Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Tetratos Blog

Tetratos has been serving the Florida area since 2018, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

BlackRock Android malware can steal data from 337 apps

blackrock

A new Android malware strain has emerged in the criminal underworld that comes equipped with a wide range of data theft capabilities allowing it to target a whopping 337 Android applications.

Named BlackRock, this new threat emerged in May this year and was discovered from mobile security firm ThreatFabric.

Continue reading

Microsoft Outlook is crashing worldwide with 0xc0000005 errors

Outlook-issues

Microsoft Outlook is immediately crashing worldwide when users start the application, with 0xc0000005 errors displayed in the Windows Event Viewer.

These crashes started occurring over the last hour, and reports are flooding in from users all over the world.

Users who examined their Application event logs will see an error log stating that the OUTLOOK.EXE program has crashed with an exception code 0xc0000005.

Continue reading

Critical Microsoft DNS Server Vulnerability – SIGRRed

sigred-dns-vulnerability

The vulnerability, fixed in Microsoft's Patch Tuesday, has been awarded a severity rating of 10.0

Researchers have warned organizations to patch their Microsoft Windows Server builds to protect their networks against a critical wormable vulnerability that has existed in the system's code for 17 years. 

Now resolved as part of Microsoft's Patch Tuesday security update on July 14, the bug, tracked as CVE-2020-1350, has been awarded a CVSS severity score of 10.0. 

Continue reading

New Windows 10 tool helps you recover deleted or corrupted data

file-recovery

Microsoft has released a new Windows 10 utility called Windows File Recovery that helps users recover damaged or deleted files. 

 
"Accidentally deleted an important file? Wiped clean your hard drive? Unsure of what to do with corrupted data? Windows File Recovery can help recover your personal data," Microsoft says on the Microsoft Store listing for the app. 
Continue reading

Windows 10 2004 glitch: Microsoft admits bug breaks Storage Spaces, corrupts files

win10--bug

Microsoft has confirmed one more problem that could happen after installing Windows 10 version 2004: its RAID-like data-protection software, Storage Spaces, might malfunction. The company has warned Windows 10 users that they may see a compatibility hold on the Windows 10 2004 upgrade if Microsoft determines that their machine's configuration is impacted by the bug.

Continue reading

Update Windows 10 Now to Block SMBGhost Vulnerability

SMBGhost

When even the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency is starting to get nervous about your unpatched Windows 10 system, maybe it’s time to make sure you’ve downloaded everything you need from Windows Update.

This time around, the agency is reacting to the emergence of new proof-of-concept attacks related to a vulnerability that was discovered in March—yes, three months ago. The exploit, “SMBGhost,” take advantage of an issue with Windows’ server message block protocol that could give an attacker unrestricted access to run whatever they want on an affected machine. (That includes servers, obviously, but also any unpatched clients connecting to one that has already been hit.)

Continue reading

Two Critical Flaws in Zoom Let Attackers Hack Systems via Chat

zoom-video-software

If you're using Zoom—especially during this challenging time to cope with your schooling, business, or social engagement—make sure you are running the latest version of the widely popular video conferencing software on your Windows, macOS, or Linux computers.

No, it's not about the arrival of the most-awaited "real" end-to-end encryption feature, which apparently, according to the latest news, would now only be available to paid users. Instead, this latest warning is about two newly discovered critical vulnerabilities.

Tags:
Continue reading

How Managed IT Can Save You Money

save_money_managed_IT_400

For the small business, times are increasingly tough. Many businesses have been forced to close down until after the coronavirus outbreak has been mitigated, but for those businesses who are still at it, you must be looking to save some money. Outsourcing your IT to a managed service provider may be just the thing you are looking for in order to get comprehensive IT support your business needs, while also strategically cutting organizational outlay for IT support and services.

Continue reading

Zoom's Security and Privacy Woes Violated GDPR, Expert Says

Zoom-Government

Homeworking and learning have led to a boom in videoconferencing, with Zoom a major beneficiary. But concerns over privacy and security raise important questions: is Zoom safe, and is it even GDPR compliant?

 
Security concerns revolve around the recent discovery of several vulnerabilities taken with the length of time it has taken Zoom to fix earlier vulnerabilities. Privacy concerns focus on a lack of transparency around the user or meeting data retained by Zoom, and who else has access to it. We will concentrate on the privacy issues in this article.
 
Data retention and third-party access concerns are typified by the recent discovery that the Zoom iOS app had been passing data to Facebook even where the iOS user had no Facebook account. There was no indication in Zoom's privacy policy that this was happening (Zoom has stopped this, but iOS users will need to download the latest app version to prevent it continuing).
Continue reading

Trojanized Zoom Apps Target Remote Workers

video-call

Malicious, re-packaged versions of the Zoom video conferencing application are targeting work-from-home Android users with adware and Trojans, Bitdefender reports.

 

Forced by the current COVID-19 pandemic to work from home, many are using Zoom to stay connected with co-workers and other people they work with, and cybercriminals are taking advantage of the situation to trick people into downloading their malicious programs.

Continue reading

Managing Your Business and Remote Workforce During the COVID-19 Pandemic

remote_400

Companies around the world have or are finding the need to send their workers home to prevent the spread of the novel coronavirus. For many business owners, managing your staff remotely is a brand new paradigm. Here’s what you need to know.

First of all, it’s important not to panic. Many organizations have been offering work-from-home perks for years. Not only is it entirely possible to keep business running, but many businesses see a boost in productivity. A two-year Stanford study shows that in general, remote workers are as productive, if not more so, than those confined to an office.

Continue reading

Microsoft warns of Windows zero-day exploit in the wild

microsoft-windows-logo

Hackers are exploiting a zero-day vulnerability in the Windows OS to take over systems, Microsoft said in a security alert today.

The zero-day is located in the Adobe Type Manager Library (atmfd.dll), a library that Microsoft uses to render PostScript Type 1 fonts inside Windows.

Microsoft says there are two remote code execution (RCE) vulnerabilities in this built-in library that allow attackers to run code on a user's system and take actions on their behalf.

Continue reading

Is It Time For You To Consider Remote Workers In Answer To COVID-19?

covid-19

Last week, as COVID-19 cases continued to spread around the world, millions of people moved to remote work. We were right there with them. Many of our customers have asked us to share the details of how we enable remote work for workforces from a small office to major corporations.

Below are some solutions that may work for you, but if you wish to learn more, contact us so we can give you a personalized list of solutions that work for your industry and business:

Continue reading

HIPAA\HITECH Demystified - And What Could It Cost Me?

HIPAA-HITECH-requirement_20200131-000947_1

HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers.

What is the purpose of HIPAA?

HIPAA, also known as Public Law 104-191, has two main purposes: to provide continuous health insurance coverage for workers who lose or change their job and to reduce the administrative burdens and cost of healthcare by standardizing the electronic transmission of administrative and financial transactions. Other goals include combating abuse, fraud, and waste in health insurance and healthcare delivery and improving access to long-term care services and health insurance.

Tags:
Continue reading

Answers for the Business Still Using Windows 7 and Windows Server 2008 R2

still_using_windows

Attention: You Aren’t Safe

Listen up: if you are still using Windows 7--or much worse yet, Windows Server 2008 R2-- and these machines are connected to a network that is connected to the Internet, that network is in jeopardy. Microsoft has retired support for both operating systems and will no longer provide crucial security updates and bug fixes making them vulnerable to cyberattacks.

What Moves Should You Make? You need to do what you can to upgrade away from Windows 7 or Windows Server 2008 R2.

Continue reading

Serious Microsoft Crypto Vulnerability

patchrightnow

The burning question of the moment is, “What about CVE-2020-0601?”

That’s the bug number assigned to one of the security holes fixed in Microsoft’s January 2020 Patch Tuesday updates. Of the 50 bugs patched this month, that’s the Big One, officially described by Microsoft as a “Windows CryptoAPI Spoofing Vulnerability“.

To explain.

The CryptoAPI, partly implemented in a Windows file called crypt32.dll (you’ll also hear that filename used to describe this bug), is the way that many, if not most, Windows programmers add encryption functionality into their software.

Continue reading

Google Reveals How To Hack An Apple iPhone Within Minutes

960x0

Apple iPhones are considered secure devices, but that doesn’t mean they aren’t open to hacking. And yesterday, Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge.

Armed only with a user’s Apple ID, security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages, and emails.

Leveraging just one vulnerability labeled CVE-2019-8641, Groß was also able to remotely activate an Apple iPhone’s microphone and camera without any interaction from the user. In simple terms, this means an attacker could gain access to your iPhone without you clicking a malicious URL.

Continue reading

Got Backups?

backups

If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware, such as ransomware, may wipe your files and/or hold them captive. At times like these, backups are often the only way you can rebuild your digital life.

 

Backups are copies of your information stored somewhere other than on your computer or mobile device. When you lose valuable data, you can recover your data from backups. The first step is deciding what you want to back up: specific data that is important to you or everything, including your entire operating system. Many backup solutions are configured by default to use the first approach. They back up the most commonly used folders. If you are not sure what to back up or want to be extra careful, back up everything.

Continue reading

Scamming You Through Social Media

socialmedia-scam

Many of us have received phishing email, either at work or at home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing your password, or transferring money. The challenge is, the savvier we become at spotting and stopping these email attacks, the more cybercriminals try other ways of contacting and scamming us.

Continue reading

Do You Know The Single Greatest Threat To Your Network?

single-greatest-threat

As business owners, our worlds revolve around generating revenue while being stricken with anxiety over all of the things that could harm our business. As leaders, we have always had to deal with the common factors that can interrupt our revenue streams from staffing issues, to market fluctuations, to natural disasters, oh my! Over the past decade, one single item on this list has advanced as a threat to our revenue streams quicker than any other single item. This item cannot only bring our business to a screeching halt but it can easily put businesses into bankruptcy and have business owners closing their doors.

The problem is without this item, most businesses in today’s business world would find it hard to conduct business let alone generate revenue.

Continue reading

Latest Blog

A new Android malware strain has emerged in the criminal underworld that comes equipped with a wide range of data theft capabilities allowing it to target a whopping 337 Android applications.Named BlackRock, this new threat emerged in May this year and was discovered from mo...

Contact Us

Learn more about what Tetratos can do for your business.

Tetratos
19046 Bruce B Downs Blvd
Ste B6 #822
Tampa, Florida 33647