The Werks is an IT related commentary bringing you the unvarnished truth steeped in a vat of reality. The information contained herein is the opinion and rantings of a 30+ year veteran of the IT industry. This will hopefully give you helpful knowledge untainted by any specific vendor focused kool-aide. Occasionally, you may find that this collection of brain droppings will also give you the laugh you needed to make it through another day locked in the IT gulag. Read-on, brave soldier!
Thursday, December 29, 2022
Selling to Prospects image 19
Monday, December 26, 2022
The 5 Biggest Business Trends In 2023 Everyone Must Get Ready For Now
From Medical Advances to Disney Magic, 23 Things to Look Forward to in 2023
Happy Holidays from NetWerks Strategic Services, LLC
Thursday, December 22, 2022
Selling to Prospects image 18
Tuesday, December 20, 2022
Complimentary Azure Virtual Desktop Readiness Consultation
View: Complimentary Azure Virtual Desktop Readiness Consultation
Free Cybersecurity Assessment
Why Cybersecurity Education Is Critical in the Acceleration Economy
Monday, December 19, 2022
3 Strategies for Healthcare Merger, Acquisition Cybersecurity Due Diligence
What best practices do you recommend for maximizing #cybersecurity? Reply to share your tips or let us know if you'd like to discuss ours.
Work Safely and Flexibly from Anywhere: The Cloud-Based Workplace with Azure Virtual Desktop
Cybersecurity Disclosures What Progress has been made?
Tuesday, December 13, 2022
Selling to Prospects image 17
Free Cloud Transformation Consultation
Zero-trust is the new gold standard in IT security. 🔐Reply if you're interested in learning how to build zero-trust into your security posture.
Free Cyberthreat Assessment
The 2022 Thales Data Threat Report: Retail Edition
Monday, December 12, 2022
2022 Thales Data Threat Report: Retail Edition Infographic
View: 2022 Thales Data Threat Report: Retail Edition Infographic
Unit4 Reduces Go to Market by 50 Percent and Future-Proofs Business by Transitioning to Azure
Zero Trust Will Replace Your VPN by 2025 - Here's Why and How You Can Prepare
Are Retailers Shopping for a Cybersecurity Breach?
Tuesday, December 6, 2022
Free Azure Virtual Desktop Demo
How We Keep the Microsoft Cloud Up and Running
Selling to Prospects image 16
Proactive Security for your AWS environments with Trellix
View: Proactive Security for your AWS environments with Trellix
The Total Economic Impact of Microsoft Azure Virtual Desktop
View: The Total Economic Impact of Microsoft Azure Virtual Desktop
Trellix Leverages Amazon GuardDuty Malware Protection for Extended Detection and Response
Monday, December 5, 2022
Free Security Solutions Consultation
Collect and Query Graphics Data for Azure Virtual Desktop Connections
Mitigating the ransomware threat with Trellix Cloudvisory on AWS
Sanofi Gains Speed And Agility with an Azure Hybrid Cloud Strategy
Wednesday, November 30, 2022
Thinking of implementing a virtual workplace? Message us to speak with an expert on creating a virtual desktop environment. #AzureVirtualDesktop
Free Migration Readiness Assessment
Tuesday, November 29, 2022
Azure Virtual Machines with Ampere
Complimentary Cyber Resilience Assessment
Selling to Prospects image 15
Staggering 90% of cyber risk remains uninsured
Cyber resilience, not just cybersecurity, is the key to managing cyberattacks
Why is #cyberresilience more important than #cybersecurity? RT to start a conversation.
Monday, November 28, 2022
Work Safely and Flexibly from Anywhere: The Cloud-Based Workplace with Azure Virtual Desktop
Scale Your Cloud-Native Apps and Accelerate App Modernization with Azure, The Best Cloud for Your Apps
How Microsoft Azure Helps Drive Agility and Optimization for Your Business
How Cyber Essentials is helping to improve the cyber resilience of the UK
Tuesday, November 22, 2022
Making the World a Safer Place with Microsoft Defender for Individuals
Complimentary Cybersecurity Compliance Consultation
Selling to Prospects image 14
2022 Thales Consumer Digital Trust Analyst Report
Comparing Windows 365 vs. Azure Virtual Desktop
One Step Closer to Modernization: The MFA Server Migration Utility
Monday, November 21, 2022
2022 Thales Consumer Digital Trust Index
Free Digital Transformation Readiness Assessment
DGS Law Raises the Security Bar and Levels the Playing Field with Microsoft Defender Experts
Cloud Migration and Modernization with Azure Tools and Resources
An Afternoon with a Navy Seal
Wednesday, November 16, 2022
'Tis the Season!
Make Purchases Online? Here Are 4 Things You (And Your Employees) Need To Do To Keep From Becoming A Prime Target For Cybercriminals
ROI Revolution estimates that e-commerce sales will eclipse $236 billion this holiday season. While that’s the most popular time for consumers to purchase online, in 2021 over $2 billion a day was made in online purchases.
Chances are you and your employees make purchases weekly personally and for your business.
And…chances are that cybercriminals are doing their best to capitalize on this to steal credit card numbers, logins, and passwords and even you and your customers’ banking information.
If they don’t follow these four practices to stay safer (notice I didn’t say safe) buying online, they could be exposing themselves and your business to identity theft, fraud, and more.
- Don’t reuse passwords from site to site. If you use the same password for multiple sites, when one company’s records get breached (which happens every day) a criminal now has access to multiple accounts. So, make sure you use different passwords for different sites. This does make things slightly more complicated for you, but it also makes it infinitely harder for cybercriminals. (hint – see our previous blog about password management systems)
- Check the URL in the address bar. One indication that a website is secure is that it either has a small lock symbol to the far left of the URL or “https” in the URL. If you see a lock that’s unlocked or just an “http,” the site is not secure – do NOT provide any credit card information or bank account details.
- Don't use a debit card to pay – only use a credit card. This way, if someone is able to access your account, you won’t lose what’s currently in your bank account. And most major credit cards have a $50 or less liability policy if unauthorized charges are made. So it’s important to watch those statements. If you do feel you’re the victim of fraud, make sure to contact your credit card company immediately.
- Be wary of any texts or e-mails about package deliveries. Even if you have something you’re tracking, go back to the site you originally purchased from to check notifications that way. Any links from an unknown sender could infect the device you’re on, which could expose you to viruses and malicious software.
While there are plenty of cybercriminals happy to scam consumers, who they really want to go after are businesses because they have much deeper pockets and there are multiple ways they can cause havoc.
Call us at (413) 786-9675 or click here to schedule a brief 15-minute call https://tinyurl.com/nyx9sb4j to discuss your situation, needs and concerns. If appropriate, we can conduct a simple security assessment for free to know for sure if your network and data is safe.
Tuesday, November 15, 2022
Hybrid Cloud Consultation
Selling to Prospects image 13
TeamWorx Trusts Trellix's Threat Detection Service Built on AWS
View: TeamWorx Trusts Trellix's Threat Detection Service Built on AWS
How to Use Multiple Desktops on One Screen in Windows 11
Defender Experts for Hunting
Monday, November 14, 2022
Be a Security Superhero with Trellix Helix Detect
Azure Migrate: The Hub for Cloud Migration and Modernization
Free Cyber Threat Risk Assessment
Virtual desktops boost productivity and provide enhanced security with little downtime. Ready to explore the value of a virtual desktop solution? RT to start a conversation.
Land O'Lakes, Inc. Shares the Recipe for Multicloud Protection: Microsoft Defender for Containers, Related Solutions
Wednesday, November 9, 2022
Complimentary Cybersecurity Compliance Consultation
Tuesday, November 8, 2022
Cybersecurity Labor Shortage Grows Worse in US and Worldwide
Advancing Integrations with Threat Intelligence
Selling to Prospects image 12
Migration Guide: VMware Horizon Cloud and Azure Virtual Desktop
View: Migration Guide: VMware Horizon Cloud and Azure Virtual Desktop
Power Hybrid and Multicloud Environments with Azure Arc Data Solutions
What the industry wants to improve on NIST Cybersecurity Framework 2.0
Monday, November 7, 2022
Has your organization updated your #cybersecurity defenses? As the threat landscape continues to change, keeping pace is critical. Reply to stay informed of the latest cybersecurity trends and ways to address them.
Free Cyber Threat Hunting Bootcamp Consultation
Free Cloud Migration Consultation
Millennium BCP Enhances Visibility and Agility Through Azure Arc to Deliver Smart Banking Solutions
Will new CISA guidelines move the needle on cyber defense?
Wednesday, November 2, 2022
The Forrester Wave:™ Extended Detection and Response (XDR) Providers, Q4 2021
Tuesday, November 1, 2022
Tired of resetting end user passwords? Single sign-on in Azure Virtual Desktop is easier and more secure. RT if you're ready to say "goodbye" to passwords.
Selling to Prospects image 11
Cyber Resiliency Consultation
NCSC publishes supply chain security guidance
Complimentary Cloud Migration Consultation
The proposed EU Cyber Resilience Act: What it is and how it may impact the supply chain
Monday, October 31, 2022
Have you been fine tuning your #cybersecurity "A" game? The stakes have never been higher. Reply to learn why.
Fannie Mae Builds Productivity and Data Safety with Microsoft Security and Data Protection Solutions
Microsoft Defender for Office 365 Receives Highest Award in SE Labs Enterprise Email Security Services Test
Microsoft Rolls Out Passwordless Sign-on for Azure Virtual Desktop
Beazley warns of cyber risk complacency
Tuesday, October 25, 2022
Selling to Prospects image 10
Tech Providers in UK Financial Services Face Direct Regulation
Free Phishing Security Training Consultation
Monday, October 24, 2022
Detect Malicious Content on Upload with Trellix Detection as a Service
View: Detect Malicious Content on Upload with Trellix Detection as a Service
The Trellix Approach to Effective Cloud Security
Vulnerability Assessment Survey
The Case for Cloud Adoption in Financial Services Grows Stronger
Are You Ready to Be a Security Superhero?
Wednesday, October 19, 2022
Warning: Hackers Are Targeting The Ukraine Refugee Crisis
Social Message with Infographic
Tuesday, October 18, 2022
Complimentary Cyberthreat Assessment
Selling to Prospects image 9
A Ransomware Crew Pledged Allegiance To Russia. Now Its Data Has Been Leaked By Pro-Ukraine Hacker
Trends in IAM: Key Findings from the 2022 Thales Access Management Index
The Cybersecurity Challenges Of Working From Anywhere
From enabling hybrid work to creating collaborative experiences—here's what's new in Microsoft 365
Monday, October 17, 2022
Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords
Google Chrome—Emergency Security Update For 3.2 Billion As Attacks Underway
Keep application and user data secure
2022 Consumer Digital Trust Index
Test your team's security readiness with the Gone Phishing Tournament
Friday, October 14, 2022
What is your stripper name?
Anyone active on social media has seen those seemingly harmless quizzes that someone in your newsfeed takes and then shares…the ones that ask you to enter your first name, your middle name and the street you grew up on to create your “new name.” Joe + Schmoe + Blow Avenue = your stripper name.
Turns out they aren’t so harmless.
A hacker could use any of this info to get past firewalls into your accounts (financial or otherwise) by filling in answers to gain passwords.
They can also use this information to hack into your profile. Then, by controlling your account, they are able to reach out to friends and colleagues, sending messages as you, which can quickly damage your reputation.
According to the FTC, customers in 2021 reported losing about $770 million to fraud that started on social media. That’s an 18-fold increase since 2017 and affected more than twice the 2020 number of customers. In 2021, it affected more than 95,000 people.
Socialcatfish.com ranked Facebook as the most popular platform for online scams.
Other common social media scams include:
- Giveaways, where you’re told you have won but you need to submit payment info to receive your prize
- Profile hacking, where someone poses as an online “friend” and asks for money to get out of a bad situation
- Job offers, where what you think is a legitimate work-from-home opportunity might require you to pay a fee to “start” or guarantee a high paycheck for a menial task
The best way to avoid these scams is to just be wary. Be careful of oversharing online. Does something seem too good to be true? Is your “friend” speaking in an unusual way? Reach out offline. Know that only scammers ask for money via a wire transfer or gift card. And if you really can’t resist a fun online quiz (because everyone else is taking it), just make up the answers.
If you do notice a scam, you can report it to the BBB Spam Tracker and ReportFraud.ftc.gov to help others.
To check if your private data has been exposed to any hackers online, schedule a 10-minute discovery call with our team now. Call us at 413-786-9675 or book a time here: https://tinyurl.com/nyx9sb4j
How To Protect Your Company From Smishing
Tuesday, October 11, 2022
Selling to Prospects image 8
Monday, October 10, 2022
IT Management Process & Infrastructure Review
Announcing General Availability of Scheduled Agent Updates on Azure Virtual Desktop
Simplify IT Management
Tuesday, October 4, 2022
Selling to Prospects image 7
Monday, October 3, 2022
Security Threat Detection & Prevention Consultation
Tuesday, September 27, 2022
Selling to Prospects image 6
Monday, September 26, 2022
Track Adversaries and Improve Posture with Microsoft Threat Intelligence Solutions
Spyware Activity Particularly Impactful in July
Tuesday, September 20, 2022
Selling to Prospects image 5
Monday, September 19, 2022
Staying Productive in the Face of an Outage
Cloud Architecture Assessment
Protect against outages to stay productive
Introducing Azure Well-Architected Framework Assessments for Azure Stack Hub (Preview)
Tuesday, September 13, 2022
Selling to Prospects image 4
Monday, September 12, 2022
Cloud Cost Audit
Book a Free Virtual Desktop Cost Assessment Meeting
Securing the enterprise and responding to cybersecurity attacks with Microsoft Azure Sentinel
Azure Virtual Desktop Setup
Thursday, September 8, 2022
How To Find Your Passwords (And Never Need To Panic Reset Them Again)
There are two types of people…which one are you?
- The frustrated, constant updater: You find yourself having to constantly click on “Forgot My Password” and verify your account, check your texts, scan a finger (give a pint of blood…maybe not that one) so you can reset your password. And it’s probably a brand-new one because you can’t use one you’ve used before, so this situation will happen again and again and again.
- The weary optimist: You use the same password for every site, even though you know you shouldn’t because you’re tired of dealing with the above situation. This makes it SUPER-easy for hackers because chances are your password is available for sale on the dark web right now. But…you HOPE this doesn’t happen to you or you think you’re too small to worry about this because they only care about the “big fish.”
If you’re Person Type 2, it’s only a matter of time before you’re hacked, and it doesn’t end with you but can affect any business computers you use that lead to access of client, customer or patient records, and the results can be a total disaster.
But there’s a simple solution. A password manager.
A password manager is like a digital vault. Your passwords, addresses, payment info and logins are encrypted in the software. You will have one master password you use to “unlock the vault.” If the password manager gets breached, your data is not at stake because your master password is either stored on a server and encrypted or it’s stored locally on your computer.
What’s the difference between using a password manager and one that’s included on your web browser, such as storing that information in Chrome or Safari? The biggest difference is that browser storage cannot be shared with others. For those who work in an office and need to collaborate with teammates, most password managers let you encrypt the data to pass along if someone else needs to access a site. If you have data stored on your browser and then, for instance, decide to make a purchase through the Instagram app, that credit card data will not pass through since it’s outside the browser.
Tuesday, September 6, 2022
Selling to Prospects image 3
Monday, September 5, 2022
Cost Optimization in The Cloud - Practical Design Steps for Architects and Developers - Part 1
Reduce licensing and infrastructure costs
The Art of Lowering Costs with Cloud Communications
Free Hybrid Work Consultation
Tuesday, August 30, 2022
Selling to Prospects image 2
Monday, August 29, 2022
IDC MarketScape: Worldwide Endpoint Management Software 2022 Vendor Assessment
View: IDC MarketScape: Worldwide Endpoint Management Software 2022 Vendor Assessment
Microsoft Endpoint Manager
Listening to millions of IoT building sensor readings with load testing
Tuesday, August 23, 2022
Selling to Prospects image 1
Monday, August 22, 2022
Cloud Migration Cost Assessment
Hybrid Work: A Guide for Business Leaders
Implementing Azure cost optimization for the enterprise
Enable secure and productive remote work on any device
Monday, August 15, 2022
Microsoft Entra Verified ID
How can we help you be more proactive about identity & access management? Reply if you'd like one of our experts to reach out to discuss your goals and the solutions we offer to address them — including @Microsoft Entra.
Journey to the cloud via Microsoft Azure and lessons learned along the way
Tuesday, August 9, 2022
Improve security with remote access and verifiable ID's
View: Improve security with remote access and verifiable ID's
Schedule a Free Cloud Migration Consultation
Monday, August 8, 2022
swyMed & Logitech Partner on Telehealth Solutions for ET3
Avanade Reimagines Access to Training and Skills Management Using Microsoft Entra Verified ID
Mapping Microsoft's expedition to the cloud with good cartography
Tuesday, August 2, 2022
Identity and Secure Access Consultation
Cloud Readiness Assessment
Logitech Pen: Designed for Students, with Students
Monday, August 1, 2022
Logitech Pen USI Stylus for Chromebook
Secure Access for a Connected World
Azure Tips and Tricks
How 'born in the cloud' thinking is fueling Microsoft's transformation
Tuesday, July 26, 2022
Cloud Migration Readiness Assessment
Monday, July 25, 2022
Meet the M650 Mouse
Boosting Employee Productivity and Comfort with External Mice
View: Boosting Employee Productivity and Comfort with External Mice
Prosegur Boost Security, Eases Management of Servers at Scale with Azure Arc
How to Discover, Assess, Migrate and Modernize with Azure Migrate
Tuesday, July 19, 2022
We love to celebrate 👏our customers' successes. RT to share yours. Reach out to a @Microsoft #Azure Arc expert at NetWerks Strategic Services, LLC for next steps.
Free Cloud Migration Assessment
Have you considered #Azure Arc? RT if you're interested in learning more. A provider of Microsoft Security solutions, the experts at NetWerks Strategic Services, LLC can give you a one-on-one walkthrough.
54 Basic Video and Web Conferencing Statistics: 2021/2022 Analysis of Data & Market Share
Monday, July 18, 2022
Find Your Light
Greggs manages and secures complex hybrid cloud deployments with Azure Arc
Plan a successful cloud adoption with a well-defined strategy
Nokia Integrates Azure Arc into MXIE Bundle
Tuesday, July 12, 2022
Telehealth or Teleheadache?
Azure Arc Demo
We're here to make technology accessible to all. RT if you think that's worth celebrating.👏 #MicrosoftTeams #Azure
Monday, July 11, 2022
How Do Healthcare Providers Really Feel About Virtual Care?
View: How Do Healthcare Providers Really Feel About Virtual Care?
Sustainable Jeans and Sneakers Manufacturer Chooses Microsoft 365 to Stay One Step Ahead
3 Steps to Secure Your Multi Cloud and Hybrid Infrastructure with Azure Arc
Microsoft Teams Live Captions is Now Generally Available
Microsoft 365 for Small Business
Tuesday, July 5, 2022
How can NetWerks Strategic Services, LLC help you plan a smooth, successful migration? Contact us to book a meeting with one of our @MSFTDynamics365 experts. #Dynamics365 #cloud
Logitech Rally Family Portfolio
Meet with Me
Monday, July 4, 2022
Logitech Room Solutions
Alterra Mountain Company: Dynamics 365 Fuels Growth for the Newly Formed, Fast-Growing Company
Ransomware as a Service: Understanding the Cybercrime Gig Economy
Windows 10 or Windows 11 Enterprise Multi-Session Remote Desktops
Tuesday, June 28, 2022
MX Keys Combo for Business
Engineering Firm in Bangladesh Employs Cloud Solutions to Streamline Daily Operations
View: Engineering Firm in Bangladesh Employs Cloud Solutions to Streamline Daily Operations
Security is Only as Good as Your Weakest Link
Meet with Me
Monday, June 27, 2022
MX Keys Combo For Business with Logi Bolt ID
Simplify Your Cloud Migration Journey with the Azure Migration and Modernization Program
Your first line of defense against cyberthreat is a good security posture. How often do you assess yours? 🤔 Reply to have an @msftsecurity expert from NetWerks Strategic Services, LLC reach out about an assessment. #BeFearless
Create a Farm
Tuesday, June 21, 2022
Defense In-Depth Security in Microsoft Azure
It's Time to Create a Modern Digital Workspace Experience
View: It's Time to Create a Modern Digital Workspace Experience