Complete I.T. Blog
Microsoft Warns of a HTML Evasive and Targeted Phishing Campaign
Phishing techniques change at the same rate that security and protection technologies do - it’s a constant cat and mouse game. What is the HTML targeted phishing campaign? Microsoft have spent a year investigating a new invoice-themed XLS.HTML phishing campaign, a...
Complete Security with Complete I.T.
https://www.youtube.com/watch?v=Yt5XkxXqazY
Complete I.T. Network Operations Centre
We have had some exciting changes at CIT recently and we wanted to formally introduce the Complete I.T. Network Operations Centre… The team consists of James Harris, Team Supervisor who has been with CIT 10 years and specialises in Microsoft products both onsite and...
Disaster Recovery and Cloud back up
A few years ago people were constantly asking, what is the cloud? How will it help me? Why would I move to the cloud? Etc… Whilst those questions are still valid more and more people are able to answer them to some degree, whether talking about business or personal use.
A ‘brand’ new look for Complete I.T.
At the beginning of this year we started looking at our brand and website to ensure it was as user friendly and as reflective of CIT as possible. Following 4 client focus groups and feedback from the team it was decided that it was time to bring our brand and website...
Summers here…
I hope you have had an exciting and enjoyable start to 2016. Here at CIT we are constantly looking at ways to both improve our relationships with our clients and our service offering. We carried out 4 client focus groups in different regions that proved very...
Canadian University hit by Ransomware
On the 8th June 2016 the University of Calgary in Canada, had to pay a $20,000 ransom to cyber criminals in order to release their computer systems’ files, after being hit by ransomware. The ransomware installed itself on their machines, taking documents and demanding...
ZCryptor: The Self-Propagating Ransomware You Need To Know About
As if ransomware wasn’t already bad enough, Microsoft is warning users of a self-propagating malware strain known as ZCryptor. ZCryptor can replicate itself and infect additional computers via USB drives (haven’t we already convinced you those are bad?) and network...
Avoid Shadow IT With Total Data Protection
Using consumer file sync and share (FSS) services like Dropbox and Box for business purposes is part of a phenomenon that many have described as “shadow IT,” when systems and solutions are used inside an organisation without explicit organisational approval.
Complete Workstation Management and Remote Management Console
There are some IT services that are simply crucial to any business! As your IT partner, Complete I.T. understand your business, its objectives and have various services and technologies that will allow you to overtake your competition in the business arena, I will be...
The rise of money transfer email scams
The FBI recently posted a warning (https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams) which details how between October 2013 and February 2016 US Law Enforcement received reports from over 17,000 victims of fraud...