Microsoft Teams Turns One!

On March 12, 2018, Microsoft Teams celebrated its one year anniversary and what and eventful first year it was!  According to Microsoft, around 200,000 organizations in 181 markets (in 39 languages) are using teams to date and we can expect it to rise throughout the year with Microsoft’s additional features and updates to Teams this coming year.

Teams for Intelligent Communications and Collaboration

Being part of Office 365, Teams has been able to take advantage of many of its strength by being able to integrate with many other Office 365 applications while also tapping its 120 million user base.  Teams uniquely delivers on its many features, such as chat-based collaboration, meetings, calling (and soon, full enterprise voice features), at scale with enterprise-grade security and compliance standards to make sure that you are within global standards.  However, to improve on their vision for Intelligent Communications within organizations, Microsoft has announced that they will be implementing the following features within this year:

Cloud recording—Will provide one-click meeting recordings with automatic transcription and timecoding, enabling all team members the ability to read captions, search within the conversation, and playback all or part of the meeting. In the future, it will also include facial recognition, so remarks can be attributed to specific meeting attendees.

Inline message translation—People who speak different languages will be able to fluidly communicate with one another by translating posts in channels and chat.

Cortana voice interactions for Teams-enabled devices—Will enable you to easily make a call, join a meeting, or add other people to a meeting in Teams using spoken, natural language. This functionality will extend to IP phones and conference room devices.

Background blur on video—The ability to blur your background during video calls will allow other meeting attendees to focus on you, not what’s behind you.

Proximity detection for Teams Meetings—This feature will make it easy for you to discover and add a nearby and available Skype Room System to any meeting.

Mobile sharing in meetings—Meeting attendees will be able to share a live video stream, photos, or the screen from their mobile device.

In addition to this, Microsoft will be adding new enterprise-grade calling features in Teams which will include consultative transfer and call delegation and federation.  Another feature that will be introduced is Direct Routing which will allow you to use your existing telephony infrastructure with Teams for calling.  To learn more about this you may read the original article here or you can contact us at 893-9515 to ask us directly!

Reach the “TippingPoint” in your Business’ Cyber Security with Integrated Advanced Threat Protection

The Cyber world is dark and dusty,organizations are facing the most complicated scenarios to solve their security puzzle to protect the data privacy. Every day, cyber criminals create new ways and multiple advanced techniques to break the security barriers, how strong is your defense gate against these unknown attackers?

Step into the future of security with Trend Micro, to know more on how to get a 360 degree view of defense approach against sophisticated threats today and in the future.

Join us on February 21, 2018 at Outback Steakhouse Glorietta 4 as we learn more about Trend Micro’s Tipping Point and how it can help your business defend against today’s security threats!

To register you and your company to attend this seminar, please contact us at 893-9515 and we will be happy to assist you!

Microsoft Teams: Improving an already good Collaboration tool

It’s been close to 10 months since Microsoft has introduced Teams in an effort to help their customers improve their collaboration within the workspace.  Through these months, Microsoft has been slowly improving Teams through their observations and user feedback.  One example of this was the integration of third party applications such as Trello and SurveyMonkey.  Even now they are still updating Teams, recently they have released a new update in which they have integrated exciting new features which will surely help your company’s collaboration efforts!

New ways to utilize your apps in Teams

Include information from an app in a conversation

Be able to discuss content from a different app directly in Teams with the latest update.  Just like putting an emoji or GIF in the chat, you’ll be able to search and post integrated app information into chat and channels.  Be able search for a specific task in Trello, a work item in Wrike, or even a weather forcast, and even integrate them it into an interactive card.

Access a personal view of your apps

With the update, you can now easily access apps you frequently use and even see all items on those apps such as tasks in planner, issues in Jira Cloud and even conveniently find items you recently used such notebooks from OneNote.  This is made possible due to the addition of the personal apps space.  In addition, you can also find a new app in this space called Who, a new app powered by Microsoft Graph, which enables you to search for people in your organization by name or topic.

Find apps for Teams in the new Store

To make discovering and finding apps simpler in Teams by allowing users to search for apps by name, category, and integration type (like bots, tabs, connectors) in their new store.

Command apps, take quick actions, and search—all from the command box

Command apps from the command box

In the latest patch, Microsoft has added the function to query or command an app from the command box.   You are now able to search information in an app and easily place the results into a chat or channel in Teams.  More functions will be added overtime, one function they are working on is to create a task in your project management app over the Teams command box.

Take quick actions with slash commands

A convenient new function added to Teams would be the addition of slash commands to help you execute shortcuts quickly.

Contact us at 893-9515 to learn more about Microsoft Teams and how it can help you collaborate better with your own Team!

HPE GEN10 Servers: Helping you secure your IT Environment

HPE Proliant Gen 10 servers have been getting the attention of the US government sector.  A review by FedTech recently came out which talked about how HPE ProLiant DL380 servers were able to secure almost all federal IT environments.  With a range of flexible configurations, which include the function to be part of a private cloud, facilitate deployment of containers, anchor the core of virtual machines, store database applications, and even process Big Data transactions.

Here’s a sampling of the computing firepower generated by HPE ProLiant DL380 Gen10 servers:

  • Intel® Xeon® processors with up to a 71% performance gain and a 27% increase in cores.
  • HPE 2666 MT/s DDR4 SmartMemory—supporting 3.0 TB and up to 11% faster than 2400 MT/s.
  • Support for 12 Gb/s SAS and up to 20 NVMe drive.
  • HPE Scalable Persistent Memory—offering unprecedented levels of performance for databases and analytic workloads.

Remove the gaps hackers exploit

A main feature that FedTech has emphasized on the HPE ProLiant DL380 would be the IT security measures it provides.  A Silicon Root of Trust leverages an HPE silicon-validated boot process to ensure the servers can only be started using code from an immutable source.  An anchor for the boot process that’s rooted into the HPE silicon cannot be updated or modified in any way. By combining this foundation with a cryptographically secured signature, the ProLiant DL380 servers remove the gaps hackers exploit.

Even against firmware threats like rootkits, malware, and denial of service attacks, HPE ProLiant DL380 servers stays secure and virtually hack proof.  This is even more so when combined with intrusion detection devices that can provide an audit log alert if someone tries to get into the server chassis and implant compromised codes.  This is made possible due to the Silicon Root of Trust hardwired into the HPE iLO5.

With a series of validation checks between the various system components and the firmware upon the system power up, this ensures the HPE ProLiant DL380 servers are free of any modifications to its server’s essential firmware.  The ProLiant DL380 servers run millions of lines of firmware (like all servers) even before the operating system (OS) even starts.  Checking if the lines of code for the firmware are free of any malicious attacks or malware is the main value the silicon root of trust provides.

Contact us at 893-9515 to learn more about the the HPE Gen10 servers!

Increase your Network Visibility to better use your business bandwidth with Cisco Meraki!

Does your business have enough bandwidth?

Many businesses today are looking for ways to upgrade their current bandwidth because of user feedback, they complain mostly about slow browsing speeds.  Little do they know that there is a certain user in the office that is “torrenting” on the network, which results to bandwidth hogging and can even put the business at risk.

However, administrators can now feel reassured with Cisco Meraki’s Layer 7 application fingerprinting which gives them a better view of their network. Network administrators/managers can rely on this level of visibility every day to see beyond the size and rate of data transfers on their networks and gain insight into the actual behavior of their users. It’s useful to see patterns in large spikes of traffic on the network, but it’s even better to know whether those spikes are coming from online backup or from BitTorrent.

What’s better than traffic Visibility?  Traffic shaping!

So now the administrators have identified which applications (and most importantly, which users) are using more bandwidth than necessary, what can you do about it?

You can now create application-specific shaping policies for total control over your wired and wireless network. With the built-in Traffic Shaper in Cisco Meraki, shaping policies can be created that apply per user bandwidth limits for specific applications such as video streaming sites, as well as apply QoS (Quality of Service) priority levels at both Layer 2 and 3 to make sure your critical traffic gets prioritized across the network.

The Cisco Meraki portfolio includes wireless access points, switches, security appliances, and mobile device management solutions. What sets Cisco Meraki apart is that all of these are centrally managed from the cloud. This makes them significantly easier to deploy and manage than traditional networks.

Contact us at 893-9515 to try Cisco Meraki for yourself and discover the power of cloud networking today!  

Security Advisory: Meltdown & Spectre Vulnerabilities

Over the past few days, you may have heard of the new vulnerabilities that has been uncovered, Meltdown and Spectre.  These vulnerabilities affect all modern processors, meaning your business machines and even personal gadgets that use processors are affected which puts you in risk of potential attacks.  Below is a brief explanation of what exactly Meltdown and Spectre are:


Meltdown is a hardware vulnerability in processors (Intel x86 microprocessors and some ARM based microprocessors) which allows attackers to use programs to access your computer’s memory.  With this access, they are able to gain sensitive data from your other applications within your system.


Spectre is a hardware vulnerability in modern processors, which attackers can use to trick error-free programs, which follow best practices, into leaking their secrets.  Safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre.

However, since the vulnerability has been announced it means that so have the solutions.  Below are the steps in which you need to take fix these vulnerabilities:

1. Update your Processor Firmware

Processor manufacturers have already released firmware updates to fix these vulnerabilities, however they said that they would only be releasing updates for processors within the last 5 years.  Below are the current firmware updates you will need per vendor (note that we will be placing more updates as they come):


For ProLiant Gen10 products (except for the ProLiant DL385 Gen10), update to System ROM Version 1.28.

For the ProLiant DL385 Gen10 server, update to System ROM Version 1.04.

For ProLiant Gen9 series servers, update to System ROM Version 2.54 (except for the ProLiant DL20 Gen9 or ML30 Gen9)

For the ProLiant DL20 Gen9 or ProLiant ML30 Gen9 server, update to System ROM Version 2.52.

For ProLiant Gen8 series servers, update to a System ROM version dated 12/12/2017.

For the ProLiant m710x server cartridge, update to System ROM Version 1.60

For the ProLiant m710p server cartridges update to the System ROM version dated 12/12/2017.

Click here and place your HPE product to find the firmware patch you need.


Below is a table of known Cisco products affected by the vulnerabilities, to download the update, you will need to click on the Cisco Bug ID and log in to your Cisco account to access it.  We will be updating this table when updates are available.

Product Cisco Bug ID Fixed Release Availability
Routing and Switching – Enterprise and Service Provider
Cisco ASR 9000 XR 64-bit Series Routers CSCvh32429
Cisco 800 Industrial Integrated Services Routers CSCvh31418
Cisco NCS 1000 Series Routers CSCvh32429
Cisco NCS 5000 Series Routers CSCvh32429
Cisco NCS 5500 Series Routers CSCvh32429
Cisco XRv 9000 Series Routers CSCvh32429
Unified Computing
Cisco UCS B-Series M2 Blade Servers CSCvh31576 Fix pending
Cisco UCS B-Series M3 Blade Servers CSCvg97965 (18-Feb-2018)
Cisco UCS B-Series M4 Blade Servers (except B260 and B460) CSCvg97979 (18-Feb-2018)
Cisco UCS B-Series M5 Blade Servers CSCvh31577 (18-Feb-2018)
Cisco UCS B260 M4 Blade Server CSCvg98015 (18-Feb-2018)
Cisco UCS B460 M4 Blade Server CSCvg98015 (18-Feb-2018)
Cisco UCS C-Series M2 Rack Servers CSCvh31576 Fix pending
Cisco UCS C-Series M3 Rack Servers CSCvg97965 (18-Feb-2018)
Cisco UCS C-Series M4 Rack Servers (except C460) CSCvg97979 (18-Feb-2018)
Cisco UCS C-Series M5 Rack Servers CSCvh31577 (18-Feb-2018)
Cisco UCS C460 M4 Rack Server CSCvg98015 (18-Feb-2018)


BIOS updates for PowerEdge Server Products

Generation Models BIOS version
14G R740, R740XD, R640 1.2.71
R540, R440, T440 1.2.71
T640 1.2.71
C6420 1.2.71
FC640, M640, M640P 1.2.71
C4140 1.0.2
R940 1.2.81
T30 1.0.12
Generation Models BIOS version
13G R830 1.7.0
T130, R230, T330, R330 2.4.1
R930 2.5.0
R730, R730XD, R630 2.7.0
C4130 2.7.0
M630, M630P, FC630 2.7.0
FC430 2.7.0
M830, M830P, FC830 2.7.0
T630 2.7.0
R530, R430, T430 2.7.0
C6320 2.7.0

BIOS update for Dell Datacenter Scalable Solutions (DSS)

Models BIOS Version
DSS9600, DSS9620, DSS9630 1.2.71
DSS1500, DSS1510, DSS2500 2.7.0
DSS7500 2.7.0

2. Checking if your registry is compatible with your OS updates (Windows)

There are some third party anti-virus software that are currently incompatible with the latest patch updates from Windows.  If you are unable to update your OS due to this reason, it is recommended that you modify your registry to fix this.  However we highly recommend that you also backup your registry before you manually edit it as using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system.  Below is the registry key to be set:


Subkey=”SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat” Value=”cadca5fe-87d3-4b96-b7fb-a231484277cc”



For Trend Micro users, there has been a patch release for their products in which enables the ALLOW REGKEY (the above code) automatically.  This however is not the fix to the vulnerabilities and you have to update your OS as this patch will not update your OS but allow you to update.

Additionally, note that per Microsoft, even clients that do not have active anti-malware or security software installed may still be required to apply the specific registry key before the security patches can be obtained from Windows Update.

Product Updated version Notes Platform
OfficeScan XG (all versions including SP1) – CP 1825-4430 Readme Windows
11.0 SP1 – CP 6496 Readme Windows
Deep Security Deep Security Agent 10.0.0-2649 for Windows (U6) Readme Windows
Deep Security Agent 9.6.2-8288 for Windows Readme Windows
Worry-Free Business Security 9.5 CP 1447 Readme Windows


3. Updating your OS (Operating System)

Below are the updates that are currently out for Windows OS for both Servers and Desktop (this will be updated as more updates are released):




Windows Server, version 1709 (Server Core Installation) 4056892 Security Update
Windows Server 2016 (Server Core installation) 4056890 Security Update
Windows Server 2016 4056890 Security Update
Windows Server 2012 R2 (Server Core installation) 4056898 Security Only
Windows Server 2012 R2 4056898 Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4056894 Monthly Rollup
4056897 Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 4056894 Monthly Rollup
4056897 Security Only
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4056894 Monthly Rollup
4056897 Security Only
Windows 8.1 for x64-based systems 4056898 Security Only
Windows 8.1 for 32-bit systems 4056898 Security Only
Windows 7 for x64-based Systems Service Pack 1 4056894 Monthly Rollup
4056897 Security Only
Windows 7 for 32-bit Systems Service Pack 1 4056894 Monthly Rollup
4056897 Security Only
Windows 10 Version 1709 for 64-based Systems 4056892 Security Update
Windows 10 Version 1709 for 32-bit Systems 4056892 Security Update
Windows 10 Version 1703 for x64-based Systems 4056891 Security Update
Windows 10 Version 1703 for 32-bit Systems 4056891 Security Update
Windows 10 Version 1607 for x64-based Systems 4056890 Security Update
Windows 10 Version 1607 for 32-bit Systems 4056890 Security Update
Windows 10 Version 1511 for x64-based Systems 4056888 Security Update
Windows 10 Version 1511 for 32-bit Systems 4056888 Security Update
Windows 10 for x64-based Systems 4056893 Security Update
Windows 10 for 32-bit Systems 4056893 Security Update
Microsoft SQL Server 2017 for x64-based Systems (CU) 4058562 Security Update
Microsoft SQL Server 2017 for x64-based Systems 4057122 Security Update
Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 (CU) 4058561 Security Update
Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 4057118 Security Update

4. Updating your browsers

The last step would be to make sure that your internet browser is patched to the latest version.  Below are a few of the most used browsers and the versions they need to be updated to:

Mozilla – Firefox 57.0.4

Internet Explorer/Microsoft Edge – Included in the latest security update of Windows KB4056890 (OS Build 14393.2007)

Again more updates will be posted as soon as the fixes are released by the respective vendors.  If you need more details or help in implementing the said solutions from vendors, please do contact us at 893-9515 and we will do our utmost to help!

Manage your Data and Analyze your Data Effortlessly and Efficiently with Pure Storage and Oracle®

In today’s business, storing data properly has become business critical.  Analyzing the right data against other data types (internal or by global standards) can be key in improving your business and putting it in the right direction.  This process is known as Digital Transformation.  To begin the transformation, companies must be able to store, access and analyze their data efficiently and as fast as possible so that they can gain insights before their competition does.  Just asked yourself, are you analyzing your business data like customer support emails or their chat logs?  If not it would be best if you started now before your competitors do.  Below is a simple guide to mapping your data with data management application Oracle®:

  1. Data value starts with operational data (transactions), structured data stored in Oracle® Database.
  2. Data becomes more valuable with the addition of data warehousing and business intelligence to provide descriptive analysis of your business based on historical data.
  3. Data value is greatest when you combine all of your data assets — structured and unstructured — to gather predictive and prescriptive analytics from different sources, such as the Internet of Things (IoT) and other application data to fully participate in the era of digital transformation.

Below are ways in which Pure Storage can help your infrastructure make Oracle® effortless and efficient when analyzing your data:


  • All-flash solutions take half as long to deploy as other storage solutions and with Pure Storage’s solution, you can be sure of its simplicity and validity as they have been fully tested and validated.
  • Fast and efficient Pure Storage snapshots let you automate the copy, clone, and refresh processes of an Oracle® database and reduce the time to copy and clone up to 90%.
  • Pure Storage solutions let you run Oracle® databases for development, test, quality assurance (QA), and production for online transaction processing (OLTP) and online analytical processing (OLAP) workloads on the same Pure Storage platform.


Data Reduction

  • Pure Storage solutions include both in-line lossless deduplication and compression for ultimate data reduction, which can help data reduction of 3 – 5 times the conventional Oracle® data types — such as number, date, char, and varchar.
  • By running your Oracle® solutions on Pure Storage, you not only compress data to lower its footprint and reduce storage needs, you also do away with the need for Oracle® compression.


  • Pure Storage all-flash solutions improve performance by orders of magnitude, with sub-millisecond latency, no disruptions, and no effect on performance for upgrades or maintenance.
  • Pure Storage uses flash instead of disks, which eliminates the performance delays caused by the inherent latency of disk storage, which means you can run Oracle® OLTP and OLAP solutions in parallel on the same Pure Storage all-flash storage platform.

Click here to learn more about Pure Storage on Oracle®, to learn more about Pure Storage visit our product page or contact us at 893-9515!

New updates for XenApp and XenDesktop for November 2017

November was a great month for Citrix users as updates for XenApp and XenDesktop, which you can download now with the release of patch v.7.16. Updates (as well as compliance information) for the ever popular XenApp and XenDesktop 7.15 LTSR was also added just this November.  Below is a summary of some of the new updates:

User Experience

Significant user experience enhancements for both XenApp and Xendesktop Service and on-premises deployments in v.7.16, which was first introduced on our cloud services:

Real time user experience optimizations with Adaptive Transport

Only Citrix can dynamically adjust its HDX Adaptive Transport technology in mid-session to adapt to changing network conditions in real time to deliver the best possible high-definition user experience.

Introducing full browser content redirection, not just HTML5 video redirection

 Extending the capabilities of our content redirection technology, XenApp and XenDesktop now enable the full contents of a web browser, not just the HTML5 video, to be rendered on the client for maximum server scalability and optimal user experience.

Enhanced multi-monitor graphics quality with Citrix Receiver for Windows

Many users leverage multiple monitors across their virtual app and desktop sessions to optimize productivity. Now Citrix Receiver for Windows 4.10 makes multi-monitor configuration easier than ever.

Extending the power of Windows 10 S with Citrix Receiver

Windows 10 S is a streamlined OS for security and superior performance that only runs applications delivered from Microsoft Store. This means many existing Win32 apps will not run locally on Windows 10 S. The most secure way to get access to these business-critical Win 32 apps is through Citrix XenApp.

Improved graphics experience with H.265 and integrated 3D Pro VDA installer

With ever-increasing improvements to video resolution, Citrix is extending its codec capabilities by incorporating H.265 codec into XenApp and XenDesktop Platinum edition. By leveraging new H.265 hardware with XenApp and XenDesktop with NVIDIA GPUs, you will notice improved graphics performance while reducing bandwidth consumption by up to 50%.

Expanding our industry-first Windows Continuum virtual desktop experience

 XenDesktop, with XenServer, was the first and only desktop virtualization solution to deliver Windows Continuum experience with Windows 10 virtual desktops. Now, XenDesktop is expanding its industry-leading Windows Continuum virtual desktop technology by enabling a Windows 10 virtual desktop to recognize when the user switches from a physical tablet to a physical desktop and automatically toggle the virtual desktop between tablet and desktop mode.

To read more about the November updates, please visit the original article here!  You may also learn more about Citrix on our product page or directly contact us at 893-9515.

VeloCloud Kept Users Connected during the Level 3 Outage!

Internet connectivity is now easily one of the most critical components in a business now.  Without it, many aspects of companies would not function and result in many lost opportunities and big loss to profit.  One such example would be what happened on November 6, in which Level 3 an ISP backbone used by many internet providers in the US went offline for 90 minutes.  This was a disaster to many as they panicked due to the huge impact it had to their business and livelihood.  However, this was not the case for SD-WAN users. In fact, many VeloCloud users were not even aware of an internet blackout until the next day.  This is thanks to VeloCloud’s Dynamic Multipath Optimization.

With Dynamic Multipath Optimization (DMPO), all transport links are monitored on a continuous basis and when issues arise, traffic is steered proactively, dynamically and automatically on a sub-second basis to an alternative transport path(s).  This dynamic steering was what prevented VeloCloud users from experiencing the 90-minute blackout other Level 3 subscribers felt.  VeloCloud’s sub-second steering allows independent decisions in both uplink and downlink directions without introducing any asymmetric routing to avoid impacts from brownout or blackout conditions.

Below are some examples of the impact of the Level 3 outage on VeloCloud Cloud-Delivered SD-WAN:

First example is of a customer with dual Comcast links and a single Verizon LTE link in active mode.  From the Quality of Experience screenshot, you can clearly see the packet loss and jitter indicated by the yellow and red bands.  The long stretch of red from the Comcast links was the portion of the day when Level 3’s outage happens, the red band of course meaning there was almost no passable way for traffic to go through that link.  From the overall VeloCloud enhancement, you can see that the customer experienced almost no downtime of their connections even though the Comcast links were in the red for so long.

The second example will be a VeloCloud user who uses a broadband cable internet link and a DSL link.  The Comcast cable link again is using Level 3 as its ISP backbone.  From here, we can see an even better result as the customer had no downtime whatsoever as there was no red band after the VeloCloud enhancement even when the Comcast link had almost no connectivity it was still able to get a quality score of ever 9.94.

To learn more about how VeloCloud can help your business, please visit our product page on VeloCloud or contact us directly at 893-9515!

Cryptocurrency Malware CoinHive becomes the 6th most common Malware

CoinHive, the cryptocurrency miner that made the news in September when it was discovered that the EITest campaign was using it to trick victims into paying for their services or handing out financial data via tech support scams.  However, a new report from reveals that the malware is becoming more widespread as it reaches 6th place on the list of most common malware in the world.

CoinHive works by providing website owners and operators a Javascript code that they can embed into their site. What this code does is that it covertly uses the website visitor’s processing power to mine the Monero cryptocurrency. This give both sides mutual benefits, as CoinHive keeps a portion of the mined amount, while the website owner keeps the rest. Unfortunately for website visitors, they won’t know that their processor is being used without their knowledge. While Coinhive itself is a legitimate company, its rather dubious method of operation often lends itself to abuse by malicious threat actors.

While Cryptomining malware is still not as well known as other malware like ransomware, the report from Coindesk is alarming as it shows that this threat is growing fast.   Stealthy and non-intrusive are attributes of cryptocurrency mining that might be helping in its rapid growth.  Decreased performance and latency caused by the cryptocurrency malware are annoying but can be hard to pinpoint to them as the cause.  Also, with multiple infected systems, the miner essentially gains more and more personal miners for himself without the computer owners knowledge.

Defending against CoinHive

Users who want to prevent CoinHive from using their resources may do the following:

  • Block Javascript-based applications from running on their browsers
  • Implementation of best practices to avoid engineered schemes such as the EITest campaign
  • Regularly update and patch your software (especially on your browsers)

Users should also look into effective security solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security, which protect end users and businesses from threats by detecting and blocking malicious files and all related URLs. Trend Micro™ Smart Protection Suites deliver several capabilities like high fidelity machine learning, web reputation services, behavior monitoring and application control that minimize the impact of this cryptocurrency miners and other threats.

Learn more about Trend from our Product page or contact us at 893-9515!