Contact

(403) 488-3333

04Aug

What is a phishing email?

Do these Emails look Phishy? Phishing (pronounced: fishing) is an attack that attempts to steal money or data by getting you to reveal personal information on websites or through emails that pretend to be legitimate. Often requesting credit card or banking information, passwords, or login credentials.   The following are some common examples of Phishing […]

Learn more
24Jun

How to detect a phishing email?

With the recent increase in Ransomeware infections instigated through phishing emails, it is critical to take proactive measures to protect yourself and your organization’s security. Vigilance in detecting phishing emails and educating your employees to be proactive and recognize risk is a crucial step in protecting your organization. Don’t trust the display name Just because […]

Learn more
09Jun

Are your staff your biggest security risk?

With over 90% of successful cyber attacks requiring human interaction, your staff are now the number one point of entry for cybercriminals looking to harm your organization. In most cases, cybercriminals target people, rather than systems, to gain access to their targeted infrastructure. Cybercriminals aim to exploit human error in about 99% of their attacks […]

Learn more
30May

Partek Achieves Silver Partner Status with Xerox

Partek progresses to Silver Partner status tier in Xerox Global Partner Program. The ever-changing world of print and print management, and the reliance on IT Service Providers to have a comprehensive portfolio of print solutions, required Partek to look for a dedicated partner for print solutions. In early 2022, Partek joined the Xerox Global Partner […]

Learn more
04May

Buying Your Own Equipment vs. Buying from a Managed Service Provider (MSP)

Should you purchase a workstation yourself or source everything from your Managed Service Provider (MSP)? There is a certain responsibility associated with building out your workstations yourself, whereas with an MSP you can be comfortable handing the set-up and management of your workstations to the experts.  Hiring a Managed Service Provider (MSP) bridges the gap […]

Learn more
04Mar

How secure are your passwords?

Partek manages over 4,000 passwords for over 500 organizations through our asset management tools. Keeping access to our client’s critical assets secure and maintained. Every year, mainstream and tech media will report on the latest list of the “worst” passwords choices that everyday users make. And every year, I.T. Techs around the world cringe when […]

Learn more
14Feb

Why every business should own a domain name

First off, what is a domain name? In layman’s terms: A domain name is the address for a website. Just like a physical address helps people find a specific place, the purpose of a domain is to help visitors find a specific website. You type the website’s domain name into an internet browser URL bar […]

Learn more
24Jan

CISA urges organizations to strengthen their cybersecurity defenses

Last week, at least fifteen Ukrainian public institutions and government agencies’ websites were hacked and defaced by a new malware family Microsoft calls ‘WhisperGate’. Microsoft warns of the new malware family disguised as ransomware which is being used in attacks against multiple organizations in Ukraine. Since January 13th, Microsoft detected attacks that implement a destructive […]

Learn more
10Oct

How hackers use phishing emails in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need one person within your organization to click on the link or open an attachment. A […]

Learn more
06Oct

Windows 11 – What you need to know

Windows 11 releases on October 5th. Given that Windows 10 was already pretty polished when it launched, and only got better over time, why the need for a whole new version?  After testing early builds internally, it’s clear that Microsoft isn’t actually trying to fix much with Windows 11. It’s basically a fresh coat of […]

Learn more
26Sep

Are you at risk for a Cyber Attack?

6 best practices to secure your business You can’t go long without seeing another headline about a cyber-security breach impacting a high-profile company. In recent years, cybercriminals have gotten their hands on millions of social insurance numbers, passwords, company trade secrets, and more. Security breaches have increased 67% over the past five years and companies […]

Learn more
17Jul

Small / medium sized businesses are the most vulnerable to ransomware right now

For as much media attention ransomware is getting with large-scale cyber-attacks, it appears that many small and medium-sized businesses (SMBs) have failed to embrace the idea that they are ransomware targets. After all, why target an SMB when Fortune 500 companies have much deeper pockets? It appears when it comes to small businesses the sentiment […]

Learn more
10Mar

Phishing Emails Related to COVID-19 Vaccines on the Rise

Phishing campaigns that use the COVID-19 vaccination as bait are becoming more popular in recent months. In the same way that a year ago threat actors capitalized on the start of the global pandemic with coronavirus-related phishing attacks, cybercriminals are now trying to leverage the vaccine to steal money, credentials, and personal information. The FBI […]

Learn more
29Dec

5 Misconceptions about Cybersecurity and your Business

Cybersecurity is one of the hardest variables to control as an IT provider in a business environment, as user error becomes more prevalent across businesses everywhere. Unfortunately, many SMBs who work with managed service providers like Partek (MSPs) assume they are safe and protected and are therefore not taking proper precautions. As an IT professional […]

Learn more
01Dec

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)? Business email compromise (BEC), sometimes known as email account compromise (EAC), is one of the most financially damaging online crimes, and also one of the most common. It exploits the fact that so many of us rely on email to conduct business, both personal and professional. In a BEC […]

Learn more
19Oct

New Ransomware Variant Disguises itself as “Windows Update” attachment

Important Security Update: A well-known variant of Ransomware known as the ‘Emotet botnet‘ has changed the way it’s distributing its payload. Recent reports from the Cyber-security world indicate it has begun to use a new malicious attachment that pretends to be a message from Windows Update telling you to upgrade Microsoft Word. Emotet has been […]

Learn more