About: M2Admin

Posts by M2Admin:

The Motives Behind Ransomware: Financial Gain or Just Destruction?

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT, Hack, Hacker Group, Hackers, Hacking, Security No Comments

What are the real motives behind ransomware attacks? Most experts believe most ransomware attacks can be traced back to money, but some experts are now saying that might not always be the case. NotPetya, an attack that targeted the Ukraine this past ...

Read More »

ASK and AOS Announce Managed Services Partnership

Posted By: ASK Posted date: September 23, 2017 In: ASK, Business, Managed IT, Mike Maddox No Comments

ASK and AOS Form Partnership for Managed IT Services and Managed Print Solutions, Offering Businesses a Comprehensive Technology Solution. Lansing, Michigan – 09/13/2017 – Mike Maddox, president and CEO of Application Specialist Kompany (ASK), an ...

Read More »

Hirotec America Announces New Partnership to Gain Manufacturing Excellence

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT No Comments

Mike and Erik discuss a recent announcement by a very forward thinking and successful Michigan based company, Hirotec America. The company recently announced their efforts to utilize lights out manufacturing to increase efficiency, reduce waste, and ...

Read More »

ASK’s Mike Maddox to Present at Continuum’s Navigate 2017

Posted By: ASK Posted date: September 23, 2017 In: Uncategorized No Comments

Mike Maddox, President and CEO of ASK Presenting “Selling Cybersecurity” At Continuum’s Navigate 2017 conference, October 2-5 in Las Vegas Lansing, Michigan – 08/28/2017 – Mike Maddox, President and CEO at ASK, has been confirmed as a pres ...

Read More »

NotPetya Ransomware Not Designed to Make Money

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT, Hack, Hacker Group, Hackers, Hacking, Phishing Campaign No Comments

NotPetya, the recent ransomware attack that infected PC’s around the world spread faster than the notorious WannaCry ransomware. Its rapid proliferation wasn’t the only thing that set NotPetya apart. According to security experts, this attack ...

Read More »

Honda Gets Shutdown by WannaCry Ransomeware Attack

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT, Hack, Hacker Group, Hackers No Comments

On June 19th Honda, one of the largest auto makers in the world, joined Nissan and Renault SA as car manufacturers who had factories attacked by WannaCry. Despite Honda’s efforts to protect its network systems in May in response to WannaCry’s sp ...

Read More »

Phishing Scams – How to Protect your Business

Posted By: ASK Posted date: September 23, 2017 In: Email, Email Security, Phishing Campaign, Uncategorized No Comments

What is a Phishing Scam? Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises in order to obtain sensitive information such as usernames, passwords, and credit card details and, indirectly, money. T ...

Read More »

How NYU Accidentally Shared Military Code Breaking Project with the World

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT No Comments

A fascinating story about how an internet cyber researcher uncovered a completely unprotected server holding highly confidential information on a joint project between the Department of Defense, NYU, and IBM.  Mike and Amy discuss how this could hav ...

Read More »

How Consumers Feel About Ransomware Following WannaCry

Posted By: ASK Posted date: September 23, 2017 In: Bottom Line IT, Hack, Hacker Group, Hackers No Comments

The aftermath of the recent WannaCry ransomware is still being felt. This ransomware affected more than 300,000 PCs over 150 countries. This got a lot of publicity and started many people outside of tech talking about the security of their data and t ...

Read More »

6 Things You Should Know About ASK’s Total Care Solutions

Posted By: ASK Posted date: September 23, 2017 In: IT Support, Managed IT, Technology No Comments

Chances are, your company runs on the success of your technology. Hiring a full IT department internally may not be feasible, and experiencing downtime and unproductivity is simply not an option. So what options do you have? You can continue to scrap ...

Read More »