Social Engineering: What to Look For and Things to Avoid

by Andy Gritzer Around 10 months ago I sent out an email highlighting the various email security threats out there and how to avoid the pitfalls of phishing and impersonation.   Here is that article:  https://mepush.com/email-safety-tips-must-read-every-employee/      The points in my previous article are still valid, but I wanted to update that to include a few other variations our cybersecurity …

MePush CyberSec Symposium 2019 PSA/News Release

MePush CyberSec Symposium 2019 PSA/News Release by Lisa Z. Leighton, 10 Sep 2019 FOR IMMEDIATE RELEASE MePush to Offer Free Cyber Security Seminar to Local Business Owners and Managers MePush, a tech services company with locations in Lewisburg and Bloomsburg, will kick-off Cyber Security Awareness Month by presenting a free seminar to the business community on Thursday, October 3 from …

Under Lock & Key

Securing the castle and the secrets within by Jordan Snook  [RSVP for the October 3rd 2019 CyberSec Symposium] Phishing and account compromise are some of the biggest threats to the security of your company and your data. I’ve assembled a solution that couples together Duo Security, YubiKey physical hardware keys, Azure Active Directory, and LastPass Enterprise to not only protect …

Cyber Insurance: Covering cyber risks and protecting from the inevitable

MePush is proud to announce that Jared Sholley and his team from Sholley Insurance Agency will be at the CyberSec Symposium 2019 where a cyber liability policy or a data compromise/breach protection policy is needed to address cyber-related risks.  Keep in mind that the risk landscape is changing, so these policies are changing also.  Keep an eye out for a …

My Favorite Computer is Your Computer: An introduction into how hackers make money off of small- and medium-sized businesses.

Hackers are notorious in Hollywood for the statement “I’m In!” from notorious shows like Mr. Robot and Criminal Minds to movies like Snowden and The Girl with the Dragon Tattoo. You usually hear the good or bad hacker exclaim this when they’ve “owned the system, followed by explosions or some grand finale sign of rebellion. However, the real world is …

Michael Frauenhoffer Hacks at CyberSec Symposium 2019

            You all remember Mike, right? Since we have a second Mike, we lovingly refer to Mike as M.1.  He’s the hacker we hired (see: https://mepush.com/we-hired-a-hacker/) a few years back.  Mike gathered experience and training in the Air Force, went to Bloomsburg University and studied Digital Forensics there.  He was also active in the Cyber Defense Club and active in …

Email Safety Tips – A Must Read for Every Employee

Email is the #1 Threat Hi, this is Andy Gritzer with MePush.  I just wanted to send out an email to assist with email safety. Unfortunately, email has become the biggest concern regarding virus related incidents.  While there are measures in place to catch most viruses (spam filters and antivirus) the easiest way to prevent them is through proper handling …

Office 365 Email Migration

If your company is moving to Office 365 from an in-house exchange server (hooray!) or from another email system there are a few key things to know as a user. During this transition, your mailbox will be moved to the Microsoft Office 365 systems located in the cloud. If you have an older version of Office on your computer you …

New Cybersecurity Solutions Ready to Deploy!

Many of you already enjoy our QuickWatch solution that manages updates, patching, antivirus, backups and web-filtering on every device in your network. This solution has kept your systems safe from ransomware, viruses, hacking and other security concerns for years. That said, additional layers of security are needed for a robust cybersecurity solution and we have been testing for months. We …