Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Could Your Business Soon Be Threatened By Freelance Hackers?

We’ve all seen advertisements for the websites that offer to connect you with the professionals ready to help you with a specialized task around your home, from repair work to childcare to cleaning services. Unfortunately, cybercriminals have adopted a similar tactic to help market their services, leading to the creation of a sort of hackers’ gig economy on the Dark Web.

0 Comments
Continue reading

Dark Web Gig Work is a Blooming Threat… Are You Protecting Your Business?

It’s a bit of a nightmare scenario for a business, born of watching too many crime thrillers: a criminal syndicate hacks into their systems, wreaking havoc and stealing all their data, while also destroying that company’s reputation. Is this scenario a fantasy? To a point, yes—but not so much as you might think.

0 Comments
Continue reading

What Threat is a Small Business Really Under?

Small businesses face a lot of risks, one obvious one being the threat of potential cybercrime and how its influence can impact their businesses. Let’s consider how these influences have taken shape, and the challenges that small and medium-sized businesses must now face as a result.

0 Comments
Continue reading

Healthcare IT Had a Rough Time in 2020

2020 offered no shortage of challenges for healthcare providers. Besides the obvious issues that COVID-19 posed to the operations, finances, and supply chains that these organizations rely on, cybersecurity issues have played a significant role. Let’s go over some of the security stresses that healthcare providers have been experiencing.

0 Comments
Continue reading

Will Google Revolutionize Internet Privacy?

Your privacy on the Internet matters, even if you don’t think you have anything to hide. Over the last few years, this has become more and more evident as we watch tech giants profit off of understanding the people who use their services. Facebook, Amazon, and Google are among them. Google in particular has made some recent policy changes that are worth understanding.

0 Comments
Continue reading

The Right Practices Will Get Employees Thinking About Their Own Security

People look at their work differently, just as they view their lives differently. The many different perspectives of your staff brings a bit of variance of how they view data security. This isn’t so good for your business as you need to trust them to prioritize the security of your data and infrastructure. Let’s take a look at some of the best practices that you should be training your staff in, which will allow them to protect your data better, and theirs. 

0 Comments
Continue reading

How Can the Zoombombing Issue be Solved?

Conferencing has played a crucial role for businesses, and never more than in the past year. Unfortunately, this has presented the opportunity for trolls to join in these remote collaboration efforts, interrupting them with inflammatory and vulgar content. Labelled “Zoombombing”, these attacks have led to the implementation of numerous privacy protections and countermeasures… but the question remains: how effectively do these protections defend a business’ efforts?

As a study has revealed, not effectively enough.

0 Comments
Continue reading

Best Practices for Keeping Your Passwords Secure, Yet Memorable

As the preeminent form of security online, passwords are currently the most important frontline defense to get right in your organization. However, many people often cut corners with their passwords to ensure they don’t forget them, recycling them across their many accounts. Let’s go over a few ways to help your team create secure passwords that they can commit to memory without shortchanging their efficacy.

0 Comments
Continue reading

Why Software Patches Can’t Be Back-Burnered

Your software is an important, even crucial, part of your business’ security considerations. After all, a software title with security issues could be the access point that hackers and scammers need. This is precisely why software updates and security patches are so important to keep up on. Let’s consider this in a little more detail.

0 Comments
Continue reading

How to Resolve the Most Prevalent Security Threat to Your Business

If I were to ask you what you believed was the biggest potential threat to your business’ future, what would your answer be? The correct answer for most is the risk that an employee might let in a threat—intentionally or not. Let’s investigate how this might happen, and what you need to do to stop it.

0 Comments
Continue reading

Cybersecurity Lessons to be Learned From a Spotify Hack

We will often keep an eye on current events to find practical examples to use as evidence in support of our recommended best practices, but a relatively recent Spotify hack has given us a special opportunity. We now have the opportunity to use this one story to reinforce not one, but two such practices. Let’s dive in, shall we?

0 Comments
Continue reading

Remote Workforces Forces Business’ Hands on Security

It was pretty evident from the start of the COVID-19 pandemic that many businesses were not prepared to pivot their operations offsite. Many of these company’s leaders spent the past several years convinced that allowing people to work remotely would sap productivity in unsustainable ways. Cybercriminals have taken advantage of many organizations since then. Today, we will talk about what needs to be done to secure your endpoints when supporting a remote workforce. 

0 Comments
Continue reading

Adobe is Retiring Flash and You Should Too

Adobe Flash, once one of the most utilized pieces of software on the Internet is being retired by the software giant. Support will stop on December 31, 2020 and like any other piece of retired software, you should remove it from any systems you have that still run it. 

0 Comments
Continue reading

Do You Know Which Remote Users Contribute the Biggest Risks?

With so many people working from home right now, businesses have managed to keep their operations going somewhat successfully by using the remote solutions that are available today. While it is fortunate that today’s technology enables businesses to do so, the importance of cybersecurity cannot be understated as remote work is implemented.

0 Comments
Continue reading

Ransomware is Now Even Less Affordable to Consider Paying

We haven’t exactly been shy about sharing our recommendation that a ransomware demand should never be met with payment, but there is now an even more impactful reason not to. This deterrent comes courtesy of the United States Treasury Department, which has released a statement informing businesses of potential fines as retribution for doing so.

0 Comments
Continue reading

Microsoft Thwarts Major Hacking Attempt, For Now

With just shy of a month before the 2020 United States Election, there has been quite a bit of concern over the idea that external interests may try to sway the results—and it seems for good reason. Only recently, Microsoft interrupted a massive coordinated hacking plot that could have altered the very infrastructure needed to support a fair election. Let’s examine this plot, and what Microsoft did, in some more detail.

0 Comments
Continue reading

What’s Involved with a Professional Penetration Test

One of the most valuable things for a business to know, in terms of its cybersecurity, is how vulnerable it is to breaches and exploits. This kind of information can be gathered via a process called penetration testing, or “pen testing.” Let’s go over how the average pen test is conducted to see how these insights are collected.

0 Comments
Continue reading

Tip of the Week: Best Practices to Keep IT Happy

I want to ask you a question: how is your working relationship with your IT provider, whether you’ve contracted another business, or you have your own internal department? If you suspect it isn’t great, there may be good reason for that.

0 Comments
Continue reading

Hackers are Using COVID-19 As an Opportunity

In true form, cyberattacks have trended upward during the COVID-19 pandemic. With so many people working from home, it’s not much of a surprise that some of the most popular hacking tactics are being used, using the worldwide pandemic as bait. Today, we identify some of these threats.

0 Comments
Continue reading

What Data Privacy will Look Like in the Future

I want you to step out of your role as a business owner for a moment and see yourself once again as the average consumer. How concerned are you that so many businesses have collected and are now storing your personal data, and that you have no control over its privacy? If you feel at all uneasy, you’re not alone… 87 percent of Americans feel that data privacy is a human right in these modern times.

0 Comments
Continue reading