• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Boost IT

Boost IT

IT Management, Cybersecurity, & Cloud

  • SERVICES
    • IT MANAGEMENT >
      • Take an IT Self-Assessment
      • IT Assessment
      • 24/7 Help Desk Support
      • Remote Workforce
      • Software Updates
      • Remote Server Monitoring
      • Reporting & Documentation
      • Wi-Fi
    • CYBERSECURITY >
      • Take a Cybersecurity Self-Assessment
      • Cybersecurity Assessment
      • Endpoint Detection & Response
      • Multi-Factor Authentication (MFA / 2FA)
      • Security Operations Center (SOC) Support
      • HeatShield Perimeter Firewall
    • IT CONSULTING >
      • vCIO – Virtual CIO
    • CLOUD >
      • Data Backup & Disaster Recovery
      • Microsoft Office 365 & E-mail
      • Cloud File-Sharing Platform
      • Business Phone System
    • Frequently Asked Questions
  • OUR CLIENTS
    • Engineering
    • Financial Services
    • Healthcare
    • Real Estate Development
    • Testimonials
    • Transition to Boost IT
  • OUR TEAM
    • One IT Question
    • Our Proven Process
    • Our Partners
  • BLOG
  • CONTACT
    • Book a Meeting
    • Client Portal
    • Remote Support
You are here: Home / Cyber Security / How Our Endpoint Protection Software Saved Payroll

How Our Endpoint Protection Software Saved Payroll

July 28, 2015 by Boost IT

How Our Endpoint Protection Software Saved Payroll

Below is an e-mail we just sent to one of our clients.
The person we sent this e-mail to uses a computer that contains sensitive financial and personal data and is used for payroll.  We are all very thankful for the endpoint protection software.

Suzanne,

Just wanted to keep you updated on our work and remind you that much of our security & protection work is done automatically without you even knowing about it.

Our endpoint protection software suite found a potentially unwanted program on your computer during a scan today. It was called ConsumerInput and was deleted automatically. Details of the program are at http://malwarefixes.com/threats/pup-optional-consumer-input/
In Feb 2013, the Federal Trade Commission approved a final order against the company that created the software, Compete Inc., for not protecting the data they collect. https://www.ftc.gov/news-events/press-releases/2013/02/ftc-approves-final-order-settling-charges-against-compete-inc.

If you’ve updated or installed any software in the past couple days just be careful when installing it. If you were unaware that anything got installed I’m not surprised. Malware is getting sneakier.
Here’s an article on How to Prevent Malware BEFORE the Infection that shows you what to look for to prevent malware. It may help your family at home too.
https://www.boostitco.com/blog/how-to-recognize-malware-before-the-infection/

Our endpoint protection software suite is just one of the benefits of using a managed IT company instead of an IT guy/girl or an in-house part-time IT person where IT is not their primary job function.

In this case, our monitoring software alerted us about the issue and cleaned the computer automatically. Many other IT firms, even some of the big name IT firms, or IT pros don’t monitor your network at this level and even fewer automatically clean the computers.

Interested in this kind of protection for your business?

Contact Us

Filed Under: Cyber Security, IT Management

Connect With Us

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube

Primary Sidebar

Have questions about cybersecurity?

We've successfully protected Healthcare, Legal, Financial Services, Engineering, Manufacturing, Non-Profit & Real Estate Development organizations for over 20 years.

Click below to see the questions on your next cyberinsurance application!

See the cyberinsurance application

Footer

Next Steps

Start with the SERVICES menu above.

Take an IT Self-Assessment.

Take a Cybersecurity Self-Assessment.

Read Case Studies about how we’ve helped our clients transform their organizations.

View Testimonials from current clients.

Featured Posts

How To Choose a New Laptop

How To Create a Shared Calendar in Outlook & Microsoft 365

17 New Cyber Liability Insurance Questions Your Provider Will Ask

Atlanta Real Estate Firm Gets Ransomware

Why Hackers Target Small Businesses

Cloud File Sync and Share Provides Speed and Efficiency

Office Location

© 2000–2023 · Boost IT, LLC · Coverage Area

  • SERVICES
  • OUR CLIENTS
  • OUR TEAM
  • BLOG
  • CONTACT