Recent blog posts - Machado Consulting's News You Can Use - Page 2 | Worcester, Massachusetts | Machado Consulting

Login

Machado Consulting's News You Can Use

Welcome to our blog where you can find everything from tech-tips to keeping your data secure. Have any questions? We'd love to hear from you!

Reopening MA: Second Phase

Reopening MA: Second Phase

After two months of having the stay-at-home advisory in effect, Massachusetts residents in non-essential industries finally got back to work, approaching something close to a normal routine.  On May 18, Governor Baker had released a four-phase approach for reopening the state. It lists the protocols that businesses and individuals are to follow to jumpstart the economy while keeping the numbers of new cases down and giving the strained healthcare system time to catch up. 

We are now entering Phase Two of Baker’s plan. To make things just a little more confusing, we’re in step one of two for this phase.

Continue reading
0 Comments

Health Care is the Target of New APT Attacks

Health Care is the Target of New APT Attacks

How strong are your passwords? This is the question that security agencies in both the US and the UK are asking health care professionals. That’s because they’ve identified a dramatic rise in the number of attacks targeting these workers and their institutions. 

CISA, the cybersecurity arm of the US Department of Homeland Security, has issued a joint alert in conjunction with the United Kingdom’s National Cyber Security Centre (NCSC). According to them, advanced persistent threat (APT) groups are seeking to steal from organizations responding to COVID-19. 

This victim group in US and the UK includes health care bodies, medical research organizations, pharmaceutical companies, and local even governments and universities. 

Continue reading
0 Comments

In COVID-19's Wake: Opportunity for Change

In COVID-19's Wake: Opportunity for Change

Across the United States, people are itching to get back to work. Since lockdowns went into effect mid-March, some 33.5 million jobless claims have been filed. In the first quarter of 2020, gross domestic product (GDP) shrank 4.8%, and that’s given nearly two months of relatively normal circumstances in January and February. On top of that, 7.5 million small businesses in the US are at risk of closing permanently.  

In this grim reality, it can be hard to find any positives, but there are some. For instance, as far as layoffs and unemployment go, 97% of workers expect their current condition to be temporary, meaning that when the economy reopens, they will quickly get back to work.  

Continue reading
0 Comments

Where Are the Holes in Your Remote Security?

Where Are the Holes in Your Remote Security?

Since lockdowns went into effect in the middle of March, millions of workers have been working from home. One of the things that we’ve learned from this mass experiment is just how flexible people can be in times of distress. Very few companies were prepared for this abrupt change, but when it happened, they had to adjust. Did they collapse under the burden? No way. American businesses are tougher than that.  They found ways to make the switch work. 

However, the switch to working from home wasn’t always a perfect one. In fact, it still isn’t perfect everywhere, which makes sense. When you take a business of say 100 workers, many of whom have never worked remotely before, and you suddenly have to close the office, things are going to go awry. Without proper contingency plans and polices, you’re going to have a patchwork system. 

Continue reading
0 Comments

New Wave of Zoom Scams: "You're Being Terminated"

New Wave of Zoom Scams: "You're Being Terminated"

Just when you thought news about Zoom, the now massively popular video conferencing app, couldn’t get worse, it does. At least this time, it’s not the fault of the company itself but rather crafty cybercriminals. 

Abnormal Security reports that there is a new wave of Zoom phishing attacks impacting around 50,000 email inboxes so far.  The phony emails look like legitimate invitations to join a meeting with regard to the recipient’s supposed termination. The invitation link directs victims to a phishing page where the user is asked for their log-in credentials. Any information entered then gets sent directly to the attacker. 

Continue reading
0 Comments

Search Blog

Subscribe to Our Blog