framework

Category Archives: Security News

WARNING: New ransomware outbreak – WannaCry is in the wild

New reports worldwide regarding the attack appears to have affected a number of organizations in multiple countries. The count as of this article has exceeded 100 countries. The ransomware locks down all the files on an infected computer and asks the computer’s administrator to pay in order to regain control of them. The ransomware, called “WannaCry,” is […]

URGENT: Potential business impact. Beware of Microsoft word documents in emails!

  This is an alert to inform all Microsoft Office users of a new zero-day attack that installs malware onto a fully patched system running Microsoft Operating System via an Office vulnerability. We recommend refraining from sending or opening any Word documents via email. This type of phishing emails can come in different formats including Resumes, Invoices, […]

Scammers continue to defraud and extort funds from businesses using Cryptowall ransomware

Data from the FBI’s Internet Crime Complaint Center (IC3) shows ransomware continues to spread and is infecting devices around the globe. Recent IC3 reporting identifies CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses. CryptoWall and its variants have been used actively to target U.S. victims since April 2014. The […]

LogMeIn Receipt Phishing Scam

Re-posted from blog.logmein.com We’re getting reports from both the general public and LogMeIn customers about suspicious emails that are designed to look like they are coming from LogMeIn — they have all the hallmarks of phishing attempts. All of the reports have the same headline and text. And all are meant to look like a […]

Apple iOS “Masque Attack” Technique

Systems Affected iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta. Overview A technique labeled “Masque Attack” allows an attacker to substitute malware for a legitimate iOS app under a limited set of circumstances. Description Masque Attack was discovered and described by FireEye mobile security researchers.[1](link is external) This attack works by luring users […]

ALERT: Fake iTunes Order Acknowledgement phishing email

If you receive a fake iTunes purchase receipt, ignore and delete it. We  received reports of emails that appear to be from the Apple Store confirming expensive purchases that were made on an iTunes account and containing a link to dispute the purchase.   The email duplicates an authentic iTunes message and features the Apple logo, but is not actually […]

Do Not Use Internet Explorer – Vulnerability Being Actively Exploited

Update 5/1/14: Microsoft has released out-of-band updates to address a critical use-after-free vulnerability in Internet Explorer versions 6 through 11, including IE versions running on Windows XP. US-CERT recommends that users and administrators review Microsoft Security Bulletin MS14-021 and apply the necessary updates as soon as possible. The use-after-free vulnerability is being actively exploited in Internet Explorer versions […]

Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution

Microsoft has identified a “zero-day” vulnerability involving .TIFF files. This means that neither Microsoft nor the antivirus companies have been able to develop tools to address this vulnerability. Because this is a zero-day vulnerability, the only way to protect yourself is to exercise extreme caution when opening .TIFF files, no matter how they reach you—whether […]

« Older Posts
Life Sciences

Stethoscope2

We have worked with medical device, biotech, and healthcare companies helping them to manage R&D environments, security compliance (including HIPPA), and onsite labs. 

 

×
Technology

Information-Technology-Graphic

ARX has experience providing customized IT infrastructure and outsourcing solutions to technology related organizations. 

 

×
Legal Industry

 

Law firms have specific challenges that we know how to address.

×
Financial Services

finance-assignment-help

Financial companies need to maintain internal and external security protocols. We provide:

×
Professional Services

 

Our experience in supporting professional services includes: 

×
Non-Profits

 

 

You can’t afford unplanned network crashes – a stable computer network, trusted IT support team, and planned IT budget is critical to your organization. 

×
Help Desk Services

help desk

Remote support for business critical problems  

×
Managed IT Projects

 

IPED_project-management

As your organization evolves to stay relevant in the changing business world, you will need to modify and adopt new IT technologies to support it. When your organization needs IT consulting guidance and experienced engineers for IT project management and implementation, ARX can help.

We Provide:

×
Backup & Risk Mitigation

Backup (2)

×
Hosted Cloud Solutions

 

Hosted cloud solutions1 (2)

×
VoIP Implementation

 

voip (2)

 

×
Procurement Management

 

computer-peripherals

×
Network Monitoring

Network picture

ARX Networks Monitoring detects and avoids performance events before they impact your business. We are constantly scanning, troubleshooting, and preventing incursions. Our tools include: firewall, VPN, and intrusion prevention systems.

ARX works to prevent spam, viruses, phishing, and denial of service (DoS) attacks on your network.  

 

×
On-Site Response

Capture

We can be onsite when you or your equipment need us.

While a technician is on their way we will be working remotely to get you back up and running.

×
Support Flexibility

 

time and calendar

We will provide the support that you need anytime and anywhere.

Remote and onsite hours can be tailored to support your company and employees.

Is it electronic? Ask us to manage it.

×
Strategic Approach

exit_22We bring a complete overview to all of your IT services, and work to provide the most efficient and economical strategy for current operations and future growth. 

×
Scalable Solutions

scalable

We work with you to help minimize upfront costs, hassles, and growing pains.

Infrastructure overload, clutter, and nuisances are minimized when we prepare your services for expansion.

The hardware and software that we install will grow with your company.

×