27363681109850116521312867

COMPUBC INFORMATION TECHNOLOGY SERVICES LTD. MANAGED IT SERVICES FOR BUSINESS & RESIDENTIAL. PC & MAC.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews

Outlook “mail issues” phishing – don’t fall for this scam!

8/24/2020

0 Comments

 
Picture
Apart from some slightly clumsy wording (but when was the last time you received an email about a technical matter that was plainly written in perfect English?) and a tiny error of grammar, we thought it was surprisingly believable and worth writing up on that account, to remind you how modern phishers are presenting themselves.

Yes, you ought to be suspicious of emails like this. No, you shouldn’t click through even out of interest. No, should never enter your email password in circumstances like this.
But the low-key style of this particular scam caught our eye, making it the sort of message that even a well-informed user might fall for, especially at the end of a busy day, or at the very start of the day after.
​
Here’s how it arrives – note that in the sample we examined here, the crooks had rigged up the email content so that it seemed to be an automated message from the recipient’s own account, which fits with the theme of an automatic delivery error:
Picture
I​n​c​o​m​i​n​g​ ​m​e​s​s​a​g​e​s​ ​f​o​r​ [REDACTED] c​o​u​l​d​n​’​t​ ​b​e d​e​l​i​v​e​r​e​d​.
This message was sent in response to multiple incoming messages being rejected consistently from 2:00 AM, Wednesday, August 19, 2020.
To fix, recover and prevent further rejection of emails by our server, connect to your Company-Assigned OWA portal securely below.
​Only if you were to dig into the email headers would it be obvious that this message actually arrived from outside and was not generated automatically by your own email system at all.
The clickable link is perfectly believable, because the part we’ve redacted above (between the text https://portal and the trailing /owa, short for Outlook Web App) will be your company’s own domain name.

But even though the blue text of the link itself looks like a URL, it isn’t actually the URL that you will visit if you click it.
Remember that a link in a web page consists of two parts: first, the text that is highlighted, usually in blue, which is clickable; second, the destination, or HREF (short for hypertext reference), where you actually go if you click the blue text.
​
A link is denoted in HTML by an ANCHOR tag that appears between the markers <A> and </A> while the destination web address is denoted by an HREF attribute inside the opening anchor tag delimiter.
Like this:
​This is a <A HREF='https://example.com'>clickable link</A> going to EXAMPLE.COM But the link <A HREF='https://example.com'>https://different.example</A> also goes to EXAMPLE.COM, because the URL used is determined by the HREF setting, even if the text of the link itself looks like a URL. The domain DIFFERENT.EXAMPLE here isn't actually a web address, it's just text that looks like a web address.
Picture
Why not just block links that look deceptive?
If you’re thinking that “links that deliberately look as though they go somewhere else” sound suspicious, you’d be right.

You might wonder why browsers, operating systems and cybersecurity products don’t automatically detect and block this kind of trick, where there’s an obvious and deliberate mismatch between the clickable text and the link it takes you to.

Unfortunately, even mainstream sites use this approach, making it effectively impossible to rely up front on what a link looks like, or even where it claims to go in your browser, in order to work out exactly where your network traffic will go next.
​
For instance, here’s a Google search for here's an example:
Picture
You can see that if you ① search for here's an example, you’ll receive a answer in which ② an explicit domain name (in this case, english.stackexchange.com) is used as the visible text of a clickable link.
You can also see that when you hover over the domain name link, you’ll see ③ a full URL that apparently confirms that clicking the link will take you to the named site.
​​However, if you use Firefox’s Copy Link Location option to recover the ultimate link, you’ll see – thanks to the magic of JavaScript – that your web request actually goes to a URL of this sort:
​https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=& cad=rja&uact=8&ved=[REDACTED]& url=https%3A%2F%2Fenglish.stackexchange.com%2Fquestions%2F225855%2Fheres-an-example[...]
Eventually, you will end up at the URL shown at position ③ in the screenshot above, but you’ll be redirected (quickly enough that you might not notice) via a Google track-and-redirect link first.
So you do end up where the browser told you, but not quite as explicitly and directly as you might have expected – you get there indirectly via Google’s own advertising network.

What happens next?

The good news is that in the case of this phish you will see the actual web page you’ll be taken to if you hover your cursor over the link-that-looks-like-a-different-link.
That’s because email clients and webmail systems generally don’t allow JavaScript to run, given that emails could have come from anywhere – even if they say they came from your own account, as this one does.

So you ought to spot this phish easily if you stop to check where the link-that-looks-internal really ends up.
In our case (note that the exact URL and server name may vary every time), the real link did not go to https://portal.[REDACTED]/owa, as suggested by the text of the link.
Instead, it went to a temporary Microsoft Azure cloud web storage URL, as shown below, which clearly isn’t the innocent-looking URL implied in the email:
The phishing page
If you do click through, and your endpoint or firewall filter doesn’t block the request, you will see a phishing page that we must grudgingly admit is elegantly simple:
​​
Picture
Your email address is embedded in the link in the email that you click on, so the phishing page can fill in the email field as you would probably expect.
When we tried this page, deliberately putting in fake data, we received an error message after the first attempt, as though we’d made a mistake typing in the password:
Picture
No matter what we did the second time, we achieved “success”, and moved onwards in the scam.

How it ends

One tricky problem for phishing crooks is what to do at the end, so you don't belatedly realise it's a scam and rush off to change your password (or cancel your credit card, or whatever it might be).
In theory, they could try using the credentials you just typed in to login for you and then dump you into your real account, but there's a lot that could go wrong.
The crooks almost certainly will test out your newly-phished password pretty soon, but probably not right away while you are paying attention and might spot any anomalies that their attempted login might cause.
​
They could just put up a "thanks, you may now continue normally" page, and often that's exactly what they do as a simple way to sign off their scam.
Or they find a page that's related to the account they were phishing for, and redirect you there.
This leaves you on a web page that really does have a genuine URL in the address bar – what's often called a decoy page because it leads you out at the end of the scam with your innocence intact.
That’s what happened here – it’s not perhaps exactly the page you might expect, but it’s believable enough because it leaves you on a genuine Outlook-related web page with a genuine Microsoft URL:
Picture
What to do?
  • Always verify links in emails before you click them. You should check where you end up after clicking (see the next tip), but don’t click through casually and think, “I’ll wait to check further down the line to see if things look bad.” Check before you click as well. The earlier you spot a phishing scam, the less likely it is you’ll be sucked in and the earlier you’ll be able to report it.
  • Carefully check the URL of any login page. These days, most cybercriminals are using HTTPS websites, because everyone expects a padlock in the address bar. But the padlock doesn’t say you are on the correct site, merely that you are on a site with an HTTPS certificate. If you’re currently using your mobile phone, consider switching to your laptop if you can, and checking out the link from there. It’s worth the extra trouble because the address bar is easier to read and tells you more.
  • Avoid logging in at all via links you received in an email. If it’s a service you already know how to use – whether it’s your email, your banking site, your blog pages or a social media account – learn how to reach the login page directly, and how to access the account’s status pages after you’re in. If you always find your own way to your account login pages and ignore email login links even if you think they are genuine, you’ll never fall for fake links by mistake.
  • Turn on 2FA if you can. Two-factor authentication means that you need a one-time login code, usually texted to your phone or generated by a special app, that changes every time. 2FA doesn’t guarantee to keep the crooks out but it makes your password alone much less use to them.
  • Never turn off or change security settings because an email tells you to. Many phishing emails include instructions that claim to help you improve your security, but the changes they demand are there to make you less secure and help the crooks to get further. If in doubt, leave it out!
  • Change passwords at once if you think you just got phished. The sooner you change your current password after putting it into a site you subsequently suspect, the less time the crooks have to try it out. Similarly, if you get as far as a “pay page” where you enter payment card data and then realise it’s a scam, call your bank’s fraud reporting number at once. (Look on the back of your actual card so you get the right phone number.)
Thanks:
Paul Ducklin, Sophos.
0 Comments

How Can I Instill Good Internet Security Habits in My Kids?

8/19/2020

0 Comments

 
Picture
Gone are the days when the internet felt novel: AOL Instant messenger opened up a new way of communicating; Google searches yielded new info at mindblowingly quick speeds; a shared computer in a common space was the norm. We lived and learned through our amateur mistakes—getting hacked, fallings for phishing scams, using our first names and birthdays as passwords.

For younger generations who’ve grown up with technology and social media, the internet has always been ubiquitous. They carry it in their pockets, and use it to stay chronically connected to friends and to navigate everyday life and learning. Is security at the forefront of their minds, or is it something they take for granted? Essentially, are they doomed to repeat our mistakes?

Now that many schools are operating virtually, it’s the perfect time to evaluate your kids’ understanding and awareness of digital privacy, and brush up on your own knowledge so that you can be a good guide. Here are CompuBC's tips for encouraging good cybersecurity habits in kids.

Instill confidence, not fear
The internet can be murky, but we can’t expect kids to avoid it. Rather than talking about the internet like it’s the boogeyman, arm your kids with the knowledge they need to navigate safely:

Passwords
Just like you’d stress the importance of keeping an ATM Pin secure, remind them that login info and passwords are for their eyes only. Teach good password creation habits.

Downloads

Make sure they check with you before downloading apps (you can also set parental controls  on an iPhone or Apple Device to prevent downloads and purchases from the App Store). For Android, Google offers a Family Link app that allows you to pair your device with your kids’, manage their app downloads, and set limits on screen time.

Websites and WiFi
Teach them how to identify a secure WiFi network. The simplest rule: if you click on a network and it asks for either a WPA or WPA2 password, you know it’s secure. Both types of passwords are keys for accessing a secured Wifi network; the latter is a more recent version that uses AES (advanced encryption standard) encryption for maximum security. They’ll also want to make sure that websites start with “https” (the ‘s’ here means secure). Limit their access to specific web content using parental controls, which you can set up on their Apple and Android devices.

Preach Healthy Skepticism
A year-long Stanford study concluded that most school-age children have a hard time differentiating between articles and sponsored content, and possess a general lack of skepticism when it comes to what they read online. Advertisers and content creators are adept at getting users to click and explore ads, apps, games, and articles—just think how likely you are to let curiosity get the best of you when presented with targeted ads. It’s important to encourage kids to think critically about the information they’re presented with online, and to be critical thinkers when navigating the internet.

Teach kids about the permanence of shared info online
A good golden rule: if you can’t share it with your parents, it’s probably not something you want to put online. There’s certainly a tendency to overshare on social media, and the consequences can range from sheer regret to jeopardizing kids’ safety. Remind your kids that what they put online, even in private channels, stays online, and can be found if someone really wants to find it. Depending on their age, it’s a good idea to monitor their social media accounts, and tell them to keep their accounts private and avoid friending anyone they don’t know in real life. Schedule a check-in with them and scope out their requests and DMs to rid them of bots and scammers.

Don’t go it alone—use schools and other learning tools as resources
Many schools have their own policies when it comes to using personal devices at school. Talk to your child’s school to find out their rules, and to see if they teach students “digital literacy”—seeing media through a critical lens. Resources like Common Sense offer courses for empowering students in their digital lives, helping them become more adept at navigating the internet.

Practice what you preach
Familiarize yourself with good cybersecurity habits, from understanding the trail you leave online to quickly improving your online security. Be a resource should they come to you for advice. Set good examples when using your devices, such as not texting while you drive, and being mindful of your own screen time, as kids are likely to pick up on these habits. Likewise, underscore the importance of keeping track of your devices and making sure they are password-protected.
0 Comments

Always Change Your Passwords After a Breach

8/19/2020

0 Comments

 
Picture
Every week or so, news of yet another company’s data breach breaks. Often, the news stories will include a list of what data was or wasn’t compromised: emails, credit card numbers, addresses, etc. 

So, you might assume that if a news story doesn’t include “passwords” on the list of compromised data after a breach, there’s no rush to go reset yours.
But actually, resetting your password for any compromised account, regardless of whether that password was exposed, is exactly what you should do.

Why you should update your password for any compromised account

Even though 91% of people know that reusing passwords across accounts is bad, 59% of people still reuse their passwords—even between personal and work accounts.
There’s a chance the password you’re using on a compromised account is also being used elsewhere. And if someone already has your email address or other personal information from one breach, and then gets your reused password through another, they can put two and two together to hack your accounts.
It’s also possible that the breadth or depth of a breach may not be apparent or reported until months later, so passwords may indeed have been involved. Why take the risk?

The bottom line: No matter the extent of a company’s data breach, you should go change that password ASAP.

Here are a few more tips for creating strong passwords, and other smart password practices
  1. Store passwords securely. Use a good and encrypted password manager APP, you probably know this, but never keep a list of passwords in plain text, like in a Word doc or Google doc. This applies to physical lists, too, especially in public places like an office. Keeping your passwords--in a password manager APP means they’re protected by the strongest encryption, and everything is accessible to only you.
  2. Make them unique and strong. The strongest passwords are strings of random characters because they’re the hardest to crack with simple brute force or dictionary attacks. That’s why a Password Generator creates passwords that looks like a cat walked on your keyboard.
  3. Turn on 2FA. For your most important accounts, like banking and email, use two-factor authentication (2FA). 2FA adds an additional layer of protection by requiring a second verification that you are who you say you are when you log in—usually via a code sent to your phone or email or better yet a prompt on your phone or a 2FA APP. When 2FA is enabled, even if someone gets ahold of your password, they still won’t be able to access your account unless they also have one of your devices. Check out Duo or Google Authenticator for 2FA options.

The tips above might seem like a lot if you try to do them all at once. Instead, pick at least one per week to implement in your digital life, and you’ll be more secure online right away!
0 Comments

Effective defenses against malware and other threats (with a Mac perspective)

8/14/2020

0 Comments

 
Picture
Questions regarding the use of "anti-virus" or similarly categorized "Internet security" products frequently arise on this site. Many of them are from new Mac users whose previous computer experience was limited to traditionally virus-prone Windows PCs. Early Microsoft Windows versions were notoriously vulnerable to unauthorized modifications and malicious interference, which gave rise to a cottage industry of "anti-virus" software companies responding to a need for the operating system security Microsoft neglected to provide.


Apple and Microsoft's respective operating systems were originally conceived and developed completely separately, for use with completely different hardware, and their evolution has only diverged since their inception. In recent years Microsoft has made great strides in protecting its Windows operating system, but owing to macOS's original concept as a multi-user, multitasking operating system incorporating a fundamental requirement to keep users separate from one another, it was never as vulnerable to begin with. With each new release, macOS has only grown more secure from unauthorized tampering.


It's important to understand the nature of threats that exist today, and to appreciate the fact that "anti-virus" software peddlers have been reduced to abject panic as their traditional Windows PC market suffers its inevitable decline. The cottage industry described in the first paragraph has since grown to a multi-billion dollar behemoth with entrenched interests—an enormous beast that demands to be fed. The PC market's demise has led to a predictable response from them and shills who represent their interests, asserting that since Macs are rapidly growing in popularity, they have become just as vulnerable to "viruses" as PCs, implying an even greater need for the products they sell. It just isn't so.


What is true is that the growing base of Mac users are being increasingly targeted and exploited for scams that seek to defraud them of their hard-earned money. Criminals who seek to do that cannot succeed without your help. Don't give them the satisfaction.


The following describes simple principles that will serve to protect your Mac, and yourself, from the various threats that exist today. It's long, but if you read nothing else, read the first three numbered points and the Summary at the end. They are equally applicable to Macs, PCs, mobile devices or anything else that uses software to communicate with the world beyond it.

There will always be threats to your information security associated with using any Internet - connected communications tool:

  1. You can mitigate those threats by following commonsense practices
  2. Delegating that responsibility to software is an ineffective defense
  3. Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.

macOS already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.

Rather than asking which non-Apple "anti-virus" or "Internet security" product is best, a much better question is "how should I protect my Mac":


  • Never install any product that claims to "clean up", "speed up", "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.
    • Such products are very aggressively marketed. They are all scams.
    • They generally operate on the flawed premise that a Mac accumulates "junk" that needs to be routinely "cleaned out" for optimum performance.
    • Trial versions of those programs are successful because they provide the instant gratification of greater free disk space.
    • That increased space is the result of irreversible destruction of files, programs, or operating system components normally protected from inadvertent alteration or deletion. The eventual result will be unreliable operation, poor performance and random crashes that may not become evident for months or even years after their use, when updates to programs or macOS are eventually released.
    • Memory "cleaners" that circumvent macOS's memory management algorithms work by purging inactive memory contents to mass storage, which can only result in degraded performance and accelerated hardware failure.
  • Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    • Illegally obtained software is almost certain to contain malware.
    • "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Software dot com, Soft Pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements.
    • If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    • macOS helps prevent you from inadvertently installing software that may be malicious or untrustworthy. If macOS warns you about that, pay attention. It's important.
  • Don't supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required:
    • Your Apple ID and its password are the keys to your digital kingdom. Safeguard both of them just as you would your wallet or purse.
  • Don't open email attachments from email addresses that you do not recognize, or click links contained in an email:
    • Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    • Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    • Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple threatening to close your account unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    • A variant of the same scam takes the form of an emailed receipt for an iTunes Store or App Store purchase you did not make. The email will contain a link soliciting your Apple ID to confirm the alleged purchase. Both the link and the receipt are fraudulent.
  • Don't install browser extensions unless you understand their purpose:
    • Go to the Safari menu > Preferences... > Extensions. If you see any Extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    • No Safari Extensions are required for normal operation.
  • Don't install any Profiles unless your Mac is owned or controlled by your employer, school, or similar institution:
    • Profiles are commonly installed by institutions to ensure their Macs conform to their requirements.
    • To determine if a Profile is installed on your Mac, open  (Apple menu) > System Preferences... > General.
    • If you see Profile pane and you have no explanation for its presence, you may have been deceived into installing it. Remove it by selecting it and clicking the [—] (minus) button.
  • Don't install Java or Flash unless you are certain that you need it:
    • Java, a non-Apple product, remains a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    • Java can be disabled in System Preferences.
    • Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It's OK to leave it enabled.
    • The same precaution applies to Adobe Flash Player. Newly discovered Flash vulnerabilities occur almost weekly.
    • Flash Player's demise is as imminent as it is deserved. You can help accelerate that inevitable fate by not using it.
  • Don't rely upon Internet search engines to obtain technical support assistance:
    • Scam artists pay popular Internet search companies in exchange for greater prominence in search results, so their websites and contact information are given precedence over the legitimate companies they fraudulently claim to represent.
    • The overwhelming majority of web search results seeking instructions to remove unwanted software (for example) are just advertisements for even more unwanted software. Their "instructions" are designed to be difficult to follow, won't work, will make things worse, or all the above.
    • If you require technical support, determine the company's legitimate contact information from their own website or product literature, and initiate contact with them directly.
    • Support for all Apple products is obtained by using the Contact Support link at the top of this web page.
    • If you receive an unsolicited phone call from someone attempting to convince you a problem exists with your Mac, PC, or mobile device, it's a scam. Hang up.
    • Legitimate organizations such as Apple and Microsoft do not initiate contact in that manner.
  • Beware spontaneously appearing, unsolicited popups demanding immediate action. Think before you click.
    • Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    • Ad-blocking Safari Extensions can help, but none are completely effective, and all of them can cause unexpected behavior.
    • If you encounter a website, text message, email, or phone call alleging your Mac is infested with some ick or that you need to take immediate action lest dire circumstances ensue, it is 100% fraudulent. Ignore it. Read Avoid phishing emails, fake 'virus' alerts, phony support calls, and other scams.
    • If you find Safari has frozen or "locked up", leaving you unable to dismiss the page, read Phony "tech support" / "ransomware" popups and web pages for the solution.
    • Any spontaneously appearing dialog insisting that you upgrade your video player right this instant should be summarily ignored. Such popups are commonly associated with sites that promise to deliver "free" movies, music, or other copyrighted content that is not normally "free", but no website that hosts interest-based targeted advertising is completely immune from that threat.
  • Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    • The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    • macOS viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    • Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don't want it any more.
    • If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    • Most such utilities will only burden your Mac while they look for viruses that do not exist. They will degrade its performance and prevent it from working properly while conveying no benefit whatsoever—other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
  • Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.


Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.
0 Comments

    Archives

    January 2023
    December 2022
    November 2022
    September 2022
    August 2022
    June 2022
    October 2021
    August 2021
    July 2021
    May 2021
    April 2021
    March 2021
    January 2021
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    May 2020
    March 2020
    November 2019
    August 2019
    July 2019
    June 2019
    May 2019
    March 2019
    November 2018
    July 2018
    June 2018
    May 2018
    April 2018
    February 2018
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017

Picture
Avner Coopman
Owner
2951 Britannia cres
Port Coquitlam BC, V3B 4V5

Phone 778-776-6222

Hours of operation
Mon - Fri 9:00 AM - 7 PM
Sat 11:00 AM - 5:00 PM
Sunday & Holydays - Closed
​
Your privacy is important to us you deserve our full attention
Please schedule an appointment
© Copyright CompuBC, All Rights Reserved.
Business Number 778569517BC0001
Click for the BBB Business Review of this Computer Business Services in Port Coquitlam BC
Picture
Some icons made by Freepik, xnimrodx, Smashicons, itim2101, photo3idea_studio, and prettycons from Flat Icons.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews