fbpx

When Looking for Reliable I.T. Look for a Manged CIO

How Can You Find A Reliable IT Support Company That Will Customize Their Services To Meet Your Business Needs?

This isn’t a fairy tale. It’s a true story. 

 

Once upon a time, in a story that might sound awfully familiar, there was a business owner who wanted to find a trustworthy and reliable technology support provider. First, she tried this IT company.But they never returned her phone calls.

Then she tried another IT company.  But their prices were way too high.

 

Finally, she found an IT company that would customize their services especially for her business. And it was just right.  Now, what’s the moral of the story? Don’t put your trust in just any IT company. But, how do you begin your search?

 

How long have they been in business?  How large is their IT company?

 

Don’t use any company with less than three years of experience in the solutions you use. This will weed out a few right away.

 If it’s a small IT company, your business will probably be higher on their priority list, although, large IT companies can offer a broader base of experience and knowledge.  Their resources will be more expansive as well. It’s up to you to weigh the pros and cons here according to your organization’s requirements.  

What are their IT staff’s qualifications and certifications?

A reliable IT provider should have lots of info regarding the certifications their technicians hold. Why are certifications important?

According to CIO magazine, using certified professionals is beneficial to your business:

 

“44 percent of IT decision-makers say certifications result in employees performing work faster, 33 percent said it results in more efficiency when implementing systems and 23 percent say it helps deploy products and services faster with fewer errors.” 

 

If you use both Apple and Microsoft solutions, make sure they are certified on both. 

 

Also, ask if they provide continuing education for their techs. Do they attend industry events to update their skillsets?

 

Have they served businesses in your industry? Can they support the applications you use?

 

Ideally, your technology support provider should have experience in what you do. Find out if they’ve worked in industries and with businesses of the same size. Ask them for a reference list of customers from your industry to be sure.  If not, determine if the work they’ve performed for others may align with your needs.

 

Also, think about your employees, the type of work they do, and which applications they access in the typical workday. Can the IT company support these applications?

 

You may use specially-built applications to handle workflows. Your IT provider should understand how your business works, the technology you use, and be able to support it.

 

How will they help you grow your business with technology? Do they offer outsourced CIO services?

 

Ask how they’ll help to support your growth goals. Just as you have a one-year, three-year, or five-year business plan, they should provide strategic IT planning that aligns with your business objectives.

 

An Outsourced CIO will ensure that your technology meets your growing business demands. 

  • They will develop a thorough understanding of your company and technology infrastructure.
  • Offer suggestions for new IT solutions that can promote your success.
  • Develop an IT Strategic Plan that aligns with your goals and your budget.
  • Perform ongoing evaluations and performance metrics to ensure your business stays on track with your tactical technology plan.

 What kind of service can you expect? 

  • Do they offer 24/7 service with a live person on the other end of the phone, chat, or email?
  • Is their help desk staff qualified to address your issues right away?
  • Will they remotely monitor and maintain your IT system 24/7?
  • If they can’t fix your problems remotely, how long will it take for a technician to come to your site? Is this backed by a written Service Level Agreement?

What is and isn’t covered in their contract?

 

Do they provide fixed-fee services? What’s included? Find out what they don’t offer that you might require. 

 

Are there extra costs for services, and if so, how much are they? You deserve a reliable IT partner who will work to provide an IT system that’s secure, efficient, and increases your staff’s productivity.

 

What about cybersecurity? How will they protect your IT assets and data? 

  • Be sure they provide a layered cybersecurity solution to protect all of your computers and network from unauthorized access, malware, spam, viruses and other forms of cybercrime.
  • Will they provide Security Awareness Training for your employees to ensure they don’t fall victim to hackers and phishing emails?
  • Will they remotely monitor your network for security threats on a 24/7 basis, block these threats and eliminate them?
  • Do they provide vulnerability assessments?
  • If you are in healthcare, are they HIPAA compliant themselves? As a business associate, they must be. Will they provide HIPAA or other industry regulatory compliance support?
  • What about your mobile devices? Do they provide Mobile Device Management?

With the increase of more sophisticated cyber-attacks today, make sure you’re educated about cyber threats. Your IT company is responsible to ensure that you are armed with the best protection available to safeguard your data and IT infrastructure against cyber-crime.

 

Ask about Business Continuity and Disaster Recovery – and the Cloud

 

Do they provide a secure cloud-based backup service?  How often do they test the disaster recovery plan? Will they perform tests to estimate the recovery time and the impact of potential failure?  

 

Speaking of the Cloud, do they have Cloud Consultants on staff who can help you choose the right solutions for your business? Can they migrate your technology to the Cloud?

 

Finally, ask them how much everything will cost. 

Make sure their IT Service & Support Plans align with your budgetary requirements.  

If they won’t customize their services to meet your needs, the story’s not over yet.  Keep looking for the reliable IT Support Company that’s right for you.

Call Today 570-634-5350

Fill out the Form Below for a Free No Strings Business Technology Assessment​










Not Feeling the Love from my Current IT ProviderBeing Billed Too Much for what they are providingJust an Honest Second OpinionWe Want you to take over our Service



Please prove you are human by selecting the Truck.




Want to Know More?


Top 3 Reasons to Replace Your Current IT Company


How To IT Budget

Email Wrapped in Bacon(Security)

Yes you are seeing this correctly it is Office 365 wrapped with Bacon. Why? Bacon makes everything better and here at Underdog, all our services are wrapped around security so what better way to illustrate this.

OK, Everyone knows you can buy Office 365 for roughly the same price where ever you go – the price is set by Microsoft. In fact you can purchase directly from Microsoft.

Then why don’t you do that? Well some places do those that do not want to deal with an I.T. company. But if you have ever tried to compare Microsoft plans you nearly go blind looking at all the fine print. So how do you know if you got the right plan for your business? Well if I want email I pick office 365 essentials, if I want desktop apps I can pick Office 365 Premium. If I want Email Security maybe I pick e3 or e1 or on and on and on and you get the Idea.

When starting Underdog Computer and Network Support my main goal was that every service we provide will be wrapped in security. Why? I don’t want my customers to choose a plan because it was cheaper and the reason it was cheaper was because it didn’t include any security options. The internet is a scary enough place already and everything we do these days involve the internet in some way. I want my clients protected! After 25+ years of doing this I hate the 12 am or 5 am panic calls.

We put together a pricing structure that is built around Office 365 Email. Even if you have Office 365 already or you have professional email addresses the @yourdomain.com) that is fine you can still take advantage of these packages. We can convert them over to our system. However if you are still doing business as @ptd.net @gmail.com @yahoo.com @comcast.net or any other public email provider. You should seriously consider changing. 

You can purchase these bundles in increments of 1 pack or 5 pack. So how does it work? If you have 15 employees you would purchase (3) 5 packs. This gives you 15 email addresses. If you have 16 employees you could purchase (4) 5 packs or (3) 5 packs and (1) 1 pack. We would advise you what is best for your business.

So what is included with your Business Bundle:

Professional Email addresses @yourdomain.com

1 Email Address for every user with unlimited aliases and groups

1 subscription to Microsoft Office which includes Outlook, Word, Excel, Powerpoint, Publisher, One Note and Access for every user

Ok so far that is not any different than anyone else offers. Here is where it gets interesting

We add email SPAM filtering both inbound and outbound

For added security 2 form authentication

Email Encryption (Email Encryption is when you want to send sensitive information such as bank account numbers and social security numbers etc. You encrypt with a special lock that only the intended recipient will have the key)

If that wasn’t enough we added Office Protect which includes security policies for email, monitoring and alerts of suspicious mailbox activity like logons or questionable messages being sent or received. If your email is being forwarded which is a sign of someone hijacking your email account.

Email Archiving, Web access so you can access your account from anywhere and also Mobile email so you can send and receive email from your phone with all the protections you get from a desktop. Remember I said all our services include security. This is no exception on top of the email security we have built in we are adding in desktop security. We have included Patch Management which applies critical and security updates to your computer 1 per user . We have included PC Antimalware/Antivirus and PC Remote Monitoring and Remote Remediation 1 per user. And to round it all off we have provided up to 1 GB shared space online and 1 GB of pooled backup space.

Ok so if you were to price this all out separately

Office 365 with Desktop Apps is $18.95

Office Protections which includes the monitoring and threat protection of the mailbox is $15.00

Total Protection Gold which includes Antimalware/Antivirus, Website Protections, Unlimited Remote Support is $50.00.

These items alone would come to $83.95 – for a single bundle its $65 23% savings and if you purchase the 5 pack bundle it is $50/user which is a 41% savings.

Call Today 570-634-5350 to get started!

 

Underdog Computer and Network Support – Never Fear, We Fix I.T. Here.
















Please prove you are human by selecting the Car.




We all like to save money in our homes. An entire industry revolves around the “Do It Yourselfer” the weekend warrior. Some of us are good at working on cars, we fix our own and as a favor for a pal and maybe a little cash we do it on the side. Lots of people have Side Gigs because they are better at certain things that aren’t their main vocation. Of course there are people who fix computers on the side. 

As Humans we must know when we are over our heads, when a particular project might need the touch of an expert. When it comes to businesses that rely heavy on computers you need to think twice when letting your cousins son work on your computer because “He built a gaming computer” or The guy who works for UPS during the day but moonlights working on computers because he knows a few things. 

I know on the surface computers appear to have gotten easier to work with. Everything has moved to the cloud, networks and networking has gotten a lot less complicated. The couldn’t be further from the truth. The fact is things have gotten more complicated and dangerous. There are more hackers, viruses, and cyber crimes then ever before. Every day you hear about a companies data breach. At the time of this writing Wells Fargo one of the biggest banks had a major outages. 

If you are saying well those are big businesses what does that have to do with my small business. Consider this Example. Small Fictitious company Jones and Sons a construction company with about 15 employees. Jones and Sons has a file server, uses cloud based emails and has 15 computers networked together and some networked printers. Jones Sr used to use a dedicated IT company for all their computer needs but since retiring and leaving the business to Jones Jr. they do a lot more themselves. Jones Jr grew up with computers so he knows a lot about them. He maintains the computer network. 

But now he is running the company and he doesn’t have a lot of time to put into the computers. But they seem to be running ok so he isn’t concerned. 

One day they get hit with a Crypto Virus which encrypts all their data! How did it happen, well their commercial grade firewall went bad so Jones Jr went to Staples and bought a residential firewall. All the commercial grade antivirus expired so he installed one of those free antivirus solutions(The ones that say it is illegal to install in businesses). 

Most of the computers are still windows xp “Because it doesn’t matter, all their stuff is in the cloud so these are just dumb machines” and the more modern computers are running the home version of the operating system and have never been patched. 

Ok what about backups? Someone has been swapping out the tapes everyday surely we can restore from those. NOPE, they havent been working in 3 years. All the financial data, documents are all gone.

For Jones and Sons the cost of downtime is going to be HUGE! Of course this is an exaggeration but it is not uncommon. 

Similarly there are business that still engage with I.T. companies on a Time and Material Basis(Break/Fix). They only call when somethings broken to get it fixed. While these companies are a bit smarter because they at least recognize they need a professional(sometimes) – they still waste time and money. Because they anticipate having a unexpected cost they try to do whatever they can to avoid it. They may have an “Internal I.T. person because they know more then everyone else” . Because they don’t have an ongoing relationship with an I.T. company it may take a while to get someone to respond meaning if the problem is effecting your entire business you are out of business until someone responds. 

Managed I.T. Services is more than paying a monthly fee. It is about letting you get back to the business of your business. Letting us handle your Technology. Your are an expert in what you do, we are an expert in Technology. 

  • Because you pay a monthly fee there are no unexpected costs.
  •  Because you have ongoing relationship downtime is actually reduced 
  • Because we have an active ongoing role in your business we can advise you on how to steer your technology
  • Reduce Downtime, Reduce Wasted Employees Time – Save Money!

Contact us Today for a Free No Strings Business Technology Assessment Valued at $950.00










Not Feeling the Love from my Current IT ProviderBeing Billed Too Much for what they are providingJust an Honest Second OpinionWe Want you to take over our Service



Please prove you are human by selecting the Cup.




Bots turning your Computer into a Zombie

Hello Everyone! Carmine Corridore of Underdog Computer and Network Support! Back with another video blog. This week I will be teaching you about BOTS! Turning your computer into a Zombie! This is part 3 of my 3 part educational series on keeping safe on the internet.

Let’s get started!

BOTS! You may have heard of Bots before or this may be your first time but Bots are just as dangerous as malware and phishing if not more than because, it makes you unwillingly involved in criminal acts!

So what is a BOT? A bot is a piece of software that performs automated tasks by running scripts over the internet. It performs these simple and repetitive tasks much more quickly than a human sort of like a roBOT. I am sure this is where the term comes from. Most bots are harmless and crucial for making the internet useful like chat bots, auction bots, web crawlers or spiders. Like anything else, Bots can be “weaponized” or turned malignant and destructive when deployed by cyber criminals.

I am a history buff and I use history to see how something evolved.  You know the old saying if you don’t know your history you are doomed to repeat it. I love to look back and see how certain technology came to be and how it evolved in this case into something bad.

Some say Bots began all the way back with Greek Mythology. But we are not going that far back. Lets go to 1950’s.

In 1950, computer scientist and mathematician Alan Turing developed the Turing Test, also known as the imitation game It’s most primitive format required three players — A, B, and C.

Player A was a machine and player B was a human. Player C, also a human was the interrogator, by asking a series of questions would try to determine who the human was. However, there was a problem. At the time, databases were highly limited, and could therefore only store a certain amount of human phrases. That meant that the computer would eventually run out of answers to give Player C, eliminating the challenge and prematurely ending the test.

One of the most significant AI developments of the 1960s was the development of ELIZA — a bot, named in part for the Pygmalion character, whose purpose was to simulate a psychotherapist. Created in 1966 by MIT professor Joseph Weizenbaum, the technology was limited, to say the least, as was ELIZA’s vocabulary. AI continued advancing in the 80’s and 90’s but most of it for scientific and government focused.

In the 90’s the shift began towards the consumer market, if you remember some of the games from the 90’s Simon Says, I took a lickin from a chicken and others. Then in the late 90’s around 1996, Tamagotchi a computerized handheld pet hit the market, which required digital care to keep it alive.

As the internet became popular so did the use of bots. As I mentioned earlier you had internet bots called crawlers or spiders that went and “crawled” through a website and harvested all the links to categorize in a search directory(remember those).

So that doesn’t sound so bad, when did it go wrong? Remember I said earlier – Most bots are harmless and crucial for making the internet useful like chat bots, auction bots, web crawlers or spiders. Like anything else, Bots can be “weaponized” or turned malignant and destructive when deployed by cyber criminals. Something called the BOTNET was developed. What the heck is that? Botnets are nothing more than an army of infected computers, which grow by infecting other computers. How that happens is the reason this is part of my 3 part series. It happens through Trojan horses, infected emails, viruses, etc.. who controls them, how do they get their instructions?

So how does it work? First it starts with an infection generally called a Trojan horse. It is called a Trojan horse because it was let in by YOU! That’s right I said you. A free download from a website, Freeware installation of some software. Your reboot your computer and boom you are infected! Your antivirus usually does not pick it up because it is made to install before the av has a chance to start and is not smart enough to know it is a malicious program. Once on your computer it begins reporting to a C2C or a command to control center for instructions. That is it your computer is a zombie now reporting to a Botmaster for instructions and mindlessly infecting other computers. Most of the times you will not know it is happening it doesn’t take a super amount of resources to get done. Most of the times it is only when alerted by your ISP that a Honeypot has flagged your network.

A C2C is one way that a botnet is created a second way and most recent way is a peer to peer. So rather than each zombie communicating back to the botmaster, each computer becomes both the master and the slave, Woooo! Think Skynet! As you can imagine the Peer to Peer method is much harder to kill.

 

How to prevent! Prevention becomes 2 parts education 1 part technology and a good Technology Partner!

Underdog Computer and Network Support will educate you and your staff on good surfing habits and the warning signs. Using proven technology securing your network and making sure your computers are up to date with the latest patches. Our professionals have been doing this for 26 years. Give us a call today 570-634-5350 for a free review of your network. And….. Never Fear, We Fix I.T.

 

 

Hello Everyone! Carmine Corridore of Underdog Computer and Network Support! Back with another video blog. This week I will be teaching you about BOTS! Turning your computer into a Zombie! This is part 3 of my 3 part educational series on keeping safe on the internet.

Let’s get started!

BOTS! You may have heard of Bots before or this may be your first time but Bots are just as dangerous as malware and phishing if not more than because, it makes you unwillingly involved in criminal acts!

So what is a BOT? A bot is a piece of software that performs automated tasks by running scripts over the internet. It performs these simple and repetitive tasks much more quickly than a human sort of like a roBOT. I am sure this is where the term comes from. Most bots are harmless and crucial for making the internet useful like chat bots, auction bots, web crawlers or spiders. Like anything else, Bots can be “weaponized” or turned malignant and destructive when deployed by cyber criminals.

I am a history buff and I use history to see how something evolved.  You know the old saying if you don’t know your history you are doomed to repeat it. I love to look back and see how certain technology came to be and how it evolved in this case into something bad.

Some say Bots began all the way back with Greek Mythology. But we are not going that far back. Lets go to 1950’s.

In 1950, computer scientist and mathematician Alan Turing developed the Turing Test, also known as the imitation game It’s most primitive format required three players — A, B, and C.

Player A was a machine and player B was a human. Player C, also a human was the interrogator, by asking a series of questions would try to determine who the human was. However, there was a problem. At the time, databases were highly limited, and could therefore only store a certain amount of human phrases. That meant that the computer would eventually run out of answers to give Player C, eliminating the challenge and prematurely ending the test.

One of the most significant AI developments of the 1960s was the development of ELIZA — a bot, named in part for the Pygmalion character, whose purpose was to simulate a psychotherapist. Created in 1966 by MIT professor Joseph Weizenbaum, the technology was limited, to say the least, as was ELIZA’s vocabulary. AI continued advancing in the 80’s and 90’s but most of it for scientific and government focused.

In the 90’s the shift began towards the consumer market, if you remember some of the games from the 90’s Simon Says, I took a lickin from a chicken and others. Then in the late 90’s around 1996, Tamagotchi a computerized handheld pet hit the market, which required digital care to keep it alive.

As the internet became popular so did the use of bots. As I mentioned earlier you had internet bots called crawlers or spiders that went and “crawled” through a website and harvested all the links to categorize in a search directory(remember those).

So that doesn’t sound so bad, when did it go wrong? Remember I said earlier – Most bots are harmless and crucial for making the internet useful like chat bots, auction bots, web crawlers or spiders. Like anything else, Bots can be “weaponized” or turned malignant and destructive when deployed by cyber criminals. Something called the BOTNET was developed. What the heck is that? Botnets are nothing more than an army of infected computers, which grow by infecting other computers. How that happens is the reason this is part of my 3 part series. It happens through Trojan horses, infected emails, viruses, etc.. who controls them, how do they get their instructions?

So how does it work? First it starts with an infection generally called a Trojan horse. It is called a Trojan horse because it was let in by YOU! That’s right I said you. A free download from a website, Freeware installation of some software. Your reboot your computer and boom you are infected! Your antivirus usually does not pick it up because it is made to install before the av has a chance to start and is not smart enough to know it is a malicious program. Once on your computer it begins reporting to a C2C or a command to control center for instructions. That is it your computer is a zombie now reporting to a Botmaster for instructions and mindlessly infecting other computers. Most of the times you will not know it is happening it doesn’t take a super amount of resources to get done. Most of the times it is only when alerted by your ISP that a Honeypot has flagged your network.

A C2C is one way that a botnet is created a second way and most recent way is a peer to peer. So rather than each zombie communicating back to the botmaster, each computer becomes both the master and the slave, Woooo! Think Skynet! As you can imagine the Peer to Peer method is much harder to kill.

 

How to prevent! Prevention becomes 2 parts education 1 part technology and a good Technology Partner!

Underdog Computer and Network Support will educate you and your staff on good surfing habits and the warning signs. Using proven technology securing your network and making sure your computers are up to date with the latest patches. Our professionals have been doing this for 26 years. Give us a call today 570-634-5350 for a free review of your network. And….. Never Fear, We Fix I.T.

 

 

 

Managed I.T. Services, what is it good for? Is it a scam?

Hello everyone – Carmine Corridore of Underdog Computer and Network Support, here again with another Video Blog.  This time we are discussing Managed Services, What it is and what it isn’t!

 

So let’s dive in! The term Managed Services is one of those overused techie terms and trends that most I.T. companies are pushing these days. Before I dive into that, let me explain what I.T. is for those that don’t know or understand that acronym. I.T. simply means Information Technology it is similar to Computer Support, Tech Support, your Computer Guy or Computer People. Typically a computer company that does I.T. basically supports everything computer related, some may not do repairs while others still do. Underdog still offers computer repairs.

Back to the main point. So the term Managed Services is different also depending on the computer support firm you talk to, treats managed services differently. But the general consensus it is a set monthly fee usually based on the amount of devices or computers the company has and it includes certain features like Remote Monitoring, Patch Management, Antivirus – and what usually varies is the added support, unlimited phone and remote support or unlimited or limited hours of onsite support.

To put it a much simpler way, Managed Services is a subscription service for technical support. As a society we have been trending to subscription based ways of paying for conveyances and then later for big ticketed items. So when you first think of Subscriptions you think of newspapers and magazines, later evolving to streaming services like Netflix, Hulu, Amazon prime. Then software manufactures like Microsoft and Google, subscription services for their email packages instead of buying expensive email server, software and consultation it allowed the smaller companies that didn’t have the money to invest in that infrastructure to get it on-demand and as much as it needed. As your need grew you could purchase more. Microsoft took it a noch up and expanded to their office suite so instead of plunking down 300-400 every few years you are paying 11/month – the advantage is as soon as a new version came out you received it. The advantage for Microsoft is they had a steadier stream of revenue. Then computer support companies started offering Managed Services contracts which allowed a piece of software to live on your computer(s) provide some automated remediation services, managing patches(software updates) and managing antivirus. Bundled with that is a familiarity with your business, ability to “predict or prevent problems by providing proactive support” added to that some kind of tangible technical support service. The benefit to the client was a budget friendly, predictable expense. The benefit to the managed it provider is predictable income.  

Now remember I said, the benefit of Managed Services for the client is prevent problems and being proactive, essentially fixing issues or alerting the customer of issues before they become a big problem. Unfortunately, many Managed IT service providers do not do this. I would guess they had the best intentions but either bringing on too many clients or the sheer volume of errors, alerts coming in or not enough staff for the amount of work overwhelms them. Many Managed IT providers still react in “Fire Fighting Mode” and by that, I mean address an issue only once it has become a problem, which defeats the purpose.

Now remember I also said, another benefit is patch management. So Microsoft releases patches every Tuesday for every supported operating system as well as software vendors release updates and hardware vendors release firmware. Patch Management allows the Managed IT company to release approved patches to your computer instead of everything that comes out. In other words, it is not something that can be automated if it were your computer already does that. Someone has to look at the patches being released and determine their safeness before releasing to you. Unfortunately many Managed IT service providers do not do this. Again I would guess they had the best intentions but for the reasons stated above.

Not All managed IT Providers include antivirus as part of their offering but from my experience I have seen this not distributed as promise, in other words you are under the assumption you are protected and you are not. I have seen clients that have been promised all 3 of the things I mentioned for several years they thought they had it but sadly they did not!

 

So what Am I telling you, is Managed Services a scam? Is it not a good thing to do? Is it right for my company? Who can I trust?

Managed Services when developed and deployed correctly is absolutely not a scam. There are many Managed IT companies that are doing it right, they took the time to understand how run a managed service business, they took the time to understand their clients needs and they took the time to make sure the solution was right for the client.

Underdog Computer and Network Support LLC. Is that company, Our goal is to grow slowly so we are careful when taking on new clients. We take the time to understand your needs; Managed Services is not a good fit for every business and if not we are upfront about that too. Maybe you are an every once in a while need for IT services that’s ok, we can still support you maybe a retainer or hourly works for you. So how do you know, give us a call Today 570-634-5350 or leave a message on one of our social media platforms we are offering a free no strings attached Assessment of your network, so if you are a managed service client for a competitor and you are concerned or you don’t understand your bill – give me a call and I will be happy to stop down and give you some good ol’ free advice  

I’m Carmine Corridore; President Underdog Computer and Network Support, LLC. Never Fear, We Fix I.T.

Microsoft Releases Emergency Patch that Targets a Scripting Vulnerability in Internet Explorer

Learn how Underdog Computer and Network Support keeps you safe!

Hello my name is Carmine Corridore of Underdog Computer and Network Support here in the Poconos. I am a Microsoft certified small business specialist, Microsoft certified professional, a Datto Continuity specialist and a Sophos Certified Engineer.

This is my first video blog so I’ll try to keep it brief today we are discussing Microsoft’s emergency patch release of the vulnerability that targets the scripting engine of Internet

Explorer, you may be saying well I don’t use Internet Explorer the truth of the matter is Internet Explorer has been engrained in every single desktop operating system since Windows XP and the server operating system since Windows Server 2003 so if this is a very important patch to get!        

About the Vulnerability, if executed on your computer it will access your computer at the level of user you are. In other words if you happen to be an administrator of your computer that’s BAD NEWS!! Because that means the hacker can add programs to your computer it can change, delete or create new data on the computer. Data means documents, images, and embedded images. They can put anything on once they have access to it. As well as create backdoor accounts for later vulnerabilities exploits. If you happen to be on a business network one of the programs that can be put on a computer is to search out other computers on your network and look for vulnerabilities and exploit those computers as well.  Microsoft released this patch that basically stops the vulnerability from happening but it requires you to download it.

            Now you may be saying to yourself well I have one that downloads on my computer but did you know not every computer is set to download all required patches set up some computers there updates are set to manual some computers are set to notify that there’s downloads some computers are set to download but not install it just really depends on how it was set up and if you’re on a business network it depends on how your IT person configured it. Some IT people see updates as a nuisance and doing the bare minimum required to stop the notification. I have seen some disabling Windows Update Services so your computer can be completely out dated on patches and you don’t know!

 Fortunately if you are an Underdog Computer Network Support Managed I.T. Client you never have to worry about that because that patch was automatically released during the weekly updates and I made sure of that by checking this morning!

 Yes we use automatic patching and remote monitoring through our agents but we also check to make sure that “the robots” are actually doing what they’re supposed to be doing.  We Add a Human Level to  it, this is how we make sure the computers are actually being managed!!

So if you don’t understand the importance of patching and keeping your Computers, Servers and Network Devices up to date with the latest patches and firmware Call Today 570-634-5350. Never Fear, We Fix I.T. Here!!