Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

Continue reading

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

Continue reading

Cyber Criminals Target Wire Transfers

Cyber Criminals Target Wire Transfers

Do you or a client work in an industry where wire transfers are common? Think real estate (commercial or residential), law, finance, architecture, construction, or manufacturing, to name a few.  If you do, you need to take care EVERY time you are involved in (either sending or receiving) a money transfer via wire.

Yesterday, an Ashton client almost suffered a $130,000 mistake. They called our help desk in the midst of a 45 minute period, late in the business day, when one of their principals was receiving more than 100 spam emails every ten minutes. Think about that; in the course of 45 minutes, one person received over 600 spam emails, completely clogging their inbox, and making it hard for them to find legitimate emails.

Our natural first course of action was to check the spam filter and trace the emails back to their senders. Unfortunately, all of the emails were coming from legitimate (and unique) Office 365 IP addresses, meaning that our only recourse would’ve been to completely lock the filter, meaning that no emails would get through. By resetting the user’s Outlook password, however, the spam stopped. Temporarily. Seemingly, somebody had gotten access to our end user’s credentials. As multi-factor authentication was in place, there was no concern that the bad actor had taken over control of our user’s email account itself, but a mailbox hijacked for relaying purposes is still an issue.

Continue reading

Blog Archive

Mobile? Grab this code!

Qr Code

Our Mission:
Ashton Technology Solutions develops proactive business technology strategies to arm our clients for success.

Contact Us

Learn more about what Ashton Technology Solutions can do for your business

Call Us
Beachwood: 216-397-4080
Wooster: 330-439-5730

23625 Commerce Park
Suite 130

Beachwood, Ohio 44122

sales@ashtonsolutions.com