Managed IT Services in Northeast Ohio
25 Jan 2015
Hacker programing in technology enviroment with cyber icons and symbols

5 Steps To Protect Your Business From Ransomware

Your computer will not just “get infected” with ransomware, the malicious software that encrypts your files and requires a specified amount of money to unlock them.  You have to click on something or open something (perhaps unintentionally) to activate the trigger.  Last year, CryptoLocker ransomware got a lot of attention, and we’re now dealing with CryptoWall, which is a variant of CryptoLocker.

READ MORE

01 May 2014
vector email icon web design element.

How To Sign Off On Business Email

What’s the best way to sign off on a business email?  It depends on the person and the context. At CRU Solutions, sign offs range from “Best Regards” to “Warm Regards” to “Thanks”.  In our business, we keep our sign-offs straight-forward.  In your business, maybe quirky is better.

READ MORE

17 Apr 2014
bigstock-Internet-security-concept-hack-51220297

5 Ways Employees Risk IT Security

Some of the greatest threats to the IT security of your small business can come from you and your employees. This isn’t to say that we’re all lazy.  Actually, it’s quite the opposite.  Most of us simply don’t know the steps to take or think we’re too busy to deal with it, so we unintentionally risk exposing company data to people who could cause damage.

READ MORE