• Categories
      No categories were found that matched your criteria.
      • Manufacturers
        No manufacturers were found that matched your criteria.
      • Products
        No products were found that matched your criteria.
          • Blog
            No blog posts were found that matched your criteria.
          Blog Filters
          Picture for blog post 1 Tech Tip and 1 Cyber Alert for your July Tech Update

          1 Tech Tip and 1 Cyber Alert for your July Tech Update

          We have a tech tip and a cyber alert for this month. 

          1)  The tech tip is for users for hosted email, which these days is basically everyone.  If you don't have two factor authentication, you need to check your outlook rules from time to time, because one of the most common things for a hacker to do if they breach your account is to setup a rule in outlook that forwards all your emails to another email they have hacked.  This allows them to capture any password resets you may do as well as learn who you work with so their phishing emails can be more be more effective and gather more emails from your organization that can be used to attempt to hack more people in your company. 

          It is a good idea from time to time to check your Outlook Rules. 

          One of the ways that hackers gain information regarding companies, and how to hack them is they get access to someone’s email account and create a rule that forwards all the email to another email account they have hacked. 

          The easy way to check this is:

          From the home ribbon in Outlook

          1. Click on the rules dropdown half-way across the ribbon
          2. Click on manage rules
          3. If you get a popup, click client
          4. Review the rules and make sure you created them all.  If you see one you didn’t create, especially one sending emails to another email address, please let me know so we can take corrective actions, as it is likely your account has been compromised. 


          2) Your July Cyber Alert: On a global scale, it was discovered that 7 VPN companies inadvertently had exposed their activity logs.  

          The affected VPN are:  UFO, UFO VPN, FAST VPN, Free VPN, Super VPN, Flash VPN, Secure VPN, Rabbit VPN.  These providers were all rebranded from the same (or slightly altered backend).  The data was publicly exposed via a cloud database - ElasticSearch.  It exposed private information such as names, emails, passwords, Bitcoin payments, etc.  If you would like to read a more detailed article here is a good reference.  

          Reach out if you would like to have a conversation reach out and we are happy to weight the options on whether a VPN is right for you.


          (480)678-1353  We help architectural, engineering, and construction companies avoid downtime and cyber threats by executing an IT strategy that ensures their business is protected, productive, and competitive.  

          Leave your comment

          back to top