Blog

Stay up to date with the latest technology trends, news, and tips

img featured Security Alert Action Required
(Tech) Security

Security Alert – Action Required

Security Alert – Action Required On Monday, January 23rd, CISA officially recognized and posted an advisory for both public and private entities warning against an exploit that brings a high risk of abuse. We wanted to make you aware of this critical exploit in Zoho ManageEngine products. The exploit allows for remote code execution, which

Read More »

#QuarantineReady – Work from Home Tool Kit

Unexpected changes can be challenging to manage. If you are finding the transition into social distancing and remote work hard to navigate, we’ve collected some resources and tools that you may find useful during these times. As always, you can call upon our team to start #makingtecheasy for YOU. Remote Toolkit Resources: • LinkedIn Learning

Read More »

Practical Steps to Help Prevent Identity Theft

[img src=”/wp-content/uploads/sites/1097/2019/04/img-ProvidenceConsulting-PracticalStepstoHelpPreventIdentityTheft-Blog.jpg” class=”aligncenter”] The recent exposure of 763 Million records containing personally identifiable information (PII) made me reflect on a blog post I wrote a few year ago on the importance of freezing your credit. The information is even more important today that it was in 2017. My best advice is to take action for

Read More »

What we are doing about the Meltdown and Spectre security flaws

Here is what WE are doing to address the Meltdown and Spectre global security threats: Performing disciplined patching of everything that we have control over.  This includes any Windows or Mac device that we have a TechCare agent installed on. Monitoring the industry news daily regarding the flaws and risks associated with them. Advising and

Read More »

Equifax – what we must do now!

The September 7th 2017 announcement of the Equifax data breach is a wakeup call that should be heeded not just by those whose data may have been stolen, but by ALL Technology Users worldwide. This attack was predicted, but only in the general sense, like the predictions that California will suffer a massive earthquake sometime in the future. 

Read More »

National Cyber Security Alliance Statement on recent Ransomware Attack

Washington, D.C., May 13, 2017 – The world was hit with a widespread ransomware attack starting Friday morning (BBC, NYT, WSJ). Preliminary reports suggest at least 75,000 computers in 99 countries were affected. The ransomware attack locked the files of impacted systems and demanded payment – $300 in bitcoin – to release the data. Ransomware is

Read More »

BBB warns of phishing scam targeting Netflix customers

WARNING: Hackers are targeting Netflix Customers with new Phishing email Here is how the scam works. Hackers send you an email claiming to be from Netflix. The email usually has the Netflix logo in the body of the message. The letter will read: Dear Customer: We’re having some trouble with your current billing information. We’ll

Read More »

IRS Warns of Last-Minute Tax Related Email Scams

WASHINGTON – March 17th, 2017 — The Internal Revenue Service, state tax agencies and the tax industry today warned both tax professionals and taxpayers of last-minute phishing email scams, especially those requesting last-minute deposit changes for refunds or account updates. As the 2017 tax filing season winds down to the April 18 deadline, tax-related scams

Read More »

Security Awareness For Taxpayers

TAXES. SECURITY. TOGETHER. The IRS, the state of Michigan and the tax industry are committed to protecting you from identity theft. They’ve strengthened partnerships with taxpayers and tax preparers to fight a common enemy – Cyber Criminals!. Working together, they’ve made many changes to combat identity theft, and are making progress. However, cybercriminals are constantly

Read More »

Protecting Yourself from Identity Theft

Cybercrime activity is escalating and shows no sign of slowing down. That’s a fact of life in the early 21st century.  Information stolen from computer systems is used by cyber criminals in a variety of ways, but one of the most common scenarios is to open credit cards or bank accounts on behalf of a

Read More »
Archives
Scroll to Top