Usherwood Blog

Stay informed with updates and tips from our experts in the managed IT industry and hear the latest news about our team at Usherwood.

Cyber Security

By: Darrian Breedlove, Content Writer
June 15th, 2021

There are 560,000 new pieces of malware detected every day, according to a report by AV-Test Institute. Malware is one of the most notorious threats to cybersecurity out there. However, there's a lesser-known type of malware called malvertising. Malvertising is a trap anyone could fall for, and businesses are susceptible to it.

Cyber Security

By: Sarah Goltz, Content Manager
June 15th, 2021

Cyber-criminals utilize several types of display advertisements to distribute malware.

Cyber Security

By: Sarah Goltz, Content Manager
June 14th, 2021

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud; in fact, it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or the workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. These criminals can gain information through emails, pop-ups, and public Wi-Fi networks, to name a few. The main objective is to influence, manipulate or trick users into giving up privileged information or access within an organization. They are doing this right under your nose, and if you’re not paying attention, you will be a victim of this as well.

Cyber Security

By: Sarah Goltz, Content Manager
June 11th, 2021

On April 29th, one of the largest fuel pipelines in the U.S, Colonial Pipeline Co. was hacked, which led to major shortages in fuel across the East Coast. New information came out this weekend regarding what may have led to the weak spot in Colonial Pipelines system resulting in the attack on their network. Apparently, an old account was not decommissioned correctly and still had access to the network by virtual private network (VPN). As a result, a hacker was able to obtain the password from the dark web and used their illicit access to demand cryptocurrency in return of the Colonial Pipeline system. Colonial paid the hackers $4.4 million in order to avoid confidential information from getting leaked.

Managed Print | Canon

By: Sarah Goltz, Content Manager
June 5th, 2021

uniFLOW Online is one solution to secure your print and scan environment. uniFLOW Online provides cloud print management with various job submission pathways as well as comprehensive cloud scan management functionalities.

Managed Print | HP

By: Sarah Goltz, Content Manager
May 28th, 2021

HP Workpath apps offer a variety of capabilities for streamlined digitization workflows and securing confidential information—while creating an intuitive user experience. The HP cloud connector apps can be used to scan to and print from a specific cloud account using the printer control panel. By providing a direct connection between the HP printer and the cloud account, the HP app optimizes workflows and worker efficiency.

managed IT Services

By: Sarah Goltz, Content Manager
May 25th, 2021

When deciding between hiring an outsourced managed IT firm or investing in in-house IT support, it is important to first identify your business goals. Business size, small, mid-size, or large, budget, and future goals are all important factors.

managed IT Services | HP

By: Sarah Goltz, Content Manager
May 21st, 2021

What is HP Roam? HP Roam for Business is a universal business printing experience that reshapes how innovative organizations print. You can replace traditional, printer-specific drivers with an intuitive print experience that is simple to use, is scalable, and provides a natural experience across desktop and mobile devices. Customer and company data are protected by advanced security features such as encryption, authentication, and integration with HP ID.

Managed Print | PaperCut

By: Sarah Goltz, Content Manager
May 18th, 2021

CONTRIBUTION BY DAN HERNBORG, MANAGED SOLUTIONS SPECIALIST As a managed service provider, we receive a lot of questions about our serverless printing solution, PaperCut Hive. For this reason, we have decided to share! Our hope is that we can answer some of those questions to put the knowledge in your hands and make your purchasing decision easier. This is a great start in narrowing your search for a serverless print solution and deciding if PaperCut Hive is the right fit for your business!