Ransomware Stopper

The LME Ransomware Stopper That Is So Simple Anyone Can Use It

 

What Does It Do:

  • Our system monitors and computer or server for suspicious file activity based on whatever parameters you like.  You can tell our system that 30 files edits in 5 minutes is suspicious or that 100 File Opens in 1 hour is suspicious and our system kicks in.  It can send email alerts, lock user accounts, log people off their computer and more…

How Does It Work:

  • We have combines file monitoring with AD integration which allows our system to monitor any Windows computer and stop any Windows user account dead in their tracks

Why Has No One Else Done This:

  • That’s a great question, it really is simple.  We monitor your data, alert you based of your parameters and then kick on whatever protocols you want and whatever time you want.

 

Mention this Post and Get Setup Fee WAIVED!

 

 

 

How to Lock down Folder and File Creation on a Root Folder

Want to know how to lock down folder and file creation on a root folder? No?  Well then why the hell are you here? Oh…. You said no doubt… Well good, cause like you, I have a large collection of clients that like to dump their crap in my carefully maintained server folder structure I’d … Read more

How to Run Add Remove Programs in Safe Mode

This is how to add or remove programs in safe mode To be able to run add remove programs in safe mode you need to: Copy these commands into the text file [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\ProtexisLicensing] @=”Service” [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\PSI_SVC_2] @=”Service” [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\PSI_SVC_2_x64] @=”Service” [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer] @=”Service”   If you found this helpful please pop a Facebook Like at the top of … Read more

Create a Web URL Desktop Shortcut That Opens in Internet Explorer IE

I needed to Create a Web URL Desktop Shortcut that Opens in Internet Explorer IE via Group Policy because a client has an internal Web Application that only works within IE. Outside of the apparently non-obvious disadvantages of using a shitty browser for all web browsing, I’ve found that GPO’s that dictate your default browser … Read more

How to Setup Remote Access to Your Office for FREE

 Here is how to setup Free Remote Access to your Office computer There are oodles of ways to remote access to your Office network for FREE, you can use a remote connection program like RDP or GoToAssist or you can create a VPN tunnel to your Server, Router/Firewall using programs like Teamviewer. Not sure if … Read more

Hyper-v Guest OS Network Adapter Not Working Fix

Here is how to fix when a Hyper-V Guest OS Network Adapter is not working We implement a lot of Hyper-V servers because Hyper-V is free, simple, and easy (well, easy enough at least) We have had a couple of scenarios where a 2012 Guest OS suddenly stopped having network connectivity after a reboot its often … Read more

hidden internet browsing

The Web Browser That Will Hide You from EVERYONE

Tor is a free web browser created by the US Naval Research laboratory with goal of creating anonymous web communication. Basically, they wanted to create a Web Browser that will hide you from EVERYONE The Tor browser directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays.  These relays bounce your … Read more

How to Setup Scan to SMB Desktop on a Mac

Here are the steps to setup scanning on your Mac computer  If you need a top managed IT services company to help setup scanning on your Apple computer then give LME a call How to Fix SMB Scanning on a Mac Computer You can either use the touchscreen of your printer / scanner or you can login … Read more

importance of encryption

This Is Why Encryption Is so Important

  Let’s face it, computers, phones, and tablets are hackable.  Microsoft, Apple, and Google all have Zero Days (fatal security flaws) that talented hackers and state-sponsored organizations can use to get anything they want off of your devices. The only real protection we have is Device Encryption. Encryption is our only way of ensuring that … Read more

AWARD-WINNING CYBERSECURITY AND I.T. SERVICES

Managed IT Services
System Audits/Assessments
Design & Installation
Software Implementation
Custom Software Development
Remote Monitoring
24/7 Maintenance & Support
Cybersecurity Services
ISO Consulting
SOC Consulting
HIPAA Consulting
Systems Monitoring
Policy Development
Fraud Prevention
Data Protection
Contact
Headquarters
Hoffman Estates, Illinois
847-496-5196
Schedule a Consultation