<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Windows 7 Reached End of Life - What Now?

On January 14, 2020, Microsoft Windows 7 reached end of life.  What does this mean?  Microsoft is no longer providing technical support, software patches, or security updates for Windows 7.  If your firm is still running on Windows 7, you are probably questioning – what do I do now?  Windows 7 will still work, however, it is strongly recommended to update your systems to the latest software, such as Windows 10, as soon as possible.  

2019 Year in Review

2019 was yet another successful year of innovation and development here at Tabush Group.  We launched a new service, continue to innovate Boxtop, and also provided meaningful industry insights.  As we kick off 2020, we reflect on 2 topics that were the most popular and compelling to you.

Professional Development at Tabush Group

As a leading provider of solutions in the technological landscape, we are proud of our continuous efforts to innovate.  Our team strives to improve who we are, what we do, and how we enact change.  We are not only empowered to take risks but are encouraged to act and grow in partnership with one another.

With innovation at our very core, we champion the development of our company through the growth of our employees.  At Tabush Group, employees hone skills necessary to excel in their careers and collaborate with other departments to gain a wider depth of knowledge.

What is Life Like at Tabush Group?

Our core values are intrinsic to us: we believe in a team-centric environment, in which our coworkers value and share each other’s unique talents and passions. We are founded on integrity, innovation, and most importantly, care for our employees and clients. Whether you are a network engineer, helpdesk technician, or business manager at heart, Tabush Group has a place for you. 

On any given day, you might find us leading change in technology solutions while planning our next team event. At Tabush Group, we are committed to collaboration, employee wellness, and our community. We are built with a work-well, be-mindful mentality and exercise awareness of the world around us.

Your Business May Be at Risk of a Ransomware Attack

“The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over.”  Once a cybercriminal is in your network, they start demanding a ransom.  Immediately, questions arise: What exactly is ransomware?  What should we do now?  Why were we targeted?  How could we have prevented this?

Ransomware attacks are on the rise and cybercriminals have increasingly started to target all types of businesses, no matter their size.  Your business is a target and increased discussion about your business’s IT security can help prevent an attack.

Legal Software Platform Attacked

Legal case management software platform, TrialWorks, was hit by a ransomware attack in mid-October.  Some of the company’s customers were unable to access their case management accounts for a couple of days!  This is a reputable company that is widely used, and this attack brought the law firms’ productivity to a halt when they could not access client data, case notes, communications, billing, and more.

While it’s unknown exactly what malware infected the software, experts are presuming that the firm paid the ransomware to obtain the decryption keys and restore files.  Within days, TrialWorks announced that it hired several cybersecurity firms to investigate the incident and help restore normal operations.

Why Law Firms are Moving to the Cloud

Cloud is one of the hot topics in IT and has been for the past few years. Prior to 2010, cloud products were often inferior to their traditional on-premise counterparts. Since then, however, much has changed, including advancements in telecom, mobile devices, and data center technologies.  Combine that with the maturity of cloud providers and products, and now cloud solutions are often positioned as the best option for law firms.

5 Ways to Prevent a Phishing Attack

The vast majority of data breaches today are phishing attacks, occurring when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims.  In our last blog post, It’s Only Getting Worse, we describe both phishing and spear phishing tactics and why it is imperative for businesses to take precautions to protect themselves. 

It's Only Getting Worse

Recently, a company called me to discuss concerns about their IT security.  This company, based in the US but doing business with clients and vendors in many parts of the world, has been inundated with phishing emails.  The difference here is that these phishing emails are not just generic ones that pretend to be Microsoft Office 365 or UPS trying to steal passwords, but rather, they are spear phishing.  Spear phishing involves impersonating actual people associated with the company, like executives or vendors, in attempts to steal money or proprietary information.  These schemes are becoming more and more common.