Endpoint Detection and Response: A New Breed of Defense

Meet Lucy. She is affectionate and playful. She likes belly rubs and long walks on wooded trails. Lucy is great with kids. She can play ball for hours. Lucy is adorable and loved by many! But if a stranger breaks a window or makes a threatening move toward her family Lucy will bark, claw, and […]

Read More

Top Five Things You Can Do to Protect Your Business Against Ransomware

On Friday, May 7th, a ransomware attack disrupted operations and halted the flow of gasoline, diesel, and jet fuel through Colonial Pipeline. This was the largest cyberattack on an oil infrastructure target in US history. It led to a shutdown of the pipeline carrying 45% of the East Coast's fuel. The disruption inspired panic. It […]

Read More

Windows 7 End of Support is Coming... Are You Ready?

January 2020 may seem far off, but when it comes to the security of your operating system, it’s closer than you think. Beginning on January 14, 2020, the following Microsoft products will no longer be supported:

Windows 7
Windows Server 2008 & 2008 R2
Exchange 2010
Small Business Server 2011

Read More

How to Make Your Staff Part of Your Security Team

There is a direct connection between your company’s security and productivity. How? The more technology downtime you experience, the less time you have to get your work done, and the less available you are to your clients and customers. But here’s the good news: with training and diligence you can turn your employees — all […]

Read More

Think Before You Click: Employees Need to be at the Frontline in the Battle Against Phishing

At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.

Read More

Stay Alert & Foil Phishing Attempts

We regularly see cases of successful phishing attacks. Most of them involve people being conned into sharing valuable personal information with unauthorized parties. This is usually done over email but sometimes involves a phone call.

A frequent scam goes like this. You receive an email from someone claiming to work at an organization you trust or regularly interact with such as your bank or a retailer you often shop with. They seem legitimate because they have likely gathered some accurate information about you from social media, your company website, press releases, or other public means. Since they get a few details right, you may be inclined to believe them. But you must dig deeper to determine if the request is legitimate.

You may be asked for personal information that could be used to access funds — credit card numbers, bank account information, passwords, etc. — or even asked to wire money. All this is done, of course, under false pretenses. And it could cost your business a heap of money and hassle.

Read More

Lessons from the WannaCry Ransomware Attack

You probably heard about the ransomware attack named "WannaCry” that swept the world on May 12, 2017. It was the largest ransomware attack to date, affecting millions of people and crippling businesses in more than 100 countries.

Read More