Purchasing Computers for Organizational Success

Purchasing Computers for Organizational Success

You know just how essential your company’s IT is, but do you have any idea how your employees feel about the technology you provide them? In order to get the productivity your company needs out of your staff, meeting their computing needs becomes a fundamental requirement. Today, we’ll go over some of the determining factors you have to consider when purchasing computer equipment for your staff.

Continue reading

Cyber Criminals Target Wire Transfers

Cyber Criminals Target Wire Transfers

Do you or a client work in an industry where wire transfers are common? Think real estate (commercial or residential), law, finance, architecture, construction, or manufacturing, to name a few.  If you do, you need to take care EVERY time you are involved in (either sending or receiving) a money transfer via wire.

Yesterday, an Ashton client almost suffered a $130,000 mistake. They called our help desk in the midst of a 45 minute period, late in the business day, when one of their principals was receiving more than 100 spam emails every ten minutes. Think about that; in the course of 45 minutes, one person received over 600 spam emails, completely clogging their inbox, and making it hard for them to find legitimate emails.

Our natural first course of action was to check the spam filter and trace the emails back to their senders. Unfortunately, all of the emails were coming from legitimate (and unique) Office 365 IP addresses, meaning that our only recourse would’ve been to completely lock the filter, meaning that no emails would get through. By resetting the user’s Outlook password, however, the spam stopped. Temporarily. Seemingly, somebody had gotten access to our end user’s credentials. As multi-factor authentication was in place, there was no concern that the bad actor had taken over control of our user’s email account itself, but a mailbox hijacked for relaying purposes is still an issue.

Continue reading

Tip of the Week: 5 Useful Browser Tips

Tip of the Week: 5 Useful Browser Tips

The best way to access the Internet is to use a web browser. Today, we’ll discuss five of the most helpful basic tricks we can think of to help you make the most of your web browser.

Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

Continue reading

Blog Archive

Mobile? Grab this code!

Qr Code

Our Mission:
Ashton Technology Solutions develops proactive business technology strategies to arm our clients for success.

Contact Us

Learn more about what Ashton Technology Solutions can do for your business

Call Us
Beachwood: 216-397-4080
Wooster: 330-439-5730

23625 Commerce Park
Suite 130

Beachwood, Ohio 44122

sales@ashtonsolutions.com