Email Safety Tips
Phishing, Malware, Crypto-Jacking and Ransomware – the potential of incautious behavior with regard to emails. You, sitting at your computer right now, might be a threat to the well-being of your organization if you are not very well informed about the potential of incautious behavior with regard to emails. Your emails. If phishing sounds like
Read MoreBah Humbug CYBER ATTACKS Season!
Holidays are here and everyone is browsing the internet shopping and giving the bad guys opportunities to infect your computer. Do not open anything you don’t recognize in your browser to prevent cyber attack. One of the biggest ongoing trends is Cryptominers and crypto-related threats as a whole. Cryptominers have greatly improved their capabilities as
Read MorePCI Compliance- Fraud Prevention
Imagine this scenario: Your business has been moving steadily toward accepting credit card payments, but the bank has declined your PCI Compliance application and you don’t know why. It’s almost as bad as having your credit card declined in front of a line of irate shoppers, isn’t it? Well, no, it isn’t. Especially if you
Read MoreEyes on the Prize: What it’s crucial to focus on in 2018
Eyes on the Prize: The solutions CrafTech can offer its forward-thinking customers in the coming year. Cloud computing, the Internet of Things, advanced cyber-security, information and data protection. This is where the internet is going; in fact, it’s already there. Can you accurately envision all the technologies that could define the success or failure of
Read MoreCould this be for you? – Managed WiFi
Could this be for you? – Managed WiFi If you’ve got customers or clients who spend valuable time on your premises, the answer is yes. Managed WiFi provides WiFi Internet access for guests, students, customers and employees throughout the property. The design will typically include devices such as wireless access points, wireless controllers, switches and
Read MoreMeltdown and Spectre. How can they affect you?
Breaking News: Meltdown and Spectre. How can they affect you? First, what are they? Both Meltdown and Spectre are attacks that exploit vulnerabilities in computer processors. They break down barriers between two parts of your system (user applications and the operating system) and between different processes that are running on it, so that another malicious
Read MoreWhy To Outsource Your In House IT Department
YOUR SUCCESS IS OUR BUSINESS Outsourcing. it’s an attractive idea, but you might have some doubts. Maybe you had a bad experience, or you know someone who did. How can you tell which is the right company for you, the best fit? How do you know who will do the job efficiently, effectively
Read MoreCrafTech Hosted Exchange Email
What’s CrafTech Hosted Exchange email? CrafTech Hosted Exchange Email is a highly available business grade email service that includes SPAM filtering and optionally encrypted email. Look professional to your customers with your business domain name in your email address (Example: user@abccompany.com) Can your email account sync calendar and contacts? CrafTech Hosted Exchange Email can synchronize
Read MoreDoes Your Company Need To Be HIPAA Compliant?
A new rule extends HIPAA compliance requirements to covered entities’ business associates, forcing them to reexamine data security and privacy. Many companies could be considered “business associates” under the new HIPAA compliance rule. These associates include technology services providers such as software vendors, IT support companies, consulting outfits, data processing, companies hosting companies, cloud service providers, as
Read MoreWhat Does Mobile Device Management Mean To You?
What does mobile device management mean to you? Have you come across this in your work place, and do you immediately think of your smartphone? Mobile Device Management (MDM), on the individual and organizational levels, is a way to secure devices from malicious intent. This encompasses laptops, tablets, and smartphones, etc. MDM Security Security of
Read More