Managed IT Services in Northeast Ohio
03 Sep 2015

What Makes An Email “Suspicious”?

Do you know what to look for to determine if an email is “suspicious”?  Hackers have become very clever by creating emails that look legitimate, especially at a quick glance.  Unfortunately, you could make one wrong click in an email and expose your entire network to a serious breach.


20 Aug 2015

8 Tips For Secure Passwords

Creating strong, unique passwords is one of the best defenses we have against cyber criminals.  However, it can be a challenge to come up with a new password every time we sign in to a new account.   At CRU Solutions, some of us have over 50 password-protected accounts.  Do you know how many passwords you use?


06 Aug 2015

How Computer Hacking Works

Computer networks are hacked all the time, but what does that really mean?  How does hacking work?  There are a number of different individual approaches that clever cybercriminals use, but there is a common overall strategy.  If you have a computer nerd curiosity, here’s an overview of the approach.


23 Jul 2015

How You Can Help Avoid Ransomware

Business losses from ransomware aren’t going away. In fact, the latest version of CryptoLocker, 3.0, is considered the most advanced and most damaging ransomware in the wild at the moment, and it’s targeting U.S. businesses and individuals.  We can all take action at our computers every day to help avoid ransomware.  Here’s how.


02 Jul 2015

Microsoft SAM Reviews Are Here

The odds of businesses of all sizes being reviewed by Microsoft for licensing compliance has increased.  Since the beginning of 2015, 12% of CRU clients have received Microsoft review requests, and we expect that number to grow. Microsoft plans to conduct these reviews with customers every 2-3 years.