Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Monday, December 9, 2019

How to Stay Cyber Safe This Holiday Season


How to Stay Cyber Safe This Holiday Season

With the holiday season upon us, it is important to maintain awareness of the many threats posed by cyber-criminals this time of year As the popularity of online shopping continues to increase, so does the number of potential unsuspecting victims for cyber-criminals to exploit. Scammers may target victims through a variety of methods, including via emails, compromised websites, spoofed websites, phone calls, text messages, or unsecured Wi-Fi networks. To help combat the threats posed aby cyber-criminals this holiday season, review the following list of common scams, tips, and best practices:

Be Wary of Links and Attachments in Unsolicited Emails
Around the holidays, users may receive emails from known retailers regarding sales and coupons, or claiming to be order confirmations or shipping notices. Cyber-criminals can easily steal retailer branding to make fraudulent emails appear legitimate and may contain links or attachments that install malware or lead recipients to spoofed websites that steal user credentials. These emails may attempt to convey a sense of urgency - Limited Time Offer! - to prevent users from thoroughly inspecting the email for red flags. Users are advised to navigate directly to retail websites by typing the legitimate URL into their browser instead of clicking on links in emails, and refrain from entering login credentials on websites visited via a link in an email.

Avoid Pop-Up Advertisements and Shortened URLs
Users are encouraged to use pop-up blockers to avoid unintentionally clicking on a pop-up ad that could introduce malware onto their system. Additionally, URL shorteners can be employed to trick users into visiting a malicious website. URL shorteners are often used on social media sites and other outlets to save space and for visual appeal. Users are advised to use a URL expander to reveal the true destination of shortened URLs prior to visiting the site.

Look Out for Holiday-Themed eCards and Messages Meant to Install Malware
In the past, users reported being targeted with various Thanksgiving Day-related scams. In some cases, spoofed emails were sent appearing to originate from legitimate organizations and contained the subject line “Thanksgiving eCard.” Additionally, an Emotet banking trojan campaign was observed using Thanksgiving lures, such as the subject lines “Happy Thanksgiving Day Greeting Message” and “Thanksgiving Day Card.” As malicious actors commonly leverage public interest during the holiday season to conduct financial fraud and disseminate malware, users are reminded to exercise caution with unexpected or unsolicited emails, especially those with a holiday theme.

Do Your Online Shopping at Home
Avoid using public computers, such as those at a library or hotel, or public Wi-Fi connections to log into personal accounts or conduct online shopping. Public computers could be infected with malware designed to steal your information and hackers can intercept network traffic traveling over unencrypted Wi-Fi signals. If you must connect to public Wi-Fi, use a virtual private network(VPN), to secure information transmitted between your device and the internet. Additionally, users are advised to refrain from using work computers to make online purchases, as cyber threats could endanger company and/or customer information.

Enable Multi-Factor Authentication (MFA) on All Accounts
Be sure to enable MFA (authentication by combining at least two of the following: something you know, something you have, and something you are) on every account that offers it as this will greatly reduce the risk of account compromise via credential theft. Even if a cyber-criminal obtains a user’s username and password, they will be unable to access that user’s account without their second factor. We encourages users to choose authentication apps, hardware tokens, or biometrics as a second factor over SMS-based authentication, due to the risk of SIM-swapping. The website TwoFactorAuth.org maintains a comprehensive list of websites that offer MFA.

Choose Credit Over Debit
When shopping online or at stores that do not yet support chip-and-PIN payments, it is advised to use credit cards over debit cards. While both payment methods pose a risk if compromised, debit cards do not carry the same consumer protections as credit cards, which limit the victim’s liability if fraudulent purchases are made using their payment card data. Magecart attacks, in which malicious code is injected into online payment webpages, are becoming more prevalent as the opportunity to steal payment card data from physical point-of-sale terminals has diminished.

Avoid Connecting Devices to Public Charging Stations
Public charging stations supplied with power cables or USB ports located in stores, airports, libraries, and schools may seem like a convenient way to charge your mobile devices on-the-go, but can you be sure that your device and data will be safe if you connect? These kiosks can contain concealed computers that attempt to extract data such as contact information, photos, and videos from connected devices, unbeknownst to the users. Additionally, malicious or compromised charging stations can expose devices to the risk of a malware infection. Even if the charging station is not malicious, the manufacturer or owner of the kiosk may require users to input their email addresses or phone numbers in order to charge their devices, potentially exposing them to unwanted marketing campaigns, phishing emails, and scam calls.


Verify Charities Before Donating
It is common around the holidays to donate to charities, particularly those that provide goods and/or services to those individuals in need. Users may be prompted to donate via solicitations received through email or social media; however, these may be promoting fake charities or impersonating legitimate charities. Prior to donating, ensure you are visiting the charity’s legitimate website to donate.

Beware ‘Secret Sister’ Gift Exchange Scam
Many people enjoy participating in group gift exchanges this time of year, however, beware of potential scams. Social media posts promoting a “SECRET SISTER" gift exchange has resurfaced recently, promising between 6 and 36 gifts in exchange for sending one gift. While this type of chain-letter appears innocent, it is actually illegal and considered a pyramid scheme. The scam begins by requesting the name and address of the recipient and their friends. This holiday season only participates in gift exchanges with individuals you know personally and refrain from sharing too much personal information online.


Friday, April 13, 2018

CISCO CCNA Cyber Ops Certification




Another achievement for the love of #Cyber #Security completed two exam to become Cisco Certified Network Associate Cyber Ops (CCNA Cyber Ops) Thanks to my family, work colleague and my networks for encouragement and support. #CCNA #CyberOps #CyberSecurity 

My review for the Cert: This cert is for security analyst interested in Security Operation Center to become CISCO Cyber Ops it required to pass two exam.

First one is like knowing networking , cryptography , general info sec concepts, web attack, linux and windows commands, file system, logs and different type of model that deal with threat.
Second exam is implementing like type of Security operations monitoring tools, incident detection,analysis and playbooks, threat hunting, Threat scoring, incident response and automation, Computer Forensics, Network Intrusion Analysis, Data and event analysis etc
Loved studying the CISCO books but felt amazing when setup LAB in my pc Three VM First is vulnerable linux pc (metasploitable vm) Second for Monitoring (Security Onion ) Linux which have monitoring tools included and Third for Hacking/Breaking the other vulnerable system using (KALI Linux) which have industry standard awesome tools included. Also love  reading Computer Security Incident Handling Guide: NIST 800-61 doc.


CCNA Cyber Ops Exam Details :
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops

Study Material for first Exam: SECFND Study Material
Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops/secfnd/study-material


Study Material for Second Exam: SECOPS Study Material
Implementing Cisco Cybersecurity Operations (SECOPS) v1.0
https://learningnetwork.cisco.com/community/certifications/ccna-cyber-ops/secops/study-material

Saturday, March 3, 2018

Password what to use and how to use it ?


Now a days Passwords for people is like we don't love them but can't live without them. So, here is something that help you to stay secure. I am sure that you know many of the following widely available and well-known guidelines for creating more secure passwords, but just in case, here is a recap:
  1. Use a mix upper- and lowercase letters, numbers, and special characters for example, Th1$1$@Samp!3
  2. Replace some letters with numbers (for example, replace i with 1 and e with 3)
  3. Do not include your name or other personal information (such as spouse /children, street address, school, birthdays, and anniversaries).
  4. Use nonsense phrases, misspellings, substitutions, or before-and-after words and phrases combining two unrelated words or phrases, such as “Avangers007” "Highway2R@bbitH0le" "TheE4gl3hasALandD0wnUnder"
  5. Combine two words by using a special character for example, P1zza&Cok3 Tra1n@ndT1ck3t, H4rry!P0t3r.
  6. Use a combination of all the other tips in this list for example, “Harry porter becomes H4rry!P0t3r, Pizza and coke becomes P1zza&Cok3 etc.
  7. Do not use repeating patterns between changes for example, password1, password2, password3, Most importantly 123456789 should never be used as password.
  8. Do not use the same passwords for work and personal accounts.
  9. Do not use passwords that are too difficult to remember.(keep it 8-14 character)
  10. Use a password manager like KeePass Password Safe, LastPass, Dashlane, Sticky Password, Roboform, TrueKey, Symantec Norton Identity Safe etc
Finally “A password should be like a toothbrush. Use it every day; change it regularly; and DON’T share it with friends.”


Faysal Hasan - is a IT System Engineer with a passion for security. He worked in information technology service delivery for more than 7 years. He received his Bachelor in IT from Southern Cross University, Australia and has earned numerous technical certifications throughout his career which include MCSE, 2xMCSA, CCNA Cyber Ops, VMWare Data Center, Citrix Xen App, Mcafee Endpoint Protection, ITIL v3,. He  also received many training that include SPLUNK, Service NOW, Prince 2 project management etc, He  is currently working as System Engineer in Enterprise Operations looking after technology infrastructure for Victoria Police.

Tuesday, November 15, 2016

Adobe Elements, Adobe Acrobat Reader, "Attempt to access invalid address" in Windows 10, Windows 7



Adobe Elements, Adobe Acrobat Reader, error message "attempt to access invalid address  in Windows 10, Windows 7


Try this Reg fix 

The key is "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management" 

Look for entry MoveImages 
if not there create new DWORD and it will be hexadecimal value 0x0 by default
If you set the key to 1 instead of 0 and restart your machine it resolved this error message


For Office 365 Attempt to access invalid address

The issue is for EMET (Enhanced Mitigation Experience Toolkit) which  causing the problems.
Try upgrading to new version from here https://technet.microsoft.com/en-us/security/jj653751
or uninstalling EMET doesn't work 
Then try this reg fix :

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
For any process used by MS product it will have a value for 'MitigationOption' (eg excel.exe, infopath.exe etc) 

Set 'MitigationOption' to 0 or delete it.

Friday, April 8, 2016

Google Apps for your small business

I've been using Google Apps for my company, and it's really helped my team work more quickly and efficiently. I think that you'd also benefit from trying it out for your business.

Google Apps is a cloud-based productivity suite that includes Gmail for professional email, Drive for online storage, Hangouts for video meetings, Calendar for scheduling and Docs for editing files. 

I especially like how easy it is to get things done and work with others from anywhere, using any device that I choose. I've also found Apps to be highly cost effective.

Google Apps helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Millions of organisations around the world count on Google Apps for professional email, file storage, video meetings, online calendars, document editing and more.

These are some highlights:
Business email for your domain:

Looking professional matters, and that means communicating as you@yourcompany.com. Gmail’s simple, powerful features help you build your brand while getting more done.

Access from any location or device:
Check emails, share files, edit documents, hold video meetings and more, whether you’re at work, at home or in transit. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools:
Robust admin settings give you total command over users, devices, security and more. Your data always belongs to you, and it goes with you, if you switch solutions.

Start free trial

Faysal Hasan - is a IT System Engineer has with a passion for security. He worked in information technology service delivery for more than 7 years. He received his Bachelor in IT from Southern Cross University, Australia and has earned numerous technical certifications throughout his career. He is currently working as the System Engineer in Enterprise Operations looking after technology infrastructure for Victoria Police.

Friday, April 1, 2016

Windows 10 Change your Default Browser

Change Your Default Browser
If you upgraded to Windows 10 from Windows 7 or 8, you'll notice that Microsoft Edge is now your default browser, even if Chrome or Firefox was your default before. Edge Browser is a bit faster than Chrome or Firefox, but doesn't provide the level of extensibility that its competitors offer. If you are a Chrome or Firefox user, you'll want to change your default right away.
1. Navigate to settings.

2. Click System.



  
3. Select Default apps from the left pane.
                    
4. Click the Microsoft Edge icon under the "Web browser" header.
 

5. Select the browser you want as your new default (ex: Chrome).

Windows 10 how to Disable User Account Control

Isn't it annoying every time you try to remove or install something windows ask for your account username and password or at least you have to press yes now you get say goodbye to User account control pop up. Here is how to Disable User Account Control










Windows wants to wag a finger at you every time you try to install a program or change a vital setting by popping up a dialog box and making you click Ok to continue. Why warn  you if you already know what you're doing? Good question. Disable User Account control to stop the needless, annoying dialog boxes.
1. Search for "user account control" in the search box.
2. Open "Change User Account Control settings."
3. Slide the slider down to "Never notify" and click Ok.
4. Click Yes when prompted.

Windows 10 how to Enable System Protection / Create a Restore Point

Enable System Protection / Create a Restore Point
What happens if you install a bad piece of software or a defective driver and your computer starts acting strangely or you can't even boot. You'll want to revert Windows 10 to the previous system restore point, which will turn back the clock on your drivers, programs and settings to a time when the system worked perfectly. However, Windows 10 comes with system protection disabled. If you want to protect yourself -- and you should -- set up restore points following the instructions below.
1. Search for "restore point" in the Windows search box.


2. Launch "Create a restore point" from the results. You should see a list of available drives.
3. Select the system drive and click Configure. The system drive is usually the C: drive and has the word "(System)" written after its volume name.
4. Toggle Restore Settings to "Turn on system protection," set the maximum disk space usage by moving the slider and click Ok. We recommend leaving 2 or 3 percent for restore pints but you may be able to get away with the lowest (1 percent).
5. Click Create so that you create an initial restore point right away.
6. Name the initial restore point when prompted.
 7. Click Close when it is done.
If you need to restore from one of these points, you can click the System Restore button on the System Protection tab. If you can't boot, you can hit F8 or Shift + F8 during boot to get to the emergency menu on some computers. On other PCs, if you can at least get to the log in screen, you can hold down Shift while you select Restart.


Thursday, October 2, 2014

Windows 10 Download



Originally codenamed Windows Threshold, the new operating system essentially does away with the dependency on the tiled "Metro" user interface that Microsoft had attempted to implement across its entire device line, from desktop PCs to Surface tablets and Windows Phone devices. In its place is a combination of the so-called live tiles, present in areas like the new Start Menu, and a more classic Windows experience that aims to please both touch and keyboard-and-mouse users.

One way to look at it is that Windows is at a threshold :-). It’s time for a new Windows. This new Windows must be built from the ground-up for a mobile-first, cloud-first world. This new Windows must help our customers be productive in both their digital work and their digital life. This new Windows must empower people and organizations to do great things.

That new Windows is Windows 10.

Windows 10 represents the first step of a whole new generation of Windows. Windows 10 unlocks new experiences for customers to work, play and connect. Windows 10 embodies what our customers (both consumers and enterprises) demand and what we will deliver.

Windows 10 will run across an incredibly broad set of devices – from the Internet of Things, to servers in enterprise data centers worldwide. Some of these devices have 4 inch screens – some have 80 inch screens – and some don’t have screens at all. Some of these devices you hold in your hand, others are ten feet away. Some of these devices you primarily use touch/pen, others mouse/keyboard, others controller/gesture – and some devices can switch between input types.

We’re not talking about one UI to rule them all – we’re talking about one product family, with a tailored experience for each device.

And across this breadth of devices, we are delivering one application platform for our developers. Whether you’re building a game or a line of business application, there will be one way to write a universal app that targets the entire family. There will be one store, one way for applications to be discovered, purchased and updated across all of these devices.
Windows 10 will deliver the right experience on the right device at the right time. It will be our most comprehensive platform ever.

here’s a peek at some of the new features you can test drive once you become an Insider:
Start menu: The familiar Start menu is back, but it brings with it a new customizable space for your favorite apps and Live Tiles.

Everything runs in a window: Apps from the Windows Store now open in the same format that desktop apps do and can be resized and moved around, and have title bars at the top allowing for maximize, minimize, and close with a click.

Snap enhancements: You can now have four apps snapped on the same screen with a new quadrant layout. Windows will also show other apps and programs running for additional snapping and even make smart suggestions on filling available screen space with other open apps.

New task view button: There’s a new task-view button on the taskbar for quick switching between open files and quick access to any desktops you create.

Multiple desktops: Create desktops for different purposes and projects and switch between these desktops easily and pick up where you left off on each desktop.

Find files faster: File Explorer now displays your recent files and frequently visited folders making for finding files you’ve worked on is easier.





 DOWNLOAD Windows 10

Anyone wants windows 10 to play withCheck it out for download  http://windows.microsoft.com/en-us/windows/preview-iso

Product Key: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR




Twitter Facebook Favorites More