Omega Network Solutions Blog

Your source for up to date IT news, security notifications, and best practices.

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding...

Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your...

Add minutes to your day with email automation

How many routine emails would you say your sales and marketing teams send every day? If it’s not many, is that because you don’t have the resources for mass outreach campaigns? Either way, email automation is the perfect solution to staying in touch with customers and...

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of...

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to...

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that...

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017,...

Office 365 threat comes with new techniques

If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on. What makes it...

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident...

Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why...

Google weighs in on account hijacking

According to experts, passwords shouldn’t be the only way you defend your accounts. After all, hackers have plenty of tricks and tools to steal them. So to help businesses fully understand the risks involved, Google conducted a study on the causes of account...

Make work easy with Microsoft’s new apps

Connections, Listings, and Invoicing are the most recent additions to Microsoft’s software lineup and they’re finally out of the beta testing phase. These apps come with every Office 365 Business Premium subscription and are perfect for companies with fewer than 300...