Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Tetratos Blog

Tetratos has been serving the Florida area since 2018, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Microsoft warns of Windows zero-day exploit in the wild


Hackers are exploiting a zero-day vulnerability in the Windows OS to take over systems, Microsoft said in a security alert today.

The zero-day is located in the Adobe Type Manager Library (atmfd.dll), a library that Microsoft uses to render PostScript Type 1 fonts inside Windows.

Microsoft says there are two remote code execution (RCE) vulnerabilities in this built-in library that allow attackers to run code on a user's system and take actions on their behalf.

Continue reading

Is It Time For You To Consider Remote Workers In Answer To COVID-19?


Last week, as COVID-19 cases continued to spread around the world, millions of people moved to remote work. We were right there with them. Many of our customers have asked us to share the details of how we enable remote work for workforces from a small office to major corporations.

Below are some solutions that may work for you, but if you wish to learn more, contact us so we can give you a personalized list of solutions that work for your industry and business:

Continue reading

HIPAA\HITECH Demystified - And What Could It Cost Me?


HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers.

What is the purpose of HIPAA?

HIPAA, also known as Public Law 104-191, has two main purposes: to provide continuous health insurance coverage for workers who lose or change their job and to reduce the administrative burdens and cost of healthcare by standardizing the electronic transmission of administrative and financial transactions. Other goals include combating abuse, fraud, and waste in health insurance and healthcare delivery and improving access to long-term care services and health insurance.

Continue reading

Answers for the Business Still Using Windows 7 and Windows Server 2008 R2


Attention: You Aren’t Safe

Listen up: if you are still using Windows 7--or much worse yet, Windows Server 2008 R2-- and these machines are connected to a network that is connected to the Internet, that network is in jeopardy. Microsoft has retired support for both operating systems and will no longer provide crucial security updates and bug fixes making them vulnerable to cyberattacks.

What Moves Should You Make? You need to do what you can to upgrade away from Windows 7 or Windows Server 2008 R2.

Continue reading

Serious Microsoft Crypto Vulnerability


The burning question of the moment is, “What about CVE-2020-0601?”

That’s the bug number assigned to one of the security holes fixed in Microsoft’s January 2020 Patch Tuesday updates. Of the 50 bugs patched this month, that’s the Big One, officially described by Microsoft as a “Windows CryptoAPI Spoofing Vulnerability“.

To explain.

The CryptoAPI, partly implemented in a Windows file called crypt32.dll (you’ll also hear that filename used to describe this bug), is the way that many, if not most, Windows programmers add encryption functionality into their software.

Continue reading

Google Reveals How To Hack An Apple iPhone Within Minutes


Apple iPhones are considered secure devices, but that doesn’t mean they aren’t open to hacking. And yesterday, Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge.

Armed only with a user’s Apple ID, security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages, and emails.

Leveraging just one vulnerability labeled CVE-2019-8641, Groß was also able to remotely activate an Apple iPhone’s microphone and camera without any interaction from the user. In simple terms, this means an attacker could gain access to your iPhone without you clicking a malicious URL.

Continue reading

Got Backups?


If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware, such as ransomware, may wipe your files and/or hold them captive. At times like these, backups are often the only way you can rebuild your digital life.


Backups are copies of your information stored somewhere other than on your computer or mobile device. When you lose valuable data, you can recover your data from backups. The first step is deciding what you want to back up: specific data that is important to you or everything, including your entire operating system. Many backup solutions are configured by default to use the first approach. They back up the most commonly used folders. If you are not sure what to back up or want to be extra careful, back up everything.

Continue reading

Scamming You Through Social Media


Many of us have received phishing email, either at work or at home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing your password, or transferring money. The challenge is, the savvier we become at spotting and stopping these email attacks, the more cybercriminals try other ways of contacting and scamming us.

Continue reading

Do You Know The Single Greatest Threat To Your Network?


As business owners, our worlds revolve around generating revenue while being stricken with anxiety over all of the things that could harm our business. As leaders, we have always had to deal with the common factors that can interrupt our revenue streams from staffing issues, to market fluctuations, to natural disasters, oh my! Over the past decade, one single item on this list has advanced as a threat to our revenue streams quicker than any other single item. This item cannot only bring our business to a screeching halt but it can easily put businesses into bankruptcy and have business owners closing their doors.

The problem is without this item, most businesses in today’s business world would find it hard to conduct business let alone generate revenue.

Continue reading

Cybersecurity Protection for Tampa Bay Businesses


No Business is Exempt; It’s Time to Take IT Security Seriously!

Consider how much of your business operations rely on computers - you store your business and customer data digitally, including financial accounts, personal information, and other specifics. Unfortunately, while this data is clearly invaluable to your business, do you know who else would find your data valuable?

Cybercriminals, that’s who.

Continue reading

Shopping Online Securely (A little Christmas help)


The holiday season is nearing for many of us and soon millions of people will be looking to buy the perfect gifts. Many of us will shop online in search of great deals and avoid noisy crowds. Unfortunately, cybercriminals will be active as well, creating fake shopping websites and using other tactics to scam people. In this newsletter, we explain how you can shop online safely and avoid becoming a victim.

There's every reason in the world to shop online. The bargains are there. The selection is mind-boggling. The shopping is secure. Shipping is fast. Even returns are easy, with the right e-tailers. Shopping has never been easier or more convenient for consumers.

But what about the bad guys who lay in wait? It happens. The FBI's own Internet Crime Complaint Center says the number one cybercrime of 2017 was related to online shopping: non-payment for or non-deliver of goods purchased. Phishing was third, but it was at an all-time high during Q2 2018, according to the APWG's Phishing Activity Trends Report.

Continue reading

Windows 7 Will Soon Have Full-Screen Windows 10 Upgrade Alerts


When Windows 7 reaches the end of support, the operating system will display a full-screen warning stating that Windows is more vulnerable to viruses and that you should upgrade to Windows 10.

On January 14th, 2020, Windows 7 will officially reach the end of support (EoS) and unless you have purchased "Extended Security Updates", you will no longer receive security updates, Microsoft Security Essentials definitions, software updates, or tech support for the operating system.

In order to warn Windows 7 users about the upcoming EoS, some Windows 7 updates will install a program called EOSnotify.exe that will routinely run via scheduled tasks.

Continue reading

Avast and AVG Browser Extensions Spying On Chrome and Firefox Users

If your Firefox or Chrome browser has any of the below-listed four extensions offered by Avast and its subsidiary AVG installed, you should disable or remove them as soon as possible.
  • Avast Online Security
  • AVG Online Security
  • Avast SafePrice
  • AVG SafePrice
Why? Because these four widely installed browser extensions have been caught collecting a lot more data on its millions of users than they are intended to, including your detailed browsing history.
Continue reading

You Can Still Upgrade To Windows 10 For Free Assuming Your Hardware Can Handle IT, Here's How


Back when Windows 10 was first released, Microsoft allowed users of Windows 7 or Windows 8.1 to upgrade to Windows 10 for free. Microsoft officially ended the free upgrade offer in December 2017, but a method still works that allows you to upgrade an older version of Windows to Windows 10 for free.

Microsoft doesn’t talk about that Windows 10 free upgrade offer anymore, but devices with legitimate Windows 7 or Windows 8.1 licenses could be upgraded to Windows 10 for free using the Windows 10 Media Creation Tool.

To get Windows 10, you’ll just have to download and run Media Creation Tool on Windows 7/8/8.1 and upgrade the PC to Windows 10. After the upgrade, connect to the internet and your older Windows license will be converted to a Windows 10 license.

Continue reading

Netflix account freeze – don’t click, it’s a scam!


Another day! Another Netflix phishing scam!

We’ve written about these scams before, and we’ll probably write about them again…

…for the sadly simple reason that THEY WORK.

They work because scammers know that the less inventive they are, the more believable their messages become.

It’s also a lot less effort to copy genuine content and adapt it just a little than to try to create your own material from scratch.

Continue reading

Best practices to ensure your organization is focused on the right types of risk


All organizations face some type of risk. Risks are determined by organization type, clients, workers, vendors, and logistics, among many other potential factors. Basically, anything that is part of the organization, associated with the organization or contributes to operations represents some level of risk to the organization.

In order to properly evaluate potential risk, an organization should:

Evaluate organizational structure
Identify proper threat intelligence sources and gather useful information
Perform risk assessment
Before we go more in-depth in each of these three steps, let’s look at a quick example below.

Continue reading

How website security and SEO are intimately connected


Learning how to optimize your website can be a challenge. At one time, it was only about figuring out what Google wanted, which was largely keywords. Now, it’s much more complex.

Google is focused on not only delivering high-quality, relevant search results but also on protecting people from malware and unscrupulous websites. Not only that, a hack of your website by others can give Google false information that directly impacts your rankings. That’s why it’s vital for your website to have strong web security if you want to do well in SEO.

Continue reading

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath


Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon.

Cyberattacks—much like the advancement of technology, the interweaving of digital lives among familiars and strangers via social networks, and the broadening adoption of the Internet—are here to stay.

As much as the Internet has changed individual lives on the planet—for better or for worse—it’s changed the way people do business even more. The current reality is that a business is not much of a business if it’s not online. Even local small businesses, such as restaurants, home renovation companies, or dance studios, require some kind of Internet presence to flourish.

Continue reading

It Isn’t Too Late to Upgrade to Windows 10… But It’s Getting Close!


Moving away from Windows 7 is becoming more crucial every day. Is your business still running Windows 7?

This isn’t a good thing, and soon, it’s going to get a lot worse - Microsoft is pulling support for Windows 7 on January 14, 2020. As a result, any business that hasn’t upgraded will very quickly find itself in a tough spot. Why is that?

Continue reading

You shall not pass! Protecting customer information - The Finale of National Cyber Awareness Month


Today, personal data is more important than ever. Lots of companies collect information while doing business, and that means when those companies get hacked, that customer info gets exposed to the world.

Your smarts, though, can make a difference and help protect those people who trust you with their data. Let’s talk about protecting customer information. Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

Continue reading

Latest Blog

Hackers are exploiting a zero-day vulnerability in the Windows OS to take over systems, Microsoft said in a security alert today.The zero-day is located in the Adobe Type Manager Library (atmfd.dll), a library that Microsoft uses to render PostScript Type 1 fonts inside Wind...

Contact Us

Learn more about what Tetratos can do for your business.

19046 Bruce B Downs Blvd
Ste B6 #822
Tampa, Florida 33647