Blog

The sudden loss of a beloved client and friend James Bredin

It is with profound sadness that I inform you of the sudden loss of our beloved co-worker and friend James Bredin. James passed away yesterday at Massachusetts General Hospital surrounded by his family and loved ones.

James served as the Manager of Imaging Informatics at Newton-Wellesley Hospital from May 2014 through present.

How to foil ransomware

Cybersecurity Tip of the Week

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data.

TOSS C3 CEO, Greg Hanna, Selected to Author a Book on Cybersecurity

We just learned that our CEO, @GregHannaCEO, was selected as one of the authors of a brand new book on cybersecurity and how it is affecting cloud computing and disaster recovery. The publisher is very excited about this very hot topic and has indicated that they expect the book to be a bestseller! The book is going to be titled “Easy Prey” and is currently scheduled for a July 2016 release!

Use STRONG passwords!

Cyber Security Tip of the Week
Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours.

Working from home? DON’T! Until you read this…

Weekly Security Tip

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under our CyberGuard plan, you could accidentally introduce a virus to the company’s network.

Black Friday/Cyber Monday How can you Defend Against Identity Theft

Special Cyber Security Tip
Is identity theft just a problem for people who submit information online?
You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it.

The Importance of The Cloud-based Repository

Backup your backup

One of the most attractive features of cloud technology for the average user is the ability to store documents, files, photos and everything else of importance in a cloud-based repository. This has become such a normal and reliable part of existence for many that the notion of losing stored files is almost inconceivable – until it happens.