Security & Privacy

5 Ways Your Employees Might Be Putting Your Business at Risk

Employees can be your most valuable asset — and your biggest security nightmare. Often, then unknowingly engage in risky behaviors setting your company up for scammers. Taking work home, for example, might seem innocent enough, but it can put holes in your security defenses. Here are five ways that your employees might be putting your…

Read More »

Twice in A Week: The Miller Group Sees Scams Too

Scams come in all shapes and sizes. Every business is a susceptible target for these ever-improving criminals who try to profit from you or your employee’s mistakes. Case in point, within the last week, The Miller Group received two scam attempts of different types. Luckily, our staff thwarted the efforts but some businesses might not…

Read More »

How to Avoid Falling Victim to Fake Malware Alerts

Suppose you are working on your computer and an alert pops up saying that your computer is infected with a virus. Could you tell whether this alert is legitimate? Don’t feel bad if you said “no”. Cybercriminals have become adept at creating fake malware alerts, so it is sometimes hard to determine real verses fake….

Read More »

Have the Russians hacked your router? The FBI says maybe.

All small office and home office routers, QNAP and NAS devices need to be rebooted to ward off trouble according to a public service announcement from the FBI last month. The PSA stated that Russian hackers have compromised hundreds of thousands of home and office devices with VPNFilter malware. As scary as it sounds, the…

Read More »

Buying New Smartphones for Your Business? Watch out for Preinstalled Malware

In March 2017, a security firm found malware on 36 Android devices purchased by two companies. Several different types of malicious programs were discovered, including the Slocker mobile ransomware and Loki malware. Slocker encrypts your files and requires payment to unlock them, whereas Loki steals data and takes control of devices. Finding malware on smartphones…

Read More »

How You Can Secure Files on a USB Memory Stick

USB memory sticks are great accessories for carrying around files to meetings or different offices. They are often securely stored on a keychain or lanyard, so you’d never think you’d lose one up until you do. Unless your USB memory stick is encrypted, anyone who gets a hold of it can access your information. To…

Read More »

How To Set Up a VPN in Windows 10

As your company grows, you might branch out to multiple offices or shops across a given area. In order to stay efficient, the employees working in those locations need a secure, reliable, fast way to share information across their computer networks. Also, if you have traveling personnel such as a sales team, they need an…

Read More »

Benefits of Remote Monitoring

The Miller Group, like many IT service providers, uses remote monitoring tools to gather information and send reports about our clients’ computer systems. Almost anything can be monitored, from routers and firewalls to virus detection and email services. Here are six benefits of using remote monitoring to keep an eye on your systems: 1. Reduce the…

Read More »

What is Domain Privacy Protection?

What is it? Domain privacy or WHOIS protection (different registrars sometimes refer to it by different names) hides the domain registrant’s personal information from the public WHOIS database. WHOIS is an organization that manages all data regarding domain registration. All registrant details are considered public information, in addition to the nameservers and other simple details…

Read More »