SandStorm IT

Power On

  • Services
    • Managed IT Services
    • Servers & Networks
    • Business Computers & Support
    • Cloud Services & Data Backup
    • Custom Software Development
    • VoIP Telephone Solutions
    • Custom Web Design
    • Disaster Recovery Solutions
    • Security & Compliance
    • IT Consulting
  • Technologies
  • Pricing
  • Work
  • About
    • Our History
    • Our Team
    • Careers
    • Press
  • Blog
  • Contact
    • (901) 475-0275
  • Help Me

Office 365 Phishing Attacks On the Rise

November 3, 2020 By Justin Oliver

Recently, we have seen a dramatic increase in the amount of phishing cyber-attacks aimed at Office 365 users.  It's so bad that almost three quarters (71.4 percent) of corporate Office 365 users have at least one compromised account each month, according to a report by Skyhigh Networks.  If you are … Read More

Categories: Cybersecurity, Social Engineering/Phishing

Ransomware – What To Do If You Are Infected

October 20, 2020 By SandStorm IT

Ransomware still remains one of the most notorious forms of malicious attacks out on the internet, and won’t be going away any time soon. It now takes very little effort for someone to make their own Ransomware variant, as evident by all the new strains popping up every day. With so many variations, … Read More

Categories: Cybersecurity, Ransomware, Social Engineering/Phishing, Spyware/Malware/Viruses

What are social media bots and how can I protect myself?

February 3, 2020 By Jacob Ellis

Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots.  By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human.  … Read More

Categories: Cybersecurity, Personal Computing, Social Engineering/Phishing, Tips/Tricks/Shortcuts

What are the best ways to combat computer infections?

January 20, 2020 By Matt Ballard

The best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go … Read More

Categories: Cybersecurity, Managed Anti-Virus/Anti-Malware, Managed Services, Personal Computing, Social Engineering/Phishing, Spyware/Malware/Viruses, Tips/Tricks/Shortcuts

Social Engineering: How to keep your business safe

November 18, 2019 By Jeff Fowler

What is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social … Read More

Categories: Cybersecurity, Social Engineering/Phishing, Spyware/Malware/Viruses

Don’t Get Phished!

October 7, 2019 By Doyle Sanders

There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy.  We've all heard of folks hit by identity theft.  And, yes, sometimes that comes … Read More

Categories: Business, Cybersecurity, Email Software and Applications, Social Engineering/Phishing

How can I protect my employees from phishing?

August 12, 2019 By Cristian Colón

People getting scammed is nothing new. In fact, phishing is still the common most type of cyber-attack. Most people have heard of the Nigerian Prince scam. However, with advances in technology, there have been advances in scammer’s technology and tactics as well. Many have taken a liking to the form … Read More

Categories: Cybersecurity, Social Engineering/Phishing

Phishing: How to Avoid Phishing Scams

July 15, 2019 By SandStorm IT

What is Phishing? This varies from the specific type of phishing, but in general, phishing is the act of tricking and manipulating a user to reveal information to the attacker through various means.   Tools of the trade can range from malware laced documents, to websites with URLs that are … Read More

Categories: Cybersecurity, Social Engineering/Phishing, Spyware/Malware/Viruses

Why is it bad to reuse passwords on multiple sites?

June 17, 2019 By Robert Cleveland

When it comes to passwords, people like to use the same passwords for pretty much everything they need to login to. It's easy to remember and more convenient to do, but it's actually one of the worst things you can do for your security online.   In 2018, a total of 2.7 billion passwords were … Read More

Categories: Business, Cybersecurity, Networking, Passwords, Social Engineering/Phishing

Data Breach: Almost 20 Million Patient’s Data Stolen in 2 Separate Medical Laboratory Data Breaches

June 5, 2019 By Jeff Fowler

Just a few days after Quest Diagnostics reported that a data breach compromised the information of 11.9 million patients, LabCorp is reporting that it was breached as well, affecting 7.7 million additional records.   What happened? An unauthorized user installed malicious code on the payment … Read More

Categories: Cybersecurity, Data Breaches/Leaks, News, Security Alerts & Vulnerabilities, Social Engineering/Phishing, Spyware/Malware/Viruses

  • 1
  • 2
  • Next Page »

Subscribe to Our Newsletter

Check your inbox or spam folder now to confirm your subscription.

SANDSTORM IT BLOG

Featured
News
Press Releases
SandStorm News
Security Alerts & Vulnerabilities
Managed Services
Managed Anti-Virus/Anti-Malware
Managed Backups & Monitoring
Updates/Patches
Passwords
Cybersecurity
Spyware/Malware/Viruses
Social Engineering/Phishing
Ransomware
Data Breaches/Leaks
Other
Servers
Server & Server Hardware
Cloud/Serverless Computing
Server Operating Systems
Networking
Wired Networking
Wireless/Wi-Fi
Internet of Things (IoT)
5G & Mobile Networking
Business
General Business
Enterprise Resource Planning (ERP)
Voice & Telephony
Backups & Business Continuity
On-Site Backups
Cloud Backups
DR/BCM Planning & Consulting
Personal Computing
Tips/Tricks/Shortcuts
Troubleshooting
Hardware & Peripherals
Desktop Operating Systems
Software & Applications
Office Applications
Desktop Software
Email Software and Applications

Authors

Authors
Doyle Sanders
Jake Sanders
Jordan Sanders
Justin Oliver
Matt Ballard
Robert Cleveland
Cristian Colón
Jacob Ellis
Jeff Fowler
Miker Irick
Curtis Mayo
Josh Restuccio
Lindsey Sanders
Matthew Stafford
Josh Yarbrough

Give Us a Call

(901) 475-0275
61 Atoka-McLaughlin Dr.
Atoka, TN 38004

About SandStorm IT

SandStorm IT is a team of committed professionals who are dedicated and excited to solve your technology needs.  We accomplish this through understanding your business and then applying the appropriate technology solutions to meet the needs.

Our breadth of experience with information technology covers a range of diverse skill sets such as server setup and configuration, network and firewall solutions, VoIP telephone systems, web and database hosting, custom web application programming, mobile development, and IT security practices and policies.

SandStorm IT has the desire, expertise, and commitment to bring your vision to life.

  • Services
  • Technologies
  • Pricing
  • Work
  • About
  • Blog
  • Contact
  • Help Me
Authorized Solution Provider