attack opportunities for hackers, who have already found ways to use the coronavirus in scams and phishing attempts to steal your usernames, passwords, credit card numbers, money and time.

Employees working remotely can create all sorts of cybersecurity issues, especially when things are a bit chaotic. By doing risky things like logging in from insecure WiFi networks or swapping data unsafely between personal and work devices, remote workers can provide bad actors with the openings that get them right through a company’s cybersecurity defenses. …

read more

UNDER ATTACK:The Global Year in BREACH 2020

2019 was an interesting year for cybersecurity. Ransomware as a service, though around for a while now, really saw a sharp uptick in popularity. Numerous state and city governments were hit with malware. China allegedly hacked the phones of its Uyghur citizens, and hijacked both ASUS update servers and videogame developers to target specific Asian regions. We saw our first major GDPR fine when British Airways getting hit with $230 Million USD and the number of DDoS attacks increased by almost 1000%. Truly it was a great time to be around on the internet.

Fill Out The Form Below To Download The White Paper

[gravityform id=”21″ title=”false” description=”false” ajax=”true”]…

read more

Why “Break-Fix” Works Entirely in the Consultant’s Favor, Not Yours

A question I often get is “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate question if we were talking about your washing machine or car, that’s definitely NOT the right approach to a critical and dynamic IT system that your company depends on; you DEFINITELY don’t want to wait until something “breaks” before you try and fix a problem. One virus or hacker attack or one slip-up can cause permanent data loss, extended downtime, a violation of data-breach laws, bad PR, loss of customers and sales, and a host of other expensive problems.…

read more

Your Business is at Risk. Upgrade to Keep it Secure.

Is your business still using outdated systems? Your company could be at risk.

Cyber threats can not only cripple a small and midsize company but also tarnish its reputation. If your company is using outdated legacy devices and running on unsupported versions of Windows operating systems, it’s time to upgrade.

Stay on Outdated Systems and Become a Victim of Cyber Attacks

In 2018, cyberattacks cost businesses an average of $1.1 million per attack. With ransomware attacks and data breaches becoming a norm of everyday life, keeping your computers secure has become a priority for businesses. Hence continuing to use outdated systems is not only going to risk the business but also cost in millions.…

read more

TEK On The Street: Using Burner Phones The Right Way

Smartphones are amazing devices, but they are also a huge privacy problem. Your main phone is inextricably linked to your identity. It tracks your location and might even be listening in on your conversations. Yet, having a phone that can make calls, send text messages, and keep you in touch in case you need help.

Smartphones are amazing devices, but they are also a huge privacy problem. Your main phone is inextricably linked to your identity. It tracks your location and might even be listening in on your conversations. Yet, having a phone that can make calls, send text messages, and keep you in touch in case you need help is pretty essential, which is why you should consider getting a “burner” phone.…

read more

TEKTip #6 Oops I clicked on Phishing Link

This week’s TEKTip gives more insight about email scams. Andrew talks about ManagedTEK’s 4 Step Process on how to recover if you happen to be a victim. If you are using email, you need to be aware of the potential danger behind it.

read more

TEKTip #4 Hate Software Updates?

This week’s TEKTip focuses on the importance of software updates so you can better secure your machine. Remember, it’s not just Anti-Virus that makes you safe. It’s taking care of your updates like these that are vital to your security. Learn your IT hygiene!

read more

TEKTip #3 The Annoying Adware

This week’s TEKTip focuses on software that automatically displays or downloads advertising material, (often unwanted) when a user is online. Andrew uncovers a few ways in which adware is distributed as well as strategies on how to get rid of adware!!

read more

TEKTip #2 Don’t Fall for Phishing Scams

This week’s TEKTip focuses on the fraudulent practice of sending emails with the intention of gathering personal information such as account passwords, credit card information, medical records, and much more! Listen to some of the tips Andrew gives on how to spot Phishing attempts. Don’t fall for it!

read more