Michael Tranter

Latest Articles

Microsoft Offers Extended Security Updates for Windows 7 On January 14, 2020, Windows 7 lost Microsoft support, meaning Windows 7 devices are currently exposed to major security vulnerabilities. In a recent announcement, Microsoft has released Extended Security Updates (ESU) for Windows 7 devices. Starting immediately, Accellis can extend Windows 7 support for a full year, providing businesses much needed time to properly plan workstation replacement. With a worldwide processor and IT services shortage, this news…
Accellis and Barracuda Networks Presents Total Email Protection for Your Business at Topgolf http://bit.ly/Accellis-Topgolf-Event – Email, by a wide margin, continues to present the top vector of choice for cybercriminals, accounting for more than 94% of all malware delivery. How can you ensure your organization is secured against email-borne threats? 1. Please join us for a great event at the brand new Topgolf in Independence, Ohio. We will be joined by our trusted partner,…
(AP Photo/Kamran Jebreil) Potential Retaliation of Iran on the US via Cyber Warfare A message from Accellis Technology Group Director of Cybersecurity, Tom Fazio: In our ongoing effort to educate and inform our clients about security-related threats, we would like to make our clients are aware of the potential retaliation of Iran on the US via cyber warfare. Iran possesses strong cyber capabilities, as history has shown. In the past decade, Iranian hackers have targeted…
5 Cybersecurity Takeaways From 2019 The world of cybersecurity is a rapidly evolving with new technologies, terms, definitions, and services. What can small and medium-sized businesses (SMB’s) learn from 2019? Class Action Lawsuits The latest cybersecurity news in 2019 and probably the most eye-opening, is the class-action lawsuit filed against operator DCH Health System in Alabama by four patients visiting three hospitals. The suit claims the company violated federal health information privacy laws (HIPAA)…
Hyper-V on Windows 10 Hyper-V on Windows 10 is a “hypervisor” or a virtual machine monitor “VMM”​ made by Microsoft and is free in Windows 10 Pro or Enterprise​. video and Powerpoint include: What is Hyper-V? What you need in order to use it. How to run virtual machines (guest machines) on your desktop (host machine) Hyper-V prerequisites Enabling Hyper-VCreating Your Virtual machine Use cases include: Running incompatible software​ Experimenting with other operating systems (Windows,…
Back To Basics Part 1 Accellis Technology Group recently hosted Back to Basics Part 1, a webinar with Accellis Project Manager, John Roth II .  John wanted to help end-users understand the common features and functions of their workstation, internet terms, shortcuts, and other computer-related operations. Topics include: How to reset your password. Understanding the difference between a restart and a shutdown. What is your taskbar and how to pin software to it? Know your…
­­­­­­­­­­­NGAV (Next-Generation Antivirus) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined NGAV (Next-Generation Antivirus). Next-Generation Antivirus takes traditional antivirus software to a new, advanced level of endpoint security protection. NGAV is the natural (and much needed) evolution of traditional Antivirus that protects computers from the full spectrum of modern cyber attacks, without any extra CPU resources. NGAV speaks to a fundamentally different technical approach in…
­­­­­­­­­­­Pen Test (Penetration Testing) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined Pen Test (Penetration Testing). A Pen Test can also be referred to as ethical hacking. This is the act of testing a device, network, or web application for exploitable security vulnerabilities. There are several different types of penetration testing.  The goal of most pen tests is to gain elevated privilege in the environment…
­­­­­­­­­­­Vulnerability Management When talking about cybersecurity, terms can sometimes be hard to understand. Vulnerability Management, pen testing, and least privilege access are some examples of cybersecurity terms you may have heard or read about.  In this blog series, we will define these terms and what they mean for your organization. In the first part of our blog series, Cybersecurity Terms and Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio has defined Vulnerability Management. Vulnerability…
Email Account Takeover: Defending Against Lateral Phishing Accellis Technology Group’s trusted partner, Barracuda has released Volume 2 of the Spear Phishing: Top Threats and Trends report, Email Account Takeover: Defending Against Lateral Phishing. Barracuda defines lateral phishing as an effective way for attackers to leverage legitimate accounts compromised through email account takeover. The report takes an in-depth look at the latest tactics used by scammers and how to protect your business. According to a…