Happy 4th of July!

News

Happy 4th of July from Teqworks!

Summer is finally here in St Charles, and I think we all deserve a nice holiday weekend in the sun. Make sure to catch the fireworks on Monday July 4th at sundown! “Launching from Boy Scout Island, the best viewing locations include Pottawatomie Park, Pottawatomie Golf Course and Ferson Creek...

Read More...
Features / Insights Blog

Benefits of Using Microsoft Teams

Microsoft Teams has become a necessity of the modern workplace, where the ability to work from anywhere is now commonplace.  The pace of product innovation from the Microsoft Teams development team has been impressive. The features and functions have really improved since we all went remote two years ago. Teams...

Read More...
Support / Uncategorized

Security Advisory – Zero Day – Follina

  6/1/22 Teqworks Managed Security has been monitoring the development of an active zero-day threat, referred to as "Follina" (CVE-2022-30190).  This vulnerability was originally identified on May 27, and security platforms continue to update as details emerge. In short, an attacker can utilize the Microsoft Support Diagnostic Tool (MSDT) to run...

Read More...
News

Top Tips to Detect Phishing Scams

Sending emails plays a key role in a company’s business operations, with 86% of professionals preferring email as their primary means of business communication. Because they're so heavily relied upon, email accounts are common targets for cybercriminals. Using a method called phishing, these attacks are disguised as run-of-the-mill, regular emails,...

Read More...
News

Part IV: Next Generation Threats

Next Generation threats, by comparison, do not use conventional methods to reach your electronic assets.  They can disguise themselves as trusted traffic.  They can use legitimate programs – like Outlook or Adobe Acrobat – to run rules to manipulate data on the computer or server.  Next Generation threats can use...

Read More...
News

Part III: Conventional Threats

This is part III of our cyber security blog series. Here we cover what is considered a Conventional Threat. For decades, we've all become familiar with the ways we protect from viruses, spam, adware, trojans, and other malware we refer to as conventional threats.  Comparative to new threats like phishing...

Read More...
News

Part II: Scary Stats & Stories

Cybercrimes pose the greatest threat to companies around the world. Dark web cybercriminals target companies of all sizes in all industries at any given moment. Without warning, your data can be compromised and held hostage by despicable thieves. And it happens more than you may know.  In Part II of...

Read More...
News

Part I: The Teqworks Way

Most small businesses – 60%, reportedly – will not survive the year after experiencing a data breach, usually closing doors within 6 months.​ Every day, the IT environments of countless businesses and corporations around the world are under attack. Whether they know it or not, sinister entities are plotting heinous...

Read More...
Uncategorized

Remote Code Execution (RCE) Vulnerability CVE-2021-44228 

On Dec. 9, 2021, a remote code execution (RCE) vulnerability CVE-2021-44228 in Apache log4j 2 was identified and attackers are already actively exploiting this vulnerability. Since the advent of this issue, Teqworks has been consulting security partners and evaluating our and your systems for exposure to this vulnerability. Teqworks internal systems do...

Read More...
News

Teqworks Statement on Sunburst, SolarWinds, and FireEye Security Issue

On December 13, 2020, the US Cybersecurity and Infrastructure Security Agency alerted the general public of a known active exploitation of SolarWinds Orion and FireEye, software that is frequently used to support and monitor computer systems and networks.  This exploitation is currently referred to as Sunburst. Teqworks does not use...

Read More...
WHO MANAGES YOUR IT?
© 2022  TEQWORKS, INC.  |  All Rights Reserved  |  SITE BY CURTIS  |  An Argus Business Consulting Services, Inc. Company