Posts by ewallace:

Scheduled Maintenance: Network Upgrades will impact BizLINK Mail

Comments Off Written on November 10th, 2010 by
Categories: Scheduled Maintenance

Details: We will be performing scheduled maintenance on our servers that will temporarily impact mail delivery for our BizLINK Mail clients.

Scheduled start date and time: 11/13/2010 02:00 AM ET

Scheduled end date and time: 11/13/2010 04:00 AM ET

System(s) Affected: All Services

Expected Impact: You will experience brief service interruptions during the maintenance window. All incoming messages will be queued until the maintenance is complete.

Action required: none

Should you have any questions about this maintenance window, please email us at

Email Worm Making Headlines

Comments Off Written on September 13th, 2010 by
Categories: Blog, Security
Tags: , ,

Excerpted from Watchguard LiveSecurity Bulletin:

“Here you have” Email contains fake and malicious PDF or WMV links

Severity: Medium

10 September, 2010

Virus/Worm Summary:

  • Subject lines to avoid: include “Here you have,” or “Just for you,” and “This is the Free Dowload (sic) Sex Movies, you can find it Here”
  • Malicious email attachment: contains supposed links to PDF or WMV files, which actually link to malicious .SCR files
  • Impact: Spreads via your email contacts and through network shares. Infects your computer with various malware, and potentially steals information
  • What to do: Make sure you are using updated antivirus software, and block .SCR files at your gateway (see below for details)

About the Virus:

Late yesterday, various antivirus (AV) vendors began receiving reports of a new mass-mailing email worm, generally called VBMania, which arrives with various subjects including, “Here you have.” Today, others in the press have jumped on the bandwagon and published many shrill reports [ 1 / 2 / 3 ] that describe this worm as an outbreak and suggest it has flooded inboxes worldwide. While we don’t doubt that attackers have aggressively seeded this malicious email using spamming techniques (and likely a botnet), we haven’t yet seen the worm in our own inbox. There are reports of it affecting some well known companies. However, it doesn’t seem to be as wide-spread as the big worms of the past (Nimba, etc). In fact, most antivirus (AV) companies still only rate this worm as only a medium risk. While you should make yourself, and your users, aware of this new worm, it doesn’t offer reason for panic.

What you can do

  • As always, remind your users never to open unexpected attachments or click on unexpected web links from any source. Inform them that most modern viruses falsify the “From” field and can appear to come from friends, co-workers, or other trusted parties.
  • Most major antivirus vendors already have signatures that detect this worm. Check with your vendor for the latest update. 

 - This alert was researched and written by Corey Nachreiner, CISSP

Additional Resources

If you currently do not have a robust security solution, you can learn more about STG’s network security solutions, including managed virus protection here:

Flagler County Disaster Recovery Seminar

Comments Off Written on September 13th, 2010 by
Categories: Events

Join us for an important discussion on Disaster Recovery and Business Continuity at the Palm Coast Community Center on September 16th, 3:00 pm – 5:00 pm.

This event is sponsored by the City of Palm Coast and will cover topics specific to businesses such as evacuation routes, insurance, disaster preparedness and our own TJ Rosenthal, Director of Technical Services, will be discussing Technology Concerns When Creating a Disaster Recovery Plan.

Event Location: 305 Palm Coast Pkwy, NE. Palm Coast, FL 32137

Time: 3:00 pm – 5:00 pm, Thursday, Sept. 16th

BizLINK Clients – Schedule Maintenance Notification – Sept 11, 2010

Comments Off Written on September 9th, 2010 by
Categories: Scheduled Maintenance

We will be performing network hardware upgrades that will cause intermittent connectivity to your email server for a few seconds at a time periodically during the maintenance window. Incoming messages will be queued until the maintenance is complete.  No emails will be lost during this maintenance. The planned maintenance window is:

Saturday, Sept 11, 2010, 2:00 am – 3:00 am EST

We apologize for this inconvenience and thank you in advance for your cooperation.  Should you have any questions or concerns regarding this, please email

September 7, 2010 Scheduled Maintenance – Complete

Comments Off Written on September 7th, 2010 by
Categories: Scheduled Maintenance

Maintenance was completed. 9/8/2010 TJR

Southern Technology Group will be performing maintenance on our servers on the evening of September 7, 2010, 9:00 pm – 11:00 pm.  Access to Citrix will not be available during our maintenance window.  There may also be periodic lapses in connection to the mail server.  No emails will be lost during this maintenance window and you should not notice any significant disruption in access to your information via your mobile smart phones.  Should you have any questions regarding this scheduled maintenance, please email

Thank you for your cooperation and understanding.

New Website Launched

Comments Off Written on August 2nd, 2010 by
Categories: News

Southern Technology Group is pleased to announce the launch of it’s newly redesigned website! The new website features a fresh web 2.0 look and feel with a more user friendly navigation, updated information about our products and services, and links to subscribe to our newsletter and join our social networks so you can stay in touch with us.

Is your wireless network secure?

Comments Off Written on July 23rd, 2010 by
Categories: Blog, Networking, Security
Tags: , ,

Google’s Street View is back in the news. Back in May Google admitted that the technology it used to take images with its Street View cars may have inadvertently gathered private information from unsecured Wireless Networking (Wi-Fi) networks. An articlefrom PCWORLD stated that the nonprofit Consumer Watchdog claims to have “retraced some of the routes taken by Google’s Street View cars, and found that four residences of U.S. Congress members it checked had vulnerable networks, according to a BBC report. One of them was Congressman Henry Waxman, chairman of the Energy and Commerce Committee, which has jurisdiction over Internet issues.”

Read the rest of this entry »

Microsoft offers online backup for your phone

Comments Off Written on June 11th, 2009 by
Categories: Blog
Tags: ,

I’ve read that an estimated 12 million mobile devices are lost or stolen every year in the US. What would happen if you lost your mobile device? Would you just shrug your shoulders and be OK because you were wanting to get a new phone anyway? Or would you freak out because you now don’t know how to get in touch with anyone and don’t know where you have to be and don’t know how to get there? And those great pictures you took of your family that you had been meaning to download are now lost forever. Well, if you have a Windows Mobile Device, Microsoft has come to the rescue with a free online backup solution for your smart phone.

Read the rest of this entry »

Beware of Spoofing

Comments Off Written on April 14th, 2009 by
Categories: Blog, Security
Tags: ,

ABC News had a story about Caller ID spoofing on last night’s broadcast. It highlighted the technology that allows people to pay for a service that will enable the caller to choose the name and phone number the caller id will display – as well as alter the sound of the caller’s voice. The technology that allows for this to work is not new.Back in 2006 the House and Senate had hearings on the phenomenon but did not pass any legislation against the practice. According to ABC News, Florida is the only state in the US that has a law against Caller ID spoofing.

Read the rest of this entry »

E-mail Etiquette Tips

Comments Off Written on April 10th, 2009 by
Categories: Blog
Tags: ,

I write and receive dozens of emails a day. Emailing has become the preferred means of communication for many individuals and businesses. Since this method of communication is so prevalent in our lives, why not make the experience a bit more pleasant and follow a few email etiquette rules.These “rules” are not set in stone and you will not be whipped with a wet piece of spaghetti if you break them, but the recipient of your emails will really appreciate your efforts to stick to them.
1. Read and proof your email before you hit ‘send’. You will catch a lot of type-o’s and may often find mistakes that your spell checker did not catch (i.e. ‘there’ vs. ‘their’)
2. Use punctuation. Though email is less professional than a business letter – it is more professional than a text message. Please remember to use commas, apostrophes and periods. Not doing so may distort your meaning and makes it more difficult for the recipient to read.
3. TYPING IN ALL CAPS LOOKS LIKE YOU ARE SHOUTING TO THE READER. Though it may be more convenient not to have to hit that Shift key at the beginning of a sentence, make the extra effort to only use capital letters when appropriate: formal names, states, countries… and many mail programs will automatically capitalize the 1st letter of a sentence for you (even on smart phones).
4. Be careful when you are trying to convey sarcasm or irony in your email. It’s difficult to pull off sarcasm without the context of facial expressions and the tone of your voice. You don’t want your email to offend or spark some conflict because you meant to be ironic and the reader thought you were being serious.