News & Events

November 2018

Altitude Unlimited Receives 2018 Best of Business Award

By |November 2nd, 2018|

Rich Thurman, Founder and Chairman of Small Business Community has published our business as a recipient of the 2018 Best of Business Award presented by the Small Business Community. See the full press release here.

Comments Off on Altitude Unlimited Receives 2018 Best of Business Award

September 2018

New Office 365 Phishing Email

By |September 25th, 2018|

Office 365 users are being targeted in a convincing looking phishing attack. 
Phishing attacks, a common tactic used by cyber criminals to try to trick you into giving them your information, are nothing new.  In fact, it’s likely if your company has already been targeted by phishing (and if you haven’t been, it’s a matter of when […]

Comments Off on New Office 365 Phishing Email

June 2017

Petya Ransomware Virus Attack

By |June 28th, 2017|

Moving to a cloud server means your small business’ data and applications are being hosted online rather than on an in-house or premise-based server.  Premise-based servers come with their own set of problems and typically require

Yesterday’s massive ransomware attack appears to have targeted systems in the Ukraine.  Kaspersky Labs reports that as many as […]

Comments Off on Petya Ransomware Virus Attack

May 2015

May Your Business Benefit from Switching to Cloud Computing?

By |May 22nd, 2015|

Moving to a cloud server means your small business’ data and applications are being hosted online rather than on an in-house or premise-based server.  Premise-based servers come with their own set of problems and typically require
extensive IT support for updates, security management and configuration.  Add to this a yearly license cost for the Microsoft […]

Comments Off on May Your Business Benefit from Switching to Cloud Computing?

November 2014

Should You Be Considering a Cloud Hosted Solution?

By |November 3rd, 2014|

Considering a Cloud Hosted Solution?

IT resource requirements and employee expertise continue to grow for small- to mid-size companies.  According to a 2014 report by Gartner only one in five midmarket CIOs believe they have the IT resources required to meet the demands of their business. Specifically, the IT leaders cite the lack of

Internal staff […]

Comments Off on Should You Be Considering a Cloud Hosted Solution?

August 2014

Gmail Hacking Revealed Details for Almost 5 Million Accounts

By |August 9th, 2014|

You might be wondering, if Google can have security issues, how do I protect my company?

What happened?

Hackers revealed nearly 5 million Gmail account details and passwords on Bitcoin Security – a popular Russian website devoted to cryptocurrency. The leak became known after a user posted a link to the log-in credentials on Reddit frequented […]

Comments Off on Gmail Hacking Revealed Details for Almost 5 Million Accounts

June 2014

Windows Server 2003 End Of Life Rapidly Approaching

By |June 17th, 2014|

Windows Server 2003 End Of Life Rapidly Approaches
Most IT administrators are probably already aware that Windows Server 2003 end of life will occur in July 2015.  However, there are still many customers who run Windows Server 2003 in production today and many will continue to do so until end-of life of Windows Server 2003 or close to that date […]

Comments Off on Windows Server 2003 End Of Life Rapidly Approaching

May 2014

Cryptolocker Malicious Software is Running Rampant

By |May 9th, 2014|

What is CryptoLocker? CryptoLocker malicious software basically holds your files for ransom.  The software is typically spread through infected attachments to emails or as secondary infections on computers which are already affected by the virus. The virus enters your system through the opening of attachments.  It then starts to encrypt your files.  Once they are encrypted […]

Comments Off on Cryptolocker Malicious Software is Running Rampant

Internet Explorer Breach

By |May 5th, 2014|

55% of the PC browser market vulnerable to attack
An Internet Explorer breach is leaving users vulnerable to a hijack. Hackers created a website which allows the installation of malware when the site is visited. If you’re searching the web using Internet Explorer you can be tricked into visiting a site which will install malware […]

Comments Off on Internet Explorer Breach

April 2014

The Heartbleed Bug

By |April 9th, 2014|

It’s been a while since there was a computer security bug we all had to worry about. Unfortunately, it seems like we may all have been facing one for two years and not even realized it.

Yesterday, security researchers announced a security flaw in OpenSSL, a popular data encryption standard, that gives hackers who know […]

Comments Off on The Heartbleed Bug