TOSS Wins All 5 IT Categories…Again!

As a leader in Cyber Technology and Security for Law Firms, TOSS Corporation works tirelessly to deliver the best service, support and technology to its clients.

Each year, Lawyer’s Weekly holds its Annual Reader Rankings Awards Contest, where reader’s of the newspaper have an opportunity to vote for their favorite service providers across many industries and categories.

The sudden loss of a beloved client and friend James Bredin

It is with profound sadness that I inform you of the sudden loss of our beloved co-worker and friend James Bredin. James passed away yesterday at Massachusetts General Hospital surrounded by his family and loved ones.

James served as the Manager of Imaging Informatics at Newton-Wellesley Hospital from May 2014 through present.

How to foil ransomware

Cybersecurity Tip of the Week

Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data.

TOSS C3 CEO, Greg Hanna, Selected to Author a Book on Cybersecurity

We just learned that our CEO, @GregHannaCEO, was selected as one of the authors of a brand new book on cybersecurity and how it is affecting cloud computing and disaster recovery. The publisher is very excited about this very hot topic and has indicated that they expect the book to be a bestseller! The book is going to be titled “Easy Prey” and is currently scheduled for a July 2016 release!

Use STRONG passwords!

Cyber Security Tip of the Week
Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours.

Black Friday/Cyber Monday How can you Defend Against Identity Theft

Special Cyber Security Tip
Is identity theft just a problem for people who submit information online?
You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it.

The Importance of The Cloud-based Repository

Backup your backup

One of the most attractive features of cloud technology for the average user is the ability to store documents, files, photos and everything else of importance in a cloud-based repository. This has become such a normal and reliable part of existence for many that the notion of losing stored files is almost inconceivable – until it happens.

The Cloud at Home

Our Home – Moving All Things Into The Cloud
The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper.