Omega Network Solutions Blog

Your source for up to date IT news, security notifications, and best practices.

Smishing is the New Phishing!

Smishing is the New Phishing!

6 Tips to spot Smishing Just when we’ve gotten more savvy at recognizing phishing in our email, along comes smishing. You’ve probably already been confronted by this on your phone. Increasingly, cybercriminals are using text messaging (SMS -> SMiShing) to defraud...

Holiday Hackers: What you Need to Know

Holiday Hackers: What you Need to Know

The end of 2020 is (finally) approaching and let’s be honest – we’ve all earned a good vacation after this past year. But while you’re celebrating the holidays this year, don’t forget that cybercriminals aren’t taking time off. In fact, hackers always take advantage...

Cyber Security: Beware of COVID-19 Scams

Cyber Security: Beware of COVID-19 Scams

The COVID-19 pandemic has presented huge challenges for individuals and businesses alike over the past year. Unfortunately, cybercriminals acted quickly to capitalize on the global crisis. Not only is cybercrime on the rise, but new trends are emerging that prey on...

5 Tips to Spot Phishing Attacks

5 Tips to Spot Phishing Attacks

What is Phishing? Phishing scams are designed to collect personal information by luring unsuspecting employees into giving it away by convincingly impersonating well-known brands, such as Microsoft or Netflix. Their goal is to get the target user to click on a URL...

Don’t dismiss disaster recovery for 2017

Over the previous months, you’ve probably heard about new and disruptive trends like virtual assistants, smartphones, and automation technologies. Some of these IT solutions may even be placed on top of your business priority list. However, with floods, fires, and...

Managed services for cyber security

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave...

Chrome and Safari: hackers’ newest tools

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to...

G Suite or Office 365?

With our busy schedules, we all could use more time to ourselves and loved ones. Getting back home in time for a real meal is now a luxury for many. Thanks to productivity tools like Google’s G Suite and Microsoft’s Office 365, we’re able to regain some of our lost...

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and...

Is your disaster recovery plan up to par?

No matter how much we analyze your network activity, or how many cyber-security conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up any disaster recovery plan (DRP), and the...

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look...

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check...