Accellis

Accellis optimizes productivity & security for legal and financial firms through managed IT services, cybersecurity, consulting and application development.

(AP Photo/Kamran Jebreil) Potential Retaliation of Iran on the US via Cyber Warfare A message from Accellis Technology Group Director of Cybersecurity, Tom Fazio: In our ongoing effort to educate and inform our clients about security-related threats, we would like to make our clients are aware of the potential retaliation of Iran on the US via cyber warfare. Iran possesses strong cyber capabilities, as history has shown. In the past decade, Iranian hackers have targeted…
5 Cybersecurity Takeaways From 2019 The world of cybersecurity is a rapidly evolving with new technologies, terms, definitions, and services. What can small and medium-sized businesses (SMB’s) learn from 2019? Class Action Lawsuits The latest cybersecurity news in 2019 and probably the most eye-opening, is the class-action lawsuit filed against operator DCH Health System in Alabama by four patients visiting three hospitals. The suit claims the company violated federal health information privacy laws (HIPAA)…
Hyper-V on Windows 10 Hyper-V on Windows 10 is a “hypervisor” or a virtual machine monitor “VMM”​ made by Microsoft and is free in Windows 10 Pro or Enterprise​. video and Powerpoint include: What is Hyper-V? What you need in order to use it. How to run virtual machines (guest machines) on your desktop (host machine) Hyper-V prerequisites Enabling Hyper-VCreating Your Virtual machine Use cases include: Running incompatible software​ Experimenting with other operating systems (Windows,…
What is Sandbox?How to enable Sandbox on your machineHow Sandbox keeps you protected Windows Sandbox is a tool you can use to open potentially unsafe or untrusted files and attachments including opening links from unverified senders to verify they are safe. This 12 minutes video will show you how to easily install and use Sandbox while explaining other IT and security fundamentals. Windows Sandbox in 12 Minutes: Overview of Sandbox What you need in order…
Back To Basics Part 1 Accellis Technology Group recently hosted Back to Basics Part 1, a webinar with Accellis Project Manager, John Roth II .  John wanted to help end-users understand the common features and functions of their workstation, internet terms, shortcuts, and other computer-related operations. Topics include: How to reset your password. Understanding the difference between a restart and a shutdown. What is your taskbar and how to pin software to it? Know your…
­­­­­­­­­­­NGAV (Next-Generation Antivirus) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined NGAV (Next-Generation Antivirus). Next-Generation Antivirus takes traditional antivirus software to a new, advanced level of endpoint security protection. NGAV is the natural (and much needed) evolution of traditional Antivirus that protects computers from the full spectrum of modern cyber attacks, without any extra CPU resources. NGAV speaks to a fundamentally different technical approach in…
­­­­­­­­­­­Pen Test (Penetration Testing) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined Pen Test (Penetration Testing). A Pen Test can also be referred to as ethical hacking. This is the act of testing a device, network, or web application for exploitable security vulnerabilities. There are several different types of penetration testing.  The goal of most pen tests is to gain elevated privilege in the environment…
­­­­­­­­­­­Vulnerability Management When talking about cybersecurity, terms can sometimes be hard to understand. Vulnerability Management, pen testing, and least privilege access are some examples of cybersecurity terms you may have heard or read about.  In this blog series, we will define these terms and what they mean for your organization. In the first part of our blog series, Cybersecurity Terms and Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio has defined Vulnerability Management. Vulnerability…
Email Account Takeover: Defending Against Lateral Phishing Accellis Technology Group’s trusted partner, Barracuda has released Volume 2 of the Spear Phishing: Top Threats and Trends report, Email Account Takeover: Defending Against Lateral Phishing. Barracuda defines lateral phishing as an effective way for attackers to leverage legitimate accounts compromised through email account takeover. The report takes an in-depth look at the latest tactics used by scammers and how to protect your business. According to a…
How To Spot A Phishing Email Webinar We recently hosted How To Spot A Phishing webinar with Accellis Director of Cybersecurity, Tom Fazio. In this webinar, Tom discusses what a phishing email is, how hackers get your email, email subject lines to look out for, the difference between phishing and spear-phsihing, and much more. Listed below is a topic timeline. 0:000:43 – Tom Fazio Background 0:444:04 – What is Phishing? How…