Power Protection Facts

What kind of power events damage office equipment?

Destructive Surges

Caused by lightning and other catastrophic events
Range from 100V to 6000V and the duration is less than 1 millisecond
Most copier service agreements do not cover damage caused by these types of power events

Disruptive Noise

Unwanted voltage/currents […]

August 30th, 2018|Tags: |0 Comments

Cyber Security Threats

Cyber Attacks are on the Rise and are Incredibly Expensive
 

Malware and web-based cyber-attacks are the most popular forms of cyber-attacks. Unfortunately, these attacks are growing in their complexity and methods of delivery.

4,000 ransomware attacks occurred per day in 2016 (How to Protect Your Networks from Ransomware). This number has […]

August 23rd, 2018|Tags: |0 Comments

Stop Your Business from Being Part of The Daily Catch!

 

 Recieve A Free Mock Phishing Attack and Employee Training Class
Redeem at www.raymorgan.com/stop-phishing
 
Test Employee Willingness to Click on Suspicious Links
Provide Key Training To Reduce Risk
No Cost Training Exercise
Expires 8/31/18
Phishing attacks,
such as ransomware and email campaigns can compromise your business network, security, and data. Ray Morgan Company runs email phishing […]

August 16th, 2018|Tags: |0 Comments

Girls on the Run

RMC is proud to announce that we have donated to assist with helping over 800 girls learn critical life skills in the 2017-18 year alone. At Ray Morgan Company we pride ourselves on working with various charity organizations. Girls on the Run is a national physical activity-based positive youth […]

August 9th, 2018|Tags: |0 Comments

Redding, California Carr Fire

“Ray Morgan Company is dedicated to helping those in our Northern California communities affected by this unimaginable tragedy.”
Greg Martin, President of the Ray Morgan Company

On behalf of Ray Morgan Company, our thoughts and prayers go out to all of the families impacted by the Carr Fire. Our deepest gratitude […]

August 2nd, 2018|Tags: |0 Comments

Secure Website Browsing

The Top Browser Threats
When end users venture out onto the Internet, it’s easy to get tangled up in the vast web of threats lurking on many website pages. Some of them are readily apparent, but others are well hidden.

Malvertising—a form of malicious code that distributes malware through online advertising—can […]

July 26th, 2018|Tags: |0 Comments

Password Security: Do’s & Don’ts

Low-Security Account Credentials
Although it should be common sense, employees need to avoid the use of passwords that are easy for hackers to guess. Among the top ten worst passwords according to http://www.splashdata.com are those that use a series of numbers in numerical order, such as <123456>. The names of […]

July 19th, 2018|Tags: |0 Comments

Understanding Cloud Technology

What is the Cloud?

The cloud is virtual and therefore does not require any hardware of your own to deliver a service. Cloud technology can deliver that service to you, without having to install anything or have it on a server at your business. This is something that you […]

July 12th, 2018|Tags: |0 Comments

Cyber-Security – Importance of Keeping a Clean Desk

It makes sense and sounds so simple, but keeping a clean desk is often overlooked when talking about cyber-security. It’s also the perfect place to start the security discussion with employees.

Employees that keep a cluttered desk tend to leave USB drives and smartphones out in the open. They also […]

July 9th, 2018|Tags: |0 Comments

Test Yourself! Would You Fall for a Phishing Scam?

Phishing is one of the most popular and efficient ways for cybercriminals to exploit employees and gain access to sensitive data. Why, though, is it so easy for you or your employees to be duped and for human error to unleash a debilitating phishing attack?

Maybe you’ve had sufficient cybersecurity […]

June 28th, 2018|Tags: |0 Comments