ITonDemand Blog

Technology news, alerts, and insights.

Video Conferencing Vulnerability

(Updated 4/20/20) Amidst the Covid-19 epidemic, Zoom has become a popular choice as a video-conferencing application. Both businesses and families are relying on Zoom to provide their connection to the world beyond their homes. As more people are turning to Zoom, questions about the application are growing increasingly.Zoom Frequently Asked QuestionsHow do I get started...

HR and IT; How to Hire and Fire

Imagine ThisAn employee comes into work, goes to log-in at his workstation only to be alerted that his password is incorrect. His email isn’t coming through on his phone. He walks to his boss’s office to notify him of the issue.  He was going to be let go. Except the boss didn’t have that “meeting” scheduled until 11.  Staff changes are tough. There is the onboarding...

Phishing Emails Disguised as Office365 File Deletion Emails

Threat Level: High A recently-discovered phishing scam pretending to be from the "Office 365 Team" is trying to trick users into their log-in credentials. The alert notifies the user of an unusual volume of file deletions and urges users to review the activity. When redirected, the users are encouraged to log-in to a page that is hosted on Azure, increasing the perceived...

Intel Chip Flaw Presents Vulnerability From “Zombieload”

Threat Level: High Intel announced last week, in what seemed to be a busy week for bugs, a critical flaw in their processors dating back to 2011. The flaw is linked to the processor’s “zombie load” function, giving it its name. Zombie load occurs when a computer processor can’t properly process a load of data and needs to ask for help in order to prevent a crash. This...

Office365 Is Not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many systems have some form of data retention, they lack the necessary measures to be considered “disaster...

Microsoft Warns of a “Monster” Computer Bug

Microsoft has announced a vulnerability found in older versions of its Windows Operating Systems. The affected systems include Windows 7, Windows 2003, Windows XP, and Server 2008. This unusual step for Microsoft, patching outdated systems, really hints at the severity of the uncovered vulnerability. Microsoft announced the bug on Tuesday in a blog post saying “future...

What To Do About Windows 7 End-of-Life

Windows 7 End-of-lifeIn case you are unaware — Windows 7 is coming to an end. Microsoft has planned for this for a long time. However, most users have not it seems. According to web analytics vendor, Net Applications, Windows 7 actually saw its user share increase to 38.4% of all personal computers worldwide at the end of February. You may think that Microsoft forcing an...

Beware of TrickBot

Malware attacks are on the rise, but thankfully, so is the vigilance of individuals and IT MSPs.   However the next big threat is on the horizon. On March 14th, the Cybersecurity and Infrastructure Security Agency, a unit of the Department of Homeland Security, released a report on malware called TrickBot.What Is Trickbot?No matter how secure one might think their server...

ITonDemand was created over a decade ago to help support businesses and organizations IT services.  We kept hearing from businesses, like yours, that they just wanted their IT to work. And that is what we do.  We make your IT work for you.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293