Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs

Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs Sometimes, we kind of miss the oh-too-obvious spam emails that were once the norm. You know, the kind that were supposedly from some usurped royal who needed your assistance to reclaim their rightful place on the throne, or from some absurdly attractive […]

Ashton Solutions Response to Log4J Threat

Ashton Solutions Response to Log4J Threat The following email was sent to all Ashton clients on December 14, 2021 PLEASE READ THIS CAREFULLY, IN ITS ENTIRETY. This is an urgent security bulletin about the Log4Shell security vulnerability making headlines this week.  Ashton Technology Solutions has been monitoring the situation and would like to update you […]

Considering the Current State of Phishing

Considering the Current State of Phishing We will never pass up the opportunity to draw attention to the importance of cybersecurity awareness, as it is a crucial element for any business to consider. One serious issue that has caused significant stress amongst businesses is phishing. Let’s consider some recent statistics to evaluate where we stand […]

April 2nd ZoomBomb Update

Dear Chad- I would imagine that, like many, you’ve recently become intimately familiar with remote work solutions like Teams, Zoom, Skype, Facetiime, etc.  Here at Ashton, we’ve always been big fans of Microsoft Teams, and with our engineers working remotely these days, we’ve come to rely on it even more.  Daily team meetings at 8AM, […]

Windows 7; Still Causing Issues, Still Being Patched

Windows 7; Still Causing Issues, Still Being Patched Millions of people are still using the Microsoft Windows 7 operating system, even though support ended on January 14, 2020. When Microsoft pulled the plug on support, most industry professionals expected there to be some exploits found pretty quickly. It turns out that the very first exploit […]

BYOD Security Tips

BYOD Security Tips The Bring Your Own Device (BYOD) trend continues to rise in the workplace. There are a number of benefits – and risks – that BYOD brings. For it to be successful, you must balance employee freedom and data security. You need a BYOD security policy. You also need to be aware of […]

More Than One Way to Skin a Cat

More Than One Way to Skin a Cat One of the many internet rabbit holes available for exploration is the origin of expressions. A cursory examination of the above expression yields some interesting information. From this site we learn: The version more than one way to skin a cat seems to have nothing directly to […]