<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

The Target Hack: How could it happen?

Unless you've been living in a bubble without access to the news or Internet for the past 3 months, you've heard about the massive security breach that Target suffered. Hackers were able to get into Target's computer system and download over 110 million credit and debit card numbers. While we don't know who these 110 million lucky winners are, you can rest assured that if you weren't in that group, someone very close to you was.

Last week, more details on how the attack occurred were released. Apparently, Fazio Mechanical, a HVAC contractor who does work for Target, had someone hack into one of their PC's through a targeted phishing attempt. Fazio's systems were set up with certain access to Target's system to communicate work orders, invoices, etc. The hackers used that connection to access Target's database containing credit card numbers, and somehow downloaded it all from there. This is shameful at best.

Prepare Your Business for a Tornado Now Before It’s Too Late!

Tornados are one of mother nature's most unpredictable natural disasters that cause devisation to many businesses each year. It is important for businesses to take proper precautions to prepare for any given situation to reduce any risk from having to rebuild their firms. 

Memphis Data Breach Caused by Unsecure Emails


An employee of the Regional Medical Center in Memphis, Tennessee, sent out three unsecure emails that contained the private health information and Social Security numbers of approximately 1,200 patients. The medical center is notifying patients of the HIPAA breach.

Simple Yet Effective Password Advice

Our team of IT security specialists stumbled upon this simple yet effective password security video. This short video talks about having strong passwords that are hard to guess but easy to remember.

The Real Truth About Computer Viruses

There are many myths regarding computer viruses and most of them revolve around Malware. Those of us who use computers on a daily basis are familiar with the concepts associated with Malware, but may not be sure what’s really true and what’s not. Myth or no, it’s in your best interest to learn about computer viruses and what you should do to protect yourself against them.

What is protecting your business network?


Savvy business owners
understand the importance of installing a great alarm system monitored by a team of professionals. When a burglar attempts to break into a business, the alarm sounds and the authorities are notified. Common sense, right?

Tropical Storm Isaac Churns In The Gulf – Are Gulf Coast Businesses Prepared?

By August 26, 2012, Tropical Storm Isaac had already added to the woes of Haiti residents and wreaked havoc in the Florida Keys. By the time it reaches land on the evening of August 28, the storm is expected to accumulate wind speeds that would make it a category 1 hurricane. Already, cities and towns along the Gulf Coast of the United States are preparing for the worst. What about you? Do you have a disaster recovery plan in place should your business be damaged or destroyed by a level 1 hurricane or severe tropical storm?