Datto’s Global State of the Channel Ransomware Report featuring President & CEO Ian Evans, E-Tech

By |2020-12-09T15:12:10-05:00December 9th, 2020|Business Continuity Solutions, Cyber Security Awareness, Uncategorized|

On November 19, 2020 Datto invited President & CEO Ian Evans from E-Tech to discuss the stats that came out in 2020 revolving around ransomware and the impact of COVID-19 on businesses reported to MSP’s. We were one of the MSP’s featured.

Datto’s 2020 Global State of the Channel Ransomware Report comprises statistics from a survey of 1000+ global managed service providers (MSP’s). Datto asked us for our insights on the current cybersecurity landscape and the impact that COVID-19 has had, as it relates to the channel. The discussion of the report includes: – How COVID-19 and the shift to remote work has impacted ransomware trends – The various tactics hackers are using and the industries they’re targeting – What the aftermath of an attacks looks like – Ransomware attack prevention and recovery methods And more!>

Top Ransomware Stats of 2020

By |2020-11-19T09:18:44-05:00November 19th, 2020|Business Continuity Solutions, Cyber Security Awareness, Uncategorized|

E-Tech partnered with Datto to deliver a comprehensive report on ransomware. We were part of 1000+ Global Managed Service Providers (MSPs) and industry experts surveyed on the effects ransomware has had over our clients.

We were asked for our insights on the current cybersecurity landscape and the impact that COVID-19 has had, as it relates to the channel. Read the report to learn about current trends around attack frequency, tactics, average ransom/downtime costs, and more.

In this report, you will learn:

  • How COVID-19 and the shift to remote work has impacted ransomware trends
  • The various tactics hackers are using and the industries they’re targeting
  • What the aftermath of an attacks looks like
  • Ransomware attack prevention and recovery methods
  • And more!

Download the report today for the latest ransomware trends, and learn how to best protect your clients!

Can’t view the PDF? Download it here.

Can’t view the PDF? Download it here.

End of Life for Microsoft Office 2010 + Office 2013 on 365

By |2020-11-18T14:20:03-05:00November 18th, 2020|IT Support, Office 365 & G Suite, Uncategorized|

If you’re still running your business on Microsoft Office 2010 applications, your luck is starting to run out. According to Microsoft, Office 2010 has stopped receiving support since October 13th, 2020. Microsoft will also no longer support Office 2013 connecting to Office 365. Now is the time to upgrade to latest version of Microsoft Office, 2019.

What does this mean for you?

You can continue to use Office 2010 without any issues, but after October 13th, you will no longer be provided with technical support, bug fixes, or security fixes for Office 2010 vulnerabilities that may be reported or discovered. This includes security updates which can help protect your PC from harmful viruses, spyware, and other malicious software. Any functionality issues with Office 2013 or earlier connecting to Office 365 will be a billable service as it is no longer supported.

Why should I upgrade?

You might ask, are security and feature updates really that important for my business operations. The answer is a resounding yes!

The well-informed might remember the worldwide cyber attack known as “WannaCry” that struck over 200 000 computers in 2017. This form of ransomware encrypted the computer’s files and demanded ransom payments from companies in order to get them back. How could this happen? WannaCry attacked computers who were still running older Windows operating systems and had not yet been upgraded to the most recent security upgrades.

If you get a security breach, the amount of downtime and recovery could be devastating to deal with especially if you’re a small business or non-profit.

How can E-Tech help?

The best practice with all security risks is to act on them as soon as possible. You can be sure that you’re at risk immediately when the support ends. We can initiate your upgrade seamlessly for you, leaving you stress-free. We encourage you to contact us to to get started.

>

Keeping your iMIS Secure from Recent Vulnerabilities

By |2020-11-18T13:32:47-05:00November 18th, 2020|Hosting, iMIS, IT Support, Uncategorized|

  • 1.1 to 20.1.19
  • 2.1 to 20.2.26
  • 2.49
  • iMIS 2017 SP A to SP U
  • However, there are potential Issues to watch out for: If you are patching the iMIS instance on some versions, you will get a JS script error on the home page of the iMIS Desktop client. You can work around this by removing the charts in the staff site and republishing the home page of the desktop client. There may also be some changes with the UI in the staff site after the patch, but these are purely cosmetic changes with colors and themes. Service Pack W may have issues running some iMIS specific database tools and maintenance utilities. You will have to run those procedures manually if it is necessary. At E-Tech, we have over 25+ years of experience with consulting, managing, and maintaining iMIS. Feel free to Contact Us if you have any questions.>

    You shall not pass! Protecting customer information!

    By |2020-10-30T10:01:50-04:00October 30th, 2020|Cyber Security Awareness, National Cyber Security Awareness Month, Uncategorized|

    personal data is more important than ever. Lots of companies collect information while doing business, and that means when those companies get hacked, that customer info gets exposed to the world. Your smarts, though, can make a difference and help protect those people who trust you with their data. Let’s talk about protecting customer information. First, it’s important to know what you can and can’t collect. You can usually find that information in your handbook, or by asking HR; they should be able to point you to the right rules. It all depends on the laws. Making sure you know ahead of time will save you a lot of headaches later! Second, be aware of possible trouble. Some data, like email addresses, seems harmless enough, but it can be exploited by a scammer. If someone approaches you and asks for customer information, you’ll be the first line of security between an innocent person and someone wanting to steal their identity. Always be suspicious when someone asks for info! Third, check out our infographic for more great tips on customer data protection:Can’t view the pdf? Download it here. PROMO: We are also offering Working from Home Cyber Security Packages starting from $30.>

    Title

    Go to Top