Security Archives | OXEN Technology


Increase Your Network Security

Wireless networks are a gift to anyone seeking easy connectivity and a quick Wi-Fi connection. But don't forget that rushing through your network's setup can have security consequences later. Make sure you've addressed these areas, whether it's for your personal network at home or your business's, to improve your network security. Change your access point or router's default username and password. Default usernames and passwords for most hardware and software can easily be found online. Turn on encryption. All Wi-Fi devices support at least some type of encryption. Change your network's name or SSID from the default. A default name…
December 16, 2019
Cloud SolutionsOffice 365Security

What Is Microsoft 365 vs. Office 365?

You may have started to hear about Microsoft 365. Is it the same as the similarly named “Office 365”? The two are different, and here we’ll explain the difference and what Microsoft 365 Business can offer your organization. First of all, Microsoft 365 is not the same thing as Office 365. Office 365 is a cloud-based suite of productivity apps, such as Word, PowerPoint, Excel, and Outlook. It’s the modern, cloud-based version of the Microsoft Office suite of products you’re probably familiar with already. Microsoft 365 Business is a bundle of services that include the apps and productivity tools of…
September 16, 2019

Why bother with software and hardware updates for security?

When was the last time you thought about software and hardware updates? For many, updating software and hardware is not a priority because "If it ain't broke, don't fix it". At OXEN, we politely disagree with this age old wisdom because it's abundantly clear that today's cyber attacks pointedly prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such as Microsoft Windows.) It may not be "broke", but it's still old. "Working" does not mean "secure". Old software and hardware simply do not have the latest defenses like security patches and advances in…
August 16, 2017

Malware Sneaks in Through Chrome Browser Extensions

With Google Chrome at 60% market share, it's no wonder that browser extension malware is on the rise. In this podcast, Chad Porter helps us understand a particular form of malware that sneaks in through browser extensions. Extensions are handy add-ons that increase functionality of your Google Chrome Browser. We share some information that Chad found on a blog by a man in Copenhagen, Denmark named Maxime Kjaer. He shares some insights regarding extension malware that sparked this conversation between Chad and me. If you're interested in learning more about how OXEN Technology can help you with your IT network, you…
September 7, 2016

20% of Businesses Attacked by Ransomware Shut Down

John Rokes This next article on the continuing, growing threat of ransomware attacks comes courtesy of our very own John Rokes. John has spent 35 years in project management and enterprise IT and now brings that expertise to OXEN Technology clients. John constantly reviews industry buzz and writes about it in his own blog at InfoSec for the Small-Medium Sized Organization. This article is republished from that work. Ransomware Attacks Are Increasing A new report found that nearly 40 percent of businesses had been victims of ransomware attacks in the past year. Security Magazine says that at least a third…
September 1, 2016

Warning: Rise in Ransomware “Troldesh” Attacks

OXEN Technology has seen a significant increase in activity by a malicious ransomware software called Troldesh. Our engineers are currently working with several clients to resolve the issue for them, and we wanted to warn you regarding this potential threat. We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of ransomware. What is Ransomware and Troldesh? Troldesh is a form of malicious software called ransomware. If infected, your data, and often every fileshare on your network is encrypted and you will be asked to pay a…
June 14, 2016