Sign up for our Newsletter!

Don't let your business become the next Colonial Pipeline.

If your inbox looks anything like ours it is full of news about the recent cyber attack which ransacked the Colonial Pipeline. In case you did not hear about it (in which case you live under a rock) here's a little recap of what occurred:

A U.S. drinking water treatment facility's cybersecurity was challenged when an unidentified cyber actor that gained access to the facility's supervisory control and data acquisition system. The actors were most likely accessed by finding soft spots in the treatment plants security system, such as weak password security and an outdated operating system.  Several government organizations, including the FBI, Cybersecurity and Infrastructure Security Agency (CISA), Environmental Protection Agency (EPA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), have seen first-hand the cybersecurity criminals targeting and exploiting computer software on operating systems with end-of-life status to gain access to systems that they're not authorized to use. Click here to learn more about how you can protect your business from these criminals. 

Here are our top ten security recommendations so you can ensure that your business doesn’t become the next victim:

  1. - Use multiple-factor authentication.
  2. - Update to the latest version of the operating system (e.g., Windows 10).
  3. - Use strong passwords to protect Remote Desktop Protocol (RDP) credentials.
  4. - Ensure anti-virus, spam filters, and firewalls are up to date, properly configured, and secure.
  5. - Audit network configurations and isolate computer systems that cannot be updated.
  6. - Audit your network for systems using RDP, closing unused RDP ports, applying multiple-factor authentication wherever possible, and logging RDP login attempts.
  7. - Audit logs for all remote connection protocols.
  8. - Train users to identify and report attempts at social engineering.
  9. - Identify and suspend access of users exhibiting unusual activity.
  10. - Utilize the ‘Block and Allow’ list which enables a user to control which other organizational users of TeamViewer may request access to the system.
  11.  

Check out our Cybersecurity Awareness Training Webinar for more info.

*Source: https://us-cert.cisa.gov/ncas/alerts/aa21-042a

Popular posts from this blog

Use the ‘Transparent Note’ App to Get Through Your Next Virtual Meeting or Interview

We're not superhuman, and no matter how hard we try to memorize every talking point or question, we can't work at our best without a little help. Even yet, it appears more impressive, especially on video conversations, if we never have to look away from the camera when interviewing or presenting. Finding a means to glance at both your notes and the video conference at the same time is the solution. We've discovered an app that can assist you with this: It's called Transparent Note, and it's not a play on words.

Political Scams 101: How to Spot and Stop Them

Political scams are becoming increasingly common, especially during election seasons when individuals are more likely to engage with political content. While political phone scams are widespread, scammers use a variety of tactics, from phishing emails to social media impersonations, to exploit public interest in elections and political causes.

What’s New in Microsoft 365 Copilot for 2026: Features You Should Actually Be Using

Microsoft 365 Copilot continues to evolve rapidly, but with every new release comes the challenge of separating real productivity gains from AI hype. If your team is asking which features actually matter, you are in the right place. In 2026, Microsoft has pushed updates that go beyond flashy demos. These enhancements are designed to help teams work smarter, save time, and focus on meaningful outcomes, not just interesting AI tools. Below, we break down the most impactful Copilot updates you should be using today.