Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Tetratos Blog

Tetratos has been serving the Florida area since 2018, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

HIPAA\HITECH Demystified - And What Could It Cost Me?

HIPAA-HITECH-requirement_20200131-000947_1

HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers.

What is the purpose of HIPAA?

HIPAA, also known as Public Law 104-191, has two main purposes: to provide continuous health insurance coverage for workers who lose or change their job and to reduce the administrative burdens and cost of healthcare by standardizing the electronic transmission of administrative and financial transactions. Other goals include combating abuse, fraud, and waste in health insurance and healthcare delivery and improving access to long-term care services and health insurance.

Tags:
Continue reading

Answers for the Business Still Using Windows 7 and Windows Server 2008 R2

still_using_windows

Attention: You Aren’t Safe

Listen up: if you are still using Windows 7--or much worse yet, Windows Server 2008 R2-- and these machines are connected to a network that is connected to the Internet, that network is in jeopardy. Microsoft has retired support for both operating systems and will no longer provide crucial security updates and bug fixes making them vulnerable to cyberattacks.

What Moves Should You Make? You need to do what you can to upgrade away from Windows 7 or Windows Server 2008 R2.

Continue reading

Serious Microsoft Crypto Vulnerability

patchrightnow

The burning question of the moment is, “What about CVE-2020-0601?”

That’s the bug number assigned to one of the security holes fixed in Microsoft’s January 2020 Patch Tuesday updates. Of the 50 bugs patched this month, that’s the Big One, officially described by Microsoft as a “Windows CryptoAPI Spoofing Vulnerability“.

To explain.

The CryptoAPI, partly implemented in a Windows file called crypt32.dll (you’ll also hear that filename used to describe this bug), is the way that many, if not most, Windows programmers add encryption functionality into their software.

Continue reading

Google Reveals How To Hack An Apple iPhone Within Minutes

960x0

Apple iPhones are considered secure devices, but that doesn’t mean they aren’t open to hacking. And yesterday, Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge.

Armed only with a user’s Apple ID, security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages, and emails.

Leveraging just one vulnerability labeled CVE-2019-8641, Groß was also able to remotely activate an Apple iPhone’s microphone and camera without any interaction from the user. In simple terms, this means an attacker could gain access to your iPhone without you clicking a malicious URL.

Continue reading

Got Backups?

backups

If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware, such as ransomware, may wipe your files and/or hold them captive. At times like these, backups are often the only way you can rebuild your digital life.

 

Backups are copies of your information stored somewhere other than on your computer or mobile device. When you lose valuable data, you can recover your data from backups. The first step is deciding what you want to back up: specific data that is important to you or everything, including your entire operating system. Many backup solutions are configured by default to use the first approach. They back up the most commonly used folders. If you are not sure what to back up or want to be extra careful, back up everything.

Continue reading

Scamming You Through Social Media

socialmedia-scam

Many of us have received phishing email, either at work or at home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing your password, or transferring money. The challenge is, the savvier we become at spotting and stopping these email attacks, the more cybercriminals try other ways of contacting and scamming us.

Continue reading

Do You Know The Single Greatest Threat To Your Network?

single-greatest-threat

As business owners, our worlds revolve around generating revenue while being stricken with anxiety over all of the things that could harm our business. As leaders, we have always had to deal with the common factors that can interrupt our revenue streams from staffing issues, to market fluctuations, to natural disasters, oh my! Over the past decade, one single item on this list has advanced as a threat to our revenue streams quicker than any other single item. This item cannot only bring our business to a screeching halt but it can easily put businesses into bankruptcy and have business owners closing their doors.

The problem is without this item, most businesses in today’s business world would find it hard to conduct business let alone generate revenue.

Continue reading

Cybersecurity Protection for Tampa Bay Businesses

cybersecurity_400

No Business is Exempt; It’s Time to Take IT Security Seriously!

Consider how much of your business operations rely on computers - you store your business and customer data digitally, including financial accounts, personal information, and other specifics. Unfortunately, while this data is clearly invaluable to your business, do you know who else would find your data valuable?

Cybercriminals, that’s who.

Continue reading

Shopping Online Securely (A little Christmas help)

2019-12-12_18-55-34

The holiday season is nearing for many of us and soon millions of people will be looking to buy the perfect gifts. Many of us will shop online in search of great deals and avoid noisy crowds. Unfortunately, cybercriminals will be active as well, creating fake shopping websites and using other tactics to scam people. In this newsletter, we explain how you can shop online safely and avoid becoming a victim.

There's every reason in the world to shop online. The bargains are there. The selection is mind-boggling. The shopping is secure. Shipping is fast. Even returns are easy, with the right e-tailers. Shopping has never been easier or more convenient for consumers.

But what about the bad guys who lay in wait? It happens. The FBI's own Internet Crime Complaint Center says the number one cybercrime of 2017 was related to online shopping: non-payment for or non-deliver of goods purchased. Phishing was third, but it was at an all-time high during Q2 2018, according to the APWG's Phishing Activity Trends Report.

Continue reading

Windows 7 Will Soon Have Full-Screen Windows 10 Upgrade Alerts

end-of-support-ad

When Windows 7 reaches the end of support, the operating system will display a full-screen warning stating that Windows is more vulnerable to viruses and that you should upgrade to Windows 10.

On January 14th, 2020, Windows 7 will officially reach the end of support (EoS) and unless you have purchased "Extended Security Updates", you will no longer receive security updates, Microsoft Security Essentials definitions, software updates, or tech support for the operating system.

In order to warn Windows 7 users about the upcoming EoS, some Windows 7 updates will install a program called EOSnotify.exe that will routinely run via scheduled tasks.

Continue reading

Avast and AVG Browser Extensions Spying On Chrome and Firefox Users

avast-avg-firefox-chrome-plugins
If your Firefox or Chrome browser has any of the below-listed four extensions offered by Avast and its subsidiary AVG installed, you should disable or remove them as soon as possible.
 
 
  • Avast Online Security
  • AVG Online Security
  • Avast SafePrice
  • AVG SafePrice
 
Why? Because these four widely installed browser extensions have been caught collecting a lot more data on its millions of users than they are intended to, including your detailed browsing history.
Tags:
Continue reading

You Can Still Upgrade To Windows 10 For Free Assuming Your Hardware Can Handle IT, Here's How

windows-10-upgrade

Back when Windows 10 was first released, Microsoft allowed users of Windows 7 or Windows 8.1 to upgrade to Windows 10 for free. Microsoft officially ended the free upgrade offer in December 2017, but a method still works that allows you to upgrade an older version of Windows to Windows 10 for free.

Microsoft doesn’t talk about that Windows 10 free upgrade offer anymore, but devices with legitimate Windows 7 or Windows 8.1 licenses could be upgraded to Windows 10 for free using the Windows 10 Media Creation Tool.

To get Windows 10, you’ll just have to download and run Media Creation Tool on Windows 7/8/8.1 and upgrade the PC to Windows 10. After the upgrade, connect to the internet and your older Windows license will be converted to a Windows 10 license.

Tags:
Continue reading

Netflix account freeze – don’t click, it’s a scam!

netflix-scam

Another day! Another Netflix phishing scam!

We’ve written about these scams before, and we’ll probably write about them again…

…for the sadly simple reason that THEY WORK.

They work because scammers know that the less inventive they are, the more believable their messages become.

It’s also a lot less effort to copy genuine content and adapt it just a little than to try to create your own material from scratch.

Continue reading

Best practices to ensure your organization is focused on the right types of risk

Risk-Assessment

All organizations face some type of risk. Risks are determined by organization type, clients, workers, vendors, and logistics, among many other potential factors. Basically, anything that is part of the organization, associated with the organization or contributes to operations represents some level of risk to the organization.

In order to properly evaluate potential risk, an organization should:

Evaluate organizational structure
Identify proper threat intelligence sources and gather useful information
Perform risk assessment
Before we go more in-depth in each of these three steps, let’s look at a quick example below.

Continue reading

How website security and SEO are intimately connected

How-Poor-Website-Security-Negatively-Impacts-SEO-Rankings

Learning how to optimize your website can be a challenge. At one time, it was only about figuring out what Google wanted, which was largely keywords. Now, it’s much more complex.

Google is focused on not only delivering high-quality, relevant search results but also on protecting people from malware and unscrupulous websites. Not only that, a hack of your website by others can give Google false information that directly impacts your rankings. That’s why it’s vital for your website to have strong web security if you want to do well in SEO.

Continue reading

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath

cyber-attacks-22

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon.

Cyberattacks—much like the advancement of technology, the interweaving of digital lives among familiars and strangers via social networks, and the broadening adoption of the Internet—are here to stay.

As much as the Internet has changed individual lives on the planet—for better or for worse—it’s changed the way people do business even more. The current reality is that a business is not much of a business if it’s not online. Even local small businesses, such as restaurants, home renovation companies, or dance studios, require some kind of Internet presence to flourish.

Continue reading

It Isn’t Too Late to Upgrade to Windows 10… But It’s Getting Close!

7-is-dead

Moving away from Windows 7 is becoming more crucial every day. Is your business still running Windows 7?

This isn’t a good thing, and soon, it’s going to get a lot worse - Microsoft is pulling support for Windows 7 on January 14, 2020. As a result, any business that hasn’t upgraded will very quickly find itself in a tough spot. Why is that?

Continue reading

You shall not pass! Protecting customer information - The Finale of National Cyber Awareness Month

NCSAM_Infographics_all_Page_10-800

Today, personal data is more important than ever. Lots of companies collect information while doing business, and that means when those companies get hacked, that customer info gets exposed to the world.

Your smarts, though, can make a difference and help protect those people who trust you with their data. Let’s talk about protecting customer information. Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

Continue reading

No peeking! Staying safe and private on Wi-Fi - National Cyber Awareness Month

NCSAM_Infographics_all_Page_09-800

Wi-Fi is great. How cool is it to be able to access the internet from anywhere — pretty much carrying an entire library and a direct line to anywhere in the world with you when you go out for a burger? In the United States, many businesses now offer Wi-Fi for their customers, so you can stay connected wherever you go.

That doesn’t mean it’s perfect, though. Using public Wi-Fi is sort of like doing, well, anything else in public: you want to be safe and not accidentally wander into trouble. Let’s talk about what you can do to protect yourself on Wi-Fi.

Continue reading

Up-to-date on updates: Keeping your software fresh - National Cyber Awareness Month

NCSAM_Infographics_all_Page_08-80_20191025-133159_1

Software updates are sort of like vitamins: Not everyone thinks about them, but everyone needs them, and they can make a big difference in keeping a system healthy. Let’s take a quick minute to talk about updates.

Updates help keep a piece of software or a system current. Because new threats are being developed all the time, manufacturers will send out fixes and updates to help protect their users from new threats — or just from problems they didn’t find when the software was first made. If someone discovers a security problem in a program and a user doesn’t download the update to fix the problem, they’re basically leaving a door open.

Continue reading

Latest Blog

HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. The law has emerged into greater prominence in recent years with the proliferation of hea...

Contact Us

Learn more about what Tetratos can do for your business.

Tetratos
19046 Bruce B Downs Blvd
Ste B6 #822
Tampa, Florida 33647