The K.I.S. Blog for Monday, October 16, 2017
Our new radio ad, featuring K.I.S President Jody, and our Sales and Marketing Coordinator Jenna, is now live on 107.5 Kool FM. Playing weekdays at 5:30 and 6:00 a.m. Check out the audio clip here:
The K.I.S. Blog for Monday, August 14, 2017
1. Do not trust the e-mail display name – Do not trust the name that is displayed. If it looks suspicious, don’t open the email.
2. Look, but don’t click – Hover your mouse over any links embedded in the body of the email. If the link address looks strange or nonstandard or you don’t recognize it, don’t click on it.
3. Don’t enable macros in document attachments received via e-mail
4. Check for spelling mistakes – Legitimate messages usually do not have major spelling mistakes or poor grammar.
5. Do not give up personal information – Legitimate companies and financial institutions will never ask for personal credentials via email.
6. Beware of urgent or threatening language – Invoking a sense of urgency or fear is a common phishing tactic.
7. Don’t believe everything you see – Just because an email has convincing brand logos, language, and a seemingly valid email address, does not mean that it is legitimate.
The K.I.S. Blog for Friday, June 30, 2017
The K.I.S. Blog for Monday, June 26, 2017
Recent cyber threats and attacks, such as WannaCry and CryptoLocker, remind us of the importance of having the necessary backups and antivirus in place to protect our information. Different strains of ransomware can spread automatically across all workstations in a network, compromising workstations and servers alike.
KIS IT always recommends exercising extreme caution when you get an email with an attachment you did not ask for. For example, if you see a .zip file in the attachment, never click on it. Instead delete the whole email. Normally no one would send a Zip file. Remember: “If in doubt, throw it out!”
If you are a Managed Services Client of ours, our engineering team routinely patches our clientele’s Windows operating systems, and we are confident that the security measures we have employed will stand up against these types of attacks and our recovery systems would allow us to recover rapidly should you become compromised.
The K.I.S. Blog for Friday, June 23, 2017
Keeping your business protected requires more than just off the shelf software. Our Managed Anti-virus solution delivers enterprise class protection, and is maintained 24/7 by our technical team, keeping your business secure while saving you money.
* Provides a point solution to specific issues
* Requires manual monitoring and maintenance to remain current and effective
* Relies on end-user decisions for operation
* Does not provide consistent version control across desktops
* Does not provide centralized management
* Provides proactive and comprehensive security, monitoring and management
* Centralizes the deployment and updating of software to ensure coverage and consistency
* Automates management processes to avoid errors and reduce costs
* Leverages expert IT skills