Tech Talk

Getting Ready for Windows 7 End of Life (and Server 2008/2008 R2 too)

Posted by Paul Ferdas on Nov 15, 2018 11:02:13 AM

Just four short years ago Microsoft retired its extremely successful Windows XP operating system (OS). Now it is time for your organization to get ready for the end of the next popular and widely used version. The deadline is approaching sooner than you may think, so let’s break down what your business needs to know, and how to prepare for the end of life of Windows 7 (and Server 2008/Server 2008 R2 too).

Read More

Topics: IT Security, Procurement, How to IT, Windows 7, Microsoft End of Life, Server 2008

Meltdown and Spectre Security Flaws - What to Know

Posted by Paul Ferdas on Jan 5, 2018 4:09:49 PM

This week a pair of major security flaws were discovered with the ability to affect all of your tablets, PCs, mobile devices, and cloud products you may own. Named Meltdown and Spectre, these hardware-based bugs have the potential to allow hackers the ability to steal sensitive information like passwords and other personal information through vulnerabilities in modern processors (Intel, ARM, AMD). 

Read More

Topics: IT Security

Is an Information Security Risk Assessment Right for My Business?

Posted by Paul Ferdas on Jan 4, 2018 1:05:00 PM

Unfortunately, most company management still believes that their organization is safe and secure because they are too small to be targeted, are 100% compliant, have never been breached in the past or have already invested resources into staff or other cybersecurity measures – this is just not true...

Read More

Topics: IT Security

Help Ransomware: What to Know About Recent Bad Rabbit

Posted by Paul Ferdas on Nov 7, 2017 12:36:50 PM

A new and major ransomware attack is currently spreading throughout Europe. Although there have only been a small number of reported cases in the US, we wanted to be as proactive as possible and share this information with our valued clients, friends and colleagues. Please read the following information and share it with your family, friends, co-workers and end users.

Read More

Topics: IT Security

What to Know About Recent “Petya” Ransomware Attack

Posted by Paul Ferdas on Jun 29, 2017 11:15:00 AM

A quickly spreading ransomware attack called “Petya” has affected more than 12,000 machines running older versions of MS Windows worldwide.  This new ransomware has hit high-profile targets in multiple countries, including the United States. While Petya has not infiltrated as many machines as ransomware WannaCry did in May, it is more dangerous and has the power to create more damage. Here is what you need to know about this potentially dangerous cyberattack and how to keep you and your organization safe.

Read More

Topics: IT Security

Mobile Device and Laptop Security: 5 Ways to Stay Safe

Posted by Paul Ferdas on May 31, 2017 10:00:00 AM

The greatest strength of laptops, notebooks and tablets are also their greatest weakness – portability. It’s what makes these tools so useful for mobile professionals, but it is also what leaves them so vulnerable to theft. 

Read More

Topics: IT Security, Mobile Devices, laptops

What to Know About the 'WannaCry' Ransomware Attack

Posted by Paul Ferdas on May 15, 2017 1:05:00 PM

A major ransomware attack is currently spreading worldwide, impacting over 100 countries. This attack, called “WannaCry” affects Microsoft Windows systems by exploiting a vulnerability called EternalBlue. Microsoft provided a patch for this in March and you can learn more about it here at Microsoft's blog.

Read More

Topics: IT Security

7 Simple Habits for Data Breach Prevention

Posted by Paul Ferdas on Mar 9, 2017 2:37:29 PM

Self-healing BIOS, self-encrypting drives, and pre-boot authentication are just some of the leading-edge ways cybercriminals are illegally browsing, stealing, destroying or otherwise corrupting company and individuals’ private information.  As the daily news is chock full of headlines of the latest data breach, it is clear the cybersecurity industry is not going to see a decrease in budgetary spending anytime soon.

Read More

Topics: IT Security

5 Symptoms of a Compromised Computer

Posted by Paul Ferdas on Feb 23, 2017 3:15:00 PM

 We all like to think that the Internet is a safe place. Unfortunately email, social media, malicious websites, ransomware and advertisement pop-ups can all pose a threat. Having an antivirus program installed on your computer will help catch and get rid of harmful malware, but it might not catch everything — especially if not installed properly or updated with the latest definitions.

Read More

Topics: IT Security

Do This Now: Seven Things to Protect Your Business from Ransomware

Posted by Paul Ferdas on Dec 6, 2016 3:03:00 PM

The enterprise IT security landscape saw a considerable uptick in the number of ransomware attacks throughout 2016. Although not a new type or style of hack by any means, ransomware has risen in popularity focusing on businesses of all sizes.  Here are seven easy things you need to do NOW to minimize the risk and ensure your organization does not become the next victim... 

Read More

Topics: IT Security, Ransomware

About Lantium

Lantium solves business challenges by delivering customized IT solutions that fit your organization. Dedicated to providing high-quality, cost effective services, we streamline technology to align your IT and business goals with unmatched personalization and responsiveness.

Schedule A Free Consultation


Subscribe to Email Updates

Recent Posts

Follow Me