July 7, 2020

iTecs Dallas helps you keep infections at bay, Covid and otherwise

One of the most valuable reasons for working with a professional IT team is that they have the know-how to keep you as safe from infections as possible. And in these times of pandemic, that also means taking every precaution possible to keep germs at bay when they are around you.

Adapting to the current environment means thinking outside the box and finding innovative ways of conducting business while still providing exceptional customer service. With our service model, we strive to provide proactive solutions to your IT needs. This approach helps reduce stress and allows for more vigilance. It is impossible to prevent all IT related issues, but when systems are monitored in a preventative manner, dealing with any issues that arise becomes less invasive in day-to-day operations.

While many employees are still working from home, being able to solve issues remotely has become a key element in our business. This, combined with our customized cloud service solutions, allows us to keep a safe social distance while providing IT support. In the event that onsite support is necessary, our team is equipped with face masks and hand sanitizer to ensure everyone’s safety.

We still have to worry about the other type of infections. The ones we don’t like to think about. The ones that take your files ransom and encrypt all your data. They require the same, if not more, vigilance on everyone’s part to avoid becoming another statistic.

Keeping your system with up-to-date anti-virus software and operating system updates are your first line of defense. However, infections can come at you from many different directions, and it is crucial to be prepared. Perpetrators have become very sophisticated in the way they attack and trust that not everyone will be vigilant to spot their trickeries (ruses?).

Here are some things you can do to minimize risk:

Attend a cybersecurity seminar

iTecs offers virtual cybersecurity seminars to all of their MSP clients who would like to keep their staff informed and knowledgeable about the type of attacks they can experience and how to prevent becoming a victim.

Hover over links

When receiving an email that you were not expecting, before clicking on any links, hover over them to see the web address it is taking you to. If you are receiving an email from Chase but the link is taking you to www.mybankinfo.com/scam then it is more than likely not coming from a legitimate source.

Look at the sender’s email address

Similar to the links, email addresses from malicious sources will look similar to the real ones in an attempt to trick the receiver to trust the email. If the email address looks suspicious, it probably is. It is best to proceed with caution and verify that it is legitimate before clicking on any links or opening any attachments.

Listen to your gut

If you have a feeling that an email is not legitimate, double-check. Triple check. Call the person sending the email and ask if they sent it, call your bank or electric company or third removed cousin who needs money to fly back from vacation after a series of unfortunate events. You can’t ever be too careful. It is much simpler to do some due diligence than undoing the damage that opening an attachment or clicking on a link can do.

Latest Posts

January 7, 2021

Protecting Your Company Against Ransomware

Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.

Read More
December 28, 2020

G Suite VS Office 365

G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.

Read More
November 12, 2020

Why You Should Use a Password Manager, and How to Get Started

The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.

Read More

You have questions, we have answers

What can we help you with?