Latest News
Read the latest posts from the PremierePC blog. Office Updates, Q & A, Solution Highlights, TechBytes, and more
Read the latest posts from the PremierePC blog. Office Updates, Q & A, Solution Highlights, TechBytes, and more
A fully integrated IT solutions provider for local business clients. Serving the Upstate of South Carolina including Greenville, Spartanburg and Anderson counties.
Physical Address: 16 W Pointe Blvd, Mauldin, SC 29662 | 864.335.9223 | Payment Remittance: PO Box 5293 Greenville, SC 29606
Copyright © 2006 – 2023 PremierePC Technology Group. All Rights Reserved. | Terms and Conditions | Privacy Policy
PPC FURTHER Strengthens Your Cyber Security with Internal Vulnerability Scanning
Interested in strengthening your Cyber Security MORE? YES?
PremierePC’s further partnership with Intruder.io provides Internal Vulnerability Scanning on your managed servers.
intruder.io is a $1958 value per year
Intruder.io helps organizations reduce cyber attack exposure by providing effortless cyber security. This solution uses the same engines as the gold standard for vulnerability scanning.
Hackers are constantly looking for security flaws they can use to compromise sensitive information or steal personal data for financial gain, or to cause havoc and disruption for businesses all over the globe. To do this, they make use of a wide range of tools and vulnerability scanners to automate their efforts and find new targets. So, internal vulnerability scanning is an essential process of protecting your business, by finding your security weaknesses before the hackers do.
Your internal systems can be reached with a little extra effort. For example by an email containing a malicious attachment, or link to a web page that exploits known unpatched software on an employee’s device. Similarly, unpatched software or the lack of hardening of internal systems can help an attacker move around internal systems once they’ve gained an initial foothold.
Having a well patched and hardened internal environment will help you avoid this next level of attack, and can be important for compliance with many security standards, or customer security questionnaires. It also helps further protect perimeter systems, by providing next-level information that can’t be gained from the outside.
Intruder’s internal network vulnerability scanner checks your managed servers for common mistakes and configuration weaknesses, missing patches, and encryption weaknesses.
PremierePC is then alerted immediately if a vulnerability is detected; monthly scans are run and reviewed automatically.
How To: GoTo Meeting
We’ve put together a brief guide on GoTo Meeting, the virtual meeting software included in our Hosted Phones subscriptions.
Some basics
What is it?
GoTo Meeting is a professional online meeting software that makes it easy to connect with people any way you want. Some features include:
Security features
Organizers are able to password protect meetings, lock the meeting once you’re in session, dismiss attendees you don’t recognize, give recording access to specific people, share specific content of your recording, set an expiration date on your recording, use a new meeting ID, hide attendees, view this security white paper.
New Users
New User Guide
With the New User Guide, you can learn how to download and sign into your account, overview your account, create a meeting, join a meeting, and use meeting features.
Here are some highlights:
Creating a meeting
To schedule a one-time or recurring meeting, click Create meeting from either the meeting tab of the GoTo desktop app or by navigating to https://global.gotomeeting.com
Meeting Features
Click here to walk through the GoTo Meeting Control Panel
Additional Resources
Want to integrate GoTo and Outlook? Info on outlook integration
Have other specific questions? GoTo offers a wealth of knowledge on their support site https://support.goto.com/meeting
Can’t find what you need? Call PremierePC.
Are you consistently wasting money on credit card fees?
PremierePC was losing money on credit card fees every month. The client pays their invoice, credit card company takes a percentage for themselves, and PPC gets the rest.
We were faced with having to punish the client by raising costs or adding additional processing fees, or finding an alternative.
We found, with GoCardless, how to get easy-to-use, seamless ACH Direct Debit capabilities for our clients, at a MUCH lower fee per transaction. PremierePC is saving $1,200 in fees each month.
See our co-founder, Matthew Rydzfski, discuss the benefits to partnering with GoCardless.
– Matthew Rydzfski
View full article here.
FAKE Ransomware? Really?!
Unfortunately, yes. There are legitimate AND fake ransomware attacks.
Good news is, the end-user needs to take the same precautions to mitigate risks of real or fake ransomware attacks; remaining educated on cyber security is an asset.
Better news, we offer solutions to layer on to protect your environment, as well as Security Awareness Training to educate your end users.
What is ransomware? Ransomware is a form of malware that encrypts files. The attacker then demands a ransom from the victim to restore their access to the data. This is especially dangerous because access to data on computer networks, mobile devices, and servers will all be locked until the victim pays the demanded ransom. For a business like yours, this can make or break you.
Attackers are aware that any sign of ransomware causes panic. Especially when using common attack methods – extortion, blackmail, threats, etc. – that are designed to generate fear in the reader. Attackers rely on this fear and panic to motivate the victim to give into demands regardless of how much money they are seeking.
These attacks have been so successful, the bad guys have realized they can simply create fake ransomware.
Fake ransomware is simply a message stating false information that is sent to an end-user, demanding ransom.
These are often delivered in the form of emails spoofing a known address or pop ups that take focus on your computer and are difficult to close out.
These messages may tell a user their data has been stolen and encrypted and they must ‘click here’ to unlock data, enter credentials to check their account, review what files have been encrypted, etc. Essentially, the attacker does not presently have access to your environment but counts on your panic causing you to click a link which then does provide them access.
These messages may also exploit or blackmail, telling the victim they have videos, pictures, or screen shots of them that do not exist. They will then ask for a payout to delete this sensitive data and keep quiet.
However, none of this is true. These are simply messages used to induce fear and hope the victim pays.
Your organization needs a strong cyber security solution stack, regular end-user education and testing, as well as a plan in the event of an attack. This protocol must prevail even in fear and panic.
Having an IT partner that values and focuses on cyber security in every area of business is crucial. Good thing you do.
Office Closing: Independence Day