Is there a hole in your network security? Unless you’re using an application whitelisting service like ThreatLocker, the answer is “yes”. OTM has witnessed ransomware events that have locked up “protected” networks. Despite implementation of standard security measures including a full featured firewall, email filtering, and endpoint protection, successful attacks used compromised user and administrator…
Read more
About: Gary Windle
PRESIDENT | ONLINE TECHNOLOGY MANAGEMENT, INC. | Gary started Online Technology Management (then known as Online PC Service) with his brother Kevin, a handful of customers and a shoestring back in 1989. His responsibilities have included recruitment, mergers and acquisitions, customer procurement and outreach, and quality control. When asked how the business managed to survive the rapid changes in technology through the years, he cites OTM's enduring focus on great customer service and rapid response times. When he's not working hard to protect your network, he enjoys gardening, traveling, amateur car racing, and spending time with his family.
Recent Posts by Gary Windle
Why have a managed firewall (UTM)? 4 reasons.
We’ve seen it happen. Maybe the person responsible for your company’s IT and firewall management recently retired or left. No one else really ever had to pay much attention to this stuff, so what happens now? Actually, the term “firewall” is dated. If you’re doing it right, it’s actually a Universal Threat Management (UTM) security…
Read more
5 Tips for Detecting and Avoiding a Phishing Attack
Ever wonder why Carmen and Ken get way more malware alerts than any other user on your network? Are they loose cannons creating preventable problems for you? There are a few ways for you to help get this under control. It turns out some people are pretty gullible when it comes to email, because after…
Read more
Is someone getting fake email from you?
“Someone has hacked our email!” We frequently hear from administrators and users freaked out because their contacts are receiving janky email that looks like it’s from them or their company when it most definitely isn’t. Usually that bogus email also includes a link that is oddly and irresistibly compelling for the recipient to click. A…
Read more
Recent Comments by Gary Windle
No comments by Gary Windle yet.