Visit us at St. Charles Scarecrow Festival October 7-9, 2022
Home > News and Whitepapers
Teqworks at St. Charles Scarecrow Festival
We're born and raised in St. Charles, so how could we not show off our creativity at the annual St. Charles Scarecrow Festival in Lincoln Park? We couldn't pass this up, so come out and see what we have built. We can't wait to see you! Come visit TeqMan at...
Happy 4th of July from Teqworks!
Summer is finally here in St Charles, and I think we all deserve a nice holiday weekend in the sun. Make sure to catch the fireworks on Monday July 4th at sundown! “Launching from Boy Scout Island, the best viewing locations include Pottawatomie Park, Pottawatomie Golf Course and Ferson Creek...
Benefits of Using Microsoft Teams
Microsoft Teams has become a necessity of the modern workplace, where the ability to work from anywhere is now commonplace. The pace of product innovation from the Microsoft Teams development team has been impressive. The features and functions have really improved since we all went remote two years ago. Teams...
Security Advisory – Zero Day – Follina
6/1/22 Teqworks Managed Security has been monitoring the development of an active zero-day threat, referred to as "Follina" (CVE-2022-30190). This vulnerability was originally identified on May 27, and security platforms continue to update as details emerge. In short, an attacker can utilize the Microsoft Support Diagnostic Tool (MSDT) to run...
Top Tips to Detect Phishing Scams
Sending emails plays a key role in a company’s business operations, with 86% of professionals preferring email as their primary means of business communication. Because they're so heavily relied upon, email accounts are common targets for cybercriminals. Using a method called phishing, these attacks are disguised as run-of-the-mill, regular emails,...
Part IV: Next Generation Threats
Next Generation threats, by comparison, do not use conventional methods to reach your electronic assets. They can disguise themselves as trusted traffic. They can use legitimate programs – like Outlook or Adobe Acrobat – to run rules to manipulate data on the computer or server. Next Generation threats can use...
Part III: Conventional Threats
This is part III of our cyber security blog series. Here we cover what is considered a Conventional Threat. For decades, we've all become familiar with the ways we protect from viruses, spam, adware, trojans, and other malware we refer to as conventional threats. Comparative to new threats like phishing...
Part II: Scary Stats & Stories
Cybercrimes pose the greatest threat to companies around the world. Dark web cybercriminals target companies of all sizes in all industries at any given moment. Without warning, your data can be compromised and held hostage by despicable thieves. And it happens more than you may know. In Part II of...
Part I: The Teqworks Way
Most small businesses – 60%, reportedly – will not survive the year after experiencing a data breach, usually closing doors within 6 months. Every day, the IT environments of countless businesses and corporations around the world are under attack. Whether they know it or not, sinister entities are plotting heinous...
Remote Code Execution (RCE) Vulnerability CVE-2021-44228
On Dec. 9, 2021, a remote code execution (RCE) vulnerability CVE-2021-44228 in Apache log4j 2 was identified and attackers are already actively exploiting this vulnerability. Since the advent of this issue, Teqworks has been consulting security partners and evaluating our and your systems for exposure to this vulnerability. Teqworks internal systems do...