Not sure which way to go? I have the answers…

Pay Up….You’ve been Hacked!

Pay Up….You’ve been Hacked!

It nearly sounds as if it’s out of a movie. Picture it: You boot up your computer, only to discover that all your files have disappeared — and a stranger is holding them hostage until you fork over some dough. It’s one of the latest threats to your network and unlike many cyber threats, the culprits are literally taunting you over what’s been done....

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

We’ve all been there…a quick glance at the monthly phone bill, followed by a second and then the long stare and a raising of the eye brows. ‘Did I really talk for that long?’ ‘He was in Singapore on that call!?! A majority of the time, it’s a slight increase in the monthly bill that draws initial skepticism. But, when the monthly phone bill jumps up to the same...

Blueprint for the Future – AccountingToday Article

Blueprint for the Future – AccountingToday Article

Blueprint for the future SingerLewak is integrating IT and traditional services 03/01/2011 By Seth Fineberg – Accounting Today Click HERE for the article Copied excerpt below: The ERMS practice under which SingerLewak Systems resides is not all about cloud consulting, although, as Green indicated, it’s an area that is receiving a lot of firmwide and...

PROTECT IP Law Won’t Protect…

PROTECT IP Law Won’t Protect…

Summary: This proposed law is stupid AND won’t work AND will break good security procedures that consumers need. Oh, joy. As posted By ZDNet’s David Gewirtz | August 29, 2011 Comedian Bill Maher has this shtick he calls “New Rules”. In New Rules, he makes up a rule he thinks it’d be smart for us to abide by. For example, he says, “New rule: Canadian bacon...

Email and Network Security – a home run approach – cover your bases!

Email and Network Security – a home run approach – cover your bases!

Email security is one of those things that most IT departments are not sure about how to do right. Right, is up to interpretation, though thorough is something that can be more easily attained. I will go over my Home Run approach to securing email in this post. As you may have guessed, the Home Run approach consists of 4 bases of security to cover, to further...