Tuesday, September 6, 2016

The Encrypto Virus

You may recently have heard of a new variant in ransomware, “The Encrypto Virus”. This is a particularly nasty piece of malware that, in addition to locking your computer, sets a time limit on “unlocking” it, and threatens to destroy all your information if you don’t pay. Once your computer has been infected the message displayed on the screen warns that your files have all been encrypted and if you don’t send a payment within a certain time frame, all your information will be lost forever—no one will ever be able to unlock your files without the hacker’s “key” to decryption.

How does the Encrypto virus spread? Typically, through email, the hackers hide the Encrypto virus in an attachment that looks like a PDF but is actually an executable, or .exe file. If you or someone on your staff opens the phony PDF, the virus encrypts the files on your computer and tells you that you can only get the key to unlock them if you pay.
It’s a scary possibility. An attorney in Oklahoma made the news recently when he went public about his law firm being attacked by the Encrypto virus, and his plans to pay the ransom.

So, what can you do to protect yourself and your small business network against the Encrypto virus and other types of malware that attack by encrypting your files?
First, we know you’ve heard this often but it’s well worth repeating—always be vigilantly careful about opening attachments to email! The fake PDFs containing the Encrypto virus will seem to come from a trusted source, like Xerox delivering a scanned image, or FedEx sending package tracking information. If you or your staff EVER receive emails with attachments, make sure you are actually expecting that email and its attached information from that particular source before opening the attachments. It’s easy to forget during a hectic work day, especially when you have an intimidating backlog of email to get through, but it’s vital to preventing these kinds of computer viruses from infecting your system.
If you’re using Windows, disabling hidden file extensions can help detect these attacks before your computer is infected.

If your computer does get infected by this type of encryption virus, manually disconnect it from your wireless or wired connection immediately in order to prevent it from spreading to other computers on your network.

Another reminder that almost can’t be repeated enough—make sure you have a separate backup system for all your most important files. If you lack such a system or just want some advice about your best options, Full Sky specializes in network services. We also offer consultation and planning for the best network security. Call or email us with any questions  info@fullskytech.com or 513 206 9971 

Wednesday, July 6, 2016

Is the Cloud the Right Place for Your Business?

 Whether it’s because of Apple’s iCloud, Dropbox or another platform, most people in Cincinnati are now familiar with the basic idea of what the cloud is and what it has to offer. While it’s fairly easy for individuals to get on board with this concept, businesses are often more resistant to making the transition.

The most common reason businesses are hesitant to transition to the cloud is because they have concerns about security. Given the various data breaches that happen to organizations of almost all sizes, it’s completely valid to have concerns about cloud security. That being said, it’s important to emphasize that when the proper security measures and policies are in place, cloud platforms can be just as secure as any other type of storage.

Because moving to the cloud can provide a Cincinnati business with numerous advantages, we want to touch on some of the key benefits, as well as look at the security issue in a little greater detail:

Enjoy Greater Flexibility

One of the big benefits that goes along with the transition from physical servers to virtual ones is the increased flexibility that becomes available. For example, if there’s a sudden spike in usage, there’s no need to worry about a crash. Instead, being on an optimized cloud platforms means that additional server resources can be spun up within minutes.

Save Money and Time

On the other side of the point touched on above, being in a virtual environment means that resources don’t need to run 100% of the time. If resources aren’t being used, they can be turned off for the time being, which means that your business won’t spend on things it’s not using. Having this level of control in a straightforward format also means notable savings of time.

Take Advantage of More Effective Project Monitoring

When any type of project is spread across numerous locations, it can be difficult to accurately monitor how well it is moving forward. The great thing about utilizing a cloud solution is the centralized structure of this type of system means that everyone involved will be able to accurately look at how well the project is progressing.

Dedicated Hardware Can Actually Increase Security

As mentioned earlier in this post, security is definitely an important consideration for any type of cloud platform. But even though security is something that needs to be carefully evaluated, the right cloud system can actually provide an optimal amount of security. As long as firewall, anti-virus and physical security rules are all utilized, a cloud solution can deliver all the benefits discussed above within a very secure system.

Want to learn more about transitioning your business to the cloud in an optimal and secure way? Call (513) 206 9971 to speak to a member of the Full Sky Technologies team about your specific cloud business needs.

Monday, March 7, 2016


What is Ransomware?  Let us define Malware first.  Malware is a term used to describe any type of software that’s designed to disrupt normal computer operations. Malware can also collect private information or take control of a computer system. The history of malware dates back several decades, with one of the most notable examples being the first Internet Worm. Although many early examples of malware were written as pranks or experiments, modern malware is generally created and distributed with very specific goals in mind.

Within the umbrella of malware is a specific type of software known as ransomware. The way that ransomware works is it stops someone from using their computer. The reason this type of software is called ransomware is once it blocks someone, it displays a message indicating that the only way to regain control of their computer is to send a payment.

Scare Tactics Used By Ransomware

While ransomware comes in many different forms, one of the most common examples is a web browser will suddenly display a message that is supposedly from the FBI or another government agency. The message will accuse the user of doing something illegal, and then inform them that they can avoid criminal charges by paying a fine. Money Pak is the most commonly requested form of payment.

Another example of ransomware that has become quite prevalent is known as FakeBsod. This malware program injects JavaScript code into a browser and displays a blue screen that mimics the look of a fatal Windows error screen. The screen includes a message to call a Microsoft technician. If someone calls the toll-free number that’s listed, they will be asked to send a payment to fix the issue.

Chimera Ransomware is Targeting Businesses

Ransomware has really taken off during the last couple of years. In most cases, ransomware has targeted people who are browsing the Internet on their personal computers. However, a new ransomware program known as Chimera is specifically targeting businesses. The way that this especially nasty form of ransomware works is it will send an email to an employee.

The email will include a link to what’s supposedly an internal job application or corporate deal. If an employee clicks the link, they will be taken to a Dropbox file that contains the malicious code. Opening the file will result in that computer being infected and all local files getting encrypted. Upon restarting the computer, the employee will see a message on their desktop that demands a Bitcoin payment of around $700. Although it’s possible to remove this ransomware without paying, a much better option is to prevent it from getting on a company network in the first place.

If you want to protect your business against ransomware and other forms of malware, be sure to learn about the different managed network services in Cincinnati that we offer. Call or e-mail for more information, or to schedule a network security Evaluation.

Full Sky Technologies: 513 206 9971 Email: Info@fullskytech.com

Thursday, December 31, 2015

The Top 5 IT Trends That Will Stand Out in 2016

If a business is thinking about outsourcing their IT needs and decides to follow through with this plan, they will see both immediate and ongoing benefits from this decision. Because there are numerous benefits that go along with outsourcing IT to the right provider, we want to highlight the top five:
Easily Control IT Cost
Outsourcing is the easiest way to control IT costs. Trying to handle IT in-house comes with a lot of unexpected variables and almost always ends up costing more than projected. With outsourced IT, you’ll know the exact costs of specific IT investments before committing to them. The cost transparency provided by outsourcing empowers businesses to make the best IT decisions at different stages of growth.
 Professional Support You Can Count On
Trying to build an in-house IT department is a complicated and potentially risky task. It only takes one bad hire to compromise an entire IT department. For businesses that are just starting to look at IT, trying to figure out what qualities a new hire should possess can be next to impossible. Outsourcing eliminates this complexity. All you need to do is get client references from an outsourced provider and then speak to the references that are similar to the size of your business. This will allow you to easily confirm that the provider is able to handle all of your IT needs.
Save on Labor Costs
Not only does outsourcing put your IT needs in the hands of highly trained and experienced professionals, but the excellent work done by outsourced IT professionals costs significantly less than having a team in-house. The reduced costs of outsourced labor actually makes it possible for businesses to do more in terms of IT than they could afford in-house.
Increase Security and Reduce Risk
 Taking advantage of a managed IT service Contract is the best way for a business to dramatically increase their security and significantly reduce their risk of any type of digital breach. The importance of having an outsourced team that’s constantly monitoring for and taking proactive steps against digital threats can’t be emphasized enough.
 Focus on What Your Cincinnati Business Does Best
While IT can play a key role in helping a Cincinnati business grow and thrive, trying to deal with IT in-house can be a major distraction. Instead of requiring a huge investment of focus and resources, outsourcing allows a business to take care of all their IT needs without getting pulled away from what they do best.

At Full Sky Technologies
, we specialize in providing outsourced IT services to small and medium businesses across Cincinnati. We’re able to provide custom IT solutions based on exactly what a business needs. So if you want to work with an IT provider that will treat your business as a true partner, be sure to get in touch with us online at info@fullskytech.com  or by calling 513-206-9971.

Tuesday, December 15, 2015

Add Value to Your Business by Consolidating into a Managed Service

With a Managed Service Agreement you don’t have to worry about handling your IT needs in-house. Instead, you can let Full Sky Technologies handle all your computer network, IT management and technical support needs. If you’re wondering whether or not this type of arrangement makes sense for your business, we want to cover five ways managed IT support can add value:
  1. You’ll Save Money
As a business, it’s vital to keep an eye on your bottom line. One of the reasons that managed IT solutions, often sell themselves is businesses can immediately calculate how much they’ll save. When compared to the cost of having one or more in-house IT employees, as well as the potential cost of not taking IT seriously, the savings offered by a managed option are very appealing.
  1. Focus on What Your Business Does Best
In order for a business to grow, it needs to have the right IT resources. However, that doesn’t mean you want to turn into a tech company. Trying to deal with IT needs in-house can become a huge distraction for a business. By handing this type of work over to knowledgeable professionals, you can stay focused on the things that your business does best.
  1. Benefit from Proactive Solutions
When you hire an IT service provider, they’re not going to wait around for something to go wrong. Instead, they’re going to take the necessary steps to ensure that your business is protected against a wide range of problems. Knowing that a dedicated team is working diligently on all of the IT needs for your business will provide you with peace of mind.
  1. Know Costs Ahead of Time
Cash flow is an issue that affects businesses of all sizes. What’s great about the straightforward pricing structure of IT is you don’t have to waste time guessing about price or being worried that you will get hit with unexpected charges. Instead, you’ll be able to negotiate an ongoing standard rate. Not having to deal with fluctuations in pricing is a big plus for businesses.
  1. Fast Responses When You Need It Most
While the managed team responsible for your IT support will work hard to keep things running smoothly at all times, there will still be situations where your business requires immediate IT help. Since those are the times when you want to know that help is available, it’s very reassuring to be able to enlist immediate and reliable help with a single phone call to your managed IT provider.
If you would like to talk about the specific IT needs that your business has, you can easily get in touch with us by calling us today at 513 206 9971 or emailing us at helpdesk@fullskytech.com

Monday, November 30, 2015

What You Need to Know about Disaster Recovery

Far too many businesses operate under the assumption that a disaster scenario could never happen to them. Although it would be great if no business ever had to deal with a disaster and the subsequent fallout, the reality is this is something that many businesses will have to deal with at some point. Regardless of their size, there are circumstances that are outside the control of any business. Whether it’s the result of a freak accident or a deliberate sabotage, businesses need to have a plan in place for how they’re going to deal with this kind of event.

Since recovering from a disaster isn’t something that most businesses have experience doing, it doesn’t make sense for them to try to figure out everything on their own. Instead, a much better approach is to enlist the help of disaster recovery services.

At Full Sky Technologies, we offer IT disaster recovery solutions. Because we have so much experience in this area, we want to share our advice about what businesses should do to recover from a disaster scenario:

Have a Master Contact List

If a business experiences a major disaster, it can turn all operations upside down. One of the best ways to minimize the negative fallout from this type of incident is to keep everyone in the loop. By having a contact list that includes vendors, partners and all other individuals who are relevant to a business, they can keep some form of communication open as everything else is being addressed.

Backups and Risk Assessment

Most businesses know that they should back up all of their data. However, due to everything else they have going on, backups often get done far less frequently than they should. Ensuring that no one is caught off guard is why a business should work with an IT provider to create the right type of backup strategy.

Going through the process of pinpointing when and how backups should be handled is also a good opportunity to look for other points of risk. By understanding the potential weak points of a business, it becomes much easier to look for potential solutions.

Don’t Try to Do Everything Alone

Dealing with a disaster of any scale isn’t something that’s easy for a business to do. That being said, it’s not something a business should attempt to resolve all on their own. Instead, they should turn to experienced professionals for help. By working with Full Sky Technologies, data recovery in Cincinnati, OH will be far more effective.

Additionally, businesses can minimize their downside by being proactive. Call Full Sky Technologies today at 513 206 9971 or Email us at helpdesk@fullskytech.com to learn more about what your business can do to help prevent data loss, as well as how we can help you prepare in the event that disaster does strike.

Tuesday, October 27, 2015

Does IT Support make Sense For your Business? Answer These Following Questions.

Business growth is a very tricky subject. If certain decisions are made too early, they can hurt the business before it gets a chance to establish a solid foundation. On the other hand, putting a decision off for too long can hold a business back from hitting its stride.

One key area of decision making for many businesses is in regards to IT. As a business starts to grow, decisions need to be made about whether or not the time is right to hire an IT service provider. Because not every business has the same needs, the best IT solutions are those that can be customized.

While not every business is going to follow the exact same path with IT, there are some practices for putting the right pieces in place at the optimal time. So with that objective in mind, let’s look at the top five signs that it’s time to invest in IT solutions for your business:

1. You Need IT But Hiring Doesn’t Make Sense

Putting together an in-house IT team can be very expensive. Most companies are going to need IT services long before they have the revenue to support the salary and other costs of an in-house team. In this scenario, a managed IT service provider in Cincinnati can provide the solutions you need in a more cost-effective manner.

2. Your Business Doesn’t Have a Clear Backup Strategy

Far too many businesses take an “it won’t happen to us” approach to data backup. Unfortunately, that type of gamble can lead to major consequences. If you want to properly protect your business and customers, you need an IT service provider that can put a reliable backup strategy in place and manage it.

3. Initiatives Are Being Held Back By Lack of IT Capabilities

If there are things that your company wants to do but are unable to do them because you don’t have the IT resources in place, enlisting the help of IT consultants needs to be at the top of your to-do list.

4. You’re Concerned About Security

As Sony and other high profile hacks have shown, businesses that don’t take the necessary steps to protect themselves run the risk of major cyber-security breaches. If you want to protect your business, then your business needs an IT service provider sooner rather than later.

5. You Can’t Get IT Support When Your Business Needs It

IT issues are going to come up during the course of a normal business day. Being unable to deal with those issues in a timely manner is a clear sign that the time is right to start working with a reliable IT service provider.

Let Full Sky Technologies be your one stop solution for your IT. Call us anytime at 513 206 9971 or email us at info@fullskytech.com