Security

Living in a world of IoT – Is it safe?

Posted date: July 5, 2018

The current state of internet connected devices is somewhat precarious. Depending on what day it is and the publication you chose to read, it can be either scourge or savior. Internet Connected Toys Recently consumer groups have raised questions abou ...

Read More »

Creating a Culture of IT Security

Posted date: June 25, 2018

For the last 4 years, I have been an outspoken advocate for the implementation of, what I consider to be basic, security controls. I have preached the gospel of NIST and CIS frameworks to anyone that would listen, expounding the benefits of limiting ...

Read More »

Simple Security To-Do: Lock Your Computer Screen

Posted date: May 23, 2018

Sometimes it is the simple things that make a difference. If you haven’t figured it out yet, your behavior and how you keep your office has an impact on the security of your employer. We’re not talking about a small impact either. Your interactio ...

Read More »

ASK Recognized for Excellence in Managed IT Services

Posted date: February 20, 2018

ASK Recognized for Excellence in Managed IT Services Lansing, Michigan, February 20, 2018 – Application Specialist Kompany (ASK), announced today that CRN®, a brand of The Channel Company, has named ASK to its 2018 Managed Service Provider (MSP) 5 ...

Read More »

What You Need to Know About VMware and Browser Settings

Posted date: January 5, 2018

FROM THE DESK OF MIKE MADDOX: In our last blog post, I provided an informational bulletin regarding recently discovered microprocessor vulnerabilities and the potential for these vulnerabilities to lead to security breaches. This is a huge issue that ...

Read More »

What You Need to Know About Recent Processor and Chip Vulnerabilities

Posted date: January 4, 2018

From the desk of Mike Maddox: You have probably seen the news reports regarding microprocessor vulnerabilities and the potential for these vulnerabilities to lead to security breaches. ASK has put together the information below in an effort to keep y ...

Read More »

7 Cybersecurity Questions to Ask After the Equifax Breach

Posted date: November 27, 2017

The recent Equifax breach has many business leaders asking what could have been done to avoid this breach and what they can do to make sure this does not happen to their business. On a recent segment of the Bottom Line IT Show, Mike and Amy discuss a ...

Read More »

World’s Largest Spambot Discovered

Posted date: October 22, 2017

If you are not familiar with what a spambot is, they are programs designed to collect e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail. The recipient of the spammed email has no idea the email is not c ...

Read More »

The Motives Behind Ransomware: Financial Gain or Just Destruction?

Posted date: September 22, 2017

What are the real motives behind ransomware attacks? Most experts believe most ransomware attacks can be traced back to money, but some experts are now saying that might not always be the case. NotPetya, an attack that targeted the Ukraine this past ...

Read More »

NotPetya Ransomware Not Designed to Make Money

Posted date: August 25, 2017

NotPetya, the recent ransomware attack that infected PC’s around the world spread faster than the notorious WannaCry ransomware. Its rapid proliferation wasn’t the only thing that set NotPetya apart. According to security experts, this attack ...

Read More »