Blog

HomeBlogAll Posts
28 06, 2017

GoldenEye / Petya ransomware triggers massive attack worldwide

June 28th, 2017|Categories: Blog, Security|Tags: , , , |

A massive attack, triggered by a version of the GoldenEye or Petya ransomware is currently claiming victims around the world. Unlike other families of ransomware, #GoldenEye does not encrypt individual files, but rather the entire hard disk drive. It then reboots it to prevent the user from accessing that information. When the encryption process is complete, [...]

19 06, 2017

SOREBRECT, Fileless Ransomware with Code Injection Capability

June 19th, 2017|Categories: Blog, Security|

A new fileless ransomware has been discovered in the wild. This ransomware, titled SOREBRECT, injects malicious code into a valid system process (svchost.exe) on targeted systems and then self-destructs in order to evade detection by antivirus. This is unlike more generic "spray-and-pray" ransomware and has been designed to specifically target enterprise systems in various industries. [...]

13 06, 2017

At last, the next Windows 10 CU stops ransomware

June 13th, 2017|Categories: Blog, Security|

Microsoft has been closely watching this new ransomware epidemic and added new features to the second major update of Windows 10 which is called the "Creators Update" — Windows 10 CU for short — which has been rolling out since a few weeks. Presenting new anti-ransomware protection features added in Windows 10 CU, Robert Lefferts, Director of Program [...]

5 06, 2017

DMV Warns Consumers of Fake Ticket Phishing Email Hoax to Collect Personal Information

June 5th, 2017|Categories: Blog, Email Security|Tags: , , , |

In yet another phishing email hoax, the New York State DMV is now cautioning consumers against an email "phishing" campaign. This phishing attempt sends a notice to email users stating they must pay a ticket within 48 hours or their license will be revoked. While the notice is made to appear as if it comes from DMV, [...]

22 05, 2017

Phishing malware attacks target DocuSign Customers

May 22nd, 2017|Categories: Blog, Blog Posts, Email Security|Tags: , , , |

DocuSign, a major provider of electronic signature technology based in San Francisco, admitted that a series of recent phishing malware attacks targeting its customers and users was the result of a data breach at one of its computer systems. The company stresses that the data stolen was limited to customer and user email addresses. The incident [...]

21 12, 2016

Service Announcement >Email Security Migration Notice

December 21st, 2016|Categories: Blog, Managed Services|

Important changes regarding your email security As a valued customer of our email and/or email security products, we are sending you this email to inform you of the coming changes that may affect your services with us. As you may already know, since Intel acquired McAfee, they have decided to no longer continue providing their [...]

3 11, 2015

Microsoft shrinks OneDrive for Office 365 customers

November 3rd, 2015|Categories: Blog, Blog Posts, Cloud Computing|

Microsoft is ending its unlimited OneDrive cloud storage plan and will put a cap of 1TB on storage for Office 365 consumers.The company said its earlier unlimited storage offer had been misused by a few users of its Office 365 Home, Personal or University application, who backed up "numerous PCs and stored entire movie collections [...]

3 11, 2015

Revealed: The top 10 apps that companies hate

November 3rd, 2015|Categories: Blog, Blog Posts|

MobileIron surveyed 6,000 companies that run its software Companies are wary about what employees are doing on their smartphones. Be it data loss or time-wasting, a growing number of employers are actively stopping staff from using certain apps on company-controlled devices.After surveying the roughly 6,000 companies that uses its mobile security management software, MobileIron determined [...]

3 11, 2015

10 years after Hurricane Katrina disaster: IT lessons learned

November 3rd, 2015|Categories: Backup & Recovery, Blog, Blog Posts, Business Continuity, Cloud Computing, Disaster Recovery|

Ten years after Katrina devastated New Orleans, IT pros say being less dependent on physical locations is just one of the keys to ensuring your company doesn’t go out of business when disaster strikes. It’s hard to be truly prepared to take the full impact of a Category 5 hurricane. Ten years ago, in the [...]

2 11, 2015

Windows 10 upgrade cycle has CIOs bracing for (and embracing) change

November 2nd, 2015|Categories: Blog, Blog Posts|

CIOs say the shorter upgrade cycles for the Microsoft Windows 10 operating system are a breath of fresh air. Microsoft’s previous approach of protracted revisions seem antiquated in an era of constantly refreshed cloud and mobile platforms. Windows customers say that while the shift is another sign that the 40-year-old software giant is modernizing its [...]

Load More Posts

From Our Clients

QWERTY's solution-based approach shows care and concern over not only the technology itself but the way we utilize it, ensuring the right solutions (not unnecessary or costly products) are implemented.

Anthony C.