2

Please stop following every link through that you see in email, Facebook, Twitter, etc…

Being in the computer service business, every day we are seeing more and more computers that have been compromised, whether they are Microsoft Windows, Apple Mac OS X, Linux, it doesn’t matter. Even iPhones and Androids are falling victim to various malware found as a result of blindly following links.

What can you do to help protect yourself, your computer and your private data? Use a little common sense and don’t just randomly click on every link you see.

Sometimes, a link can come to you through email, a Facebook message, or a wall post on Facebook, and it will appear to be from your best friend, or a trusted co-worker, but it was really sent from a malicious source.

Here’s an example of a link posted on Facebook recently:

 

Typical social engineering attempt to lure you to a bad site...

This is a typical “social engineering” attempt to get you to visit a malicious site.

It works like this: The mark will see the link on their best friend’s wall and because it looks appealing and came from Bob, it has to be good, so they click on it.  The link loads a site that LOOKS like YouTube or some other video site. When they try to play the video, what happens next is sheer genius. They are told that a codec or other piece of software needs to be updated. Of course, they have gone this far, so they will almost always agree to install the software.

And THAT is where the magic takes place. Even if you are running anti-virus, many times, this malicious software is allowed to install because the A/V sees it as a “user initiated action” and simply gets out of the way and lets you perform the install. After all, you know what you are doing, right?

Now there is malicious software running which may do many things, from disabling the anti-virus, to loading key loggers that send every key typed on that computer to some site in Tracrapistan, or full access to the machine may be granted to a remote user, allowing them to use the exploited machine to send spam, distribute more bad software etc.  Whatever takes place is surely not good. They are not defragging the hard drive and doing your taxes.

Then there’s email “Phishing”…  Here’s what that looks like…   Can you spot what is wrong?

 

There are a number of things wrong with the above email example… Most banks do not send you email warnings that you have been locked out of your account, and in my case, I don’t even have a Chase bank account…. But those are not the one tell-tale sign that will prove beyond a shadow of a doubt it is a phishing message or an attempt to coax you to a malicious website…

To see that, you need only hover over the link itself:

 

 

When you place your mouse over the link, without even clicking on it, your email client will generally display the actual link.  This one points to http://ciamedia.be…. not even close to a Chase server.  The perpetrator of this attempted phishing attempt didn’t even try. Sometimes they will register a domain that LOOKS like the source, such as http://www.chasesecuresite.com.

Again, if you are using current mainstream anti-virus software, such as Trend Micro Worry-Free Business Security or Trend Micro Titanium, every URL that you visit will be checked before allowing you to continue… Attempting to visit a malicious site will result in a dire warning displayed in your browser….

Above is the warning you will see in your browser upon visiting a fraudulent site if you are using Trend Micro Worry-Free Business Security …

Then you will also see this warning pop up from your task bar:

 

Obviously, relying solely on your anti-virus software is not the wisest thing in the world…   Safely browsing the web requires some common sense.

BUT, reliable and up to date anti-virus gives you an advantage that your unprotected brethren do not have. Especially for you Apple Mac OS X owners.

If you are looking for quality anti-virus, anti-malware, anti-spam software for your business or personal computer, we highly recommend Trend Micro… We are a Trend Micro partner and would love the opportunity to offer their fantastic products to you, whether you need only one install for yourself, or 1000 seats for your company.  We not only sell it, but we support it, along with full computer, server & network service / repair in Greenville & Upstate SC!

Please email info@homelandsecureit.com or call 864.990.4748 for more information.

1

Cisco IOS patch delayed until September

Cisco IOS update delayed until September due to earthquake and tsunami in JapanCisco announced an update to their IOS operating system that was scheduled for March 23rd, unfortunately, due to the earthquake and tsunami in Japan, Cisco has stated that we will all have to wait until the next scheduled disclosure destined to take place in September.

Cisco revealed over 10 vulnerabilities since the last update back in September of 2010 that were to be addressed.

You can find the statement direct from Cisco here: Cisco Security Advisories and Notices

 

If your Cisco security appliances and firewalls are not up to date, you may find yourself vulnerable to various exploits. Homeland Secure IT can help if your business is in Greenville or the Upstate of SC. Please call 864.990.4748 or email info@homelandsecureit.com for further information. We are a Cisco Small Business Partner.

Hard drive data recovery demonstration with special appearance by Shred Disk @ShredDisk

When you buy a new computer, what do you do with the old one?  Donate it to charity? Give it to a friend? Leave it with the computer vendor who sold you the new computer? Sell it on Craigslist?

The real question here is, what happens to the data on the hard drive in your old system? Do you take the drive out and dispose of it? Do you format it and reinstall the operating system? Do you physically destroy the drive? Do you possibly use a “Secure Wipe” on the drive?

Did you know many people don’t give it a second thought? They hand their system over, with their data intact! Expecting the person on the other end to do the right thing.

I was recently talking with my good friend Brent over at Shred Disk and a group of other Greenville business owners about this topic, and we decided it would be interesting to find out for ourselves what becomes of data in old systems, consider it a science experiment if you will.

Brent went to an Upstate computer dealer and asked to purchase the smallest drive that they had. He was given a “repurposed” hard drive at a reasonable cost. An older Seagate 40gb IDE drive, which he dropped by the Homeland Secure IT office for us to examine.

We took the drive and connected it to our system, found it had been formatted, or possibly “wiped” and then set out to see if we could recover anything.  Here’s a video of what we found:

As you can see, even I was surprised at the results!

The bottom line here is… PROTECT YOURSELF from this!  A format is not the answer, a “secure wipe”, may NOT be as secure as you think.

The ONLY 100% reliable way to protect your data is the destroy the hard drive. Shred Disk is a company that can assist you with that! Whether you have one or one thousand hard drives, they can come to you, remove the drives and shred the drive into tiny pieces and provide you with a certificate of destruction that will free you from liability! Shred Disk even has a ship it in program that I hear is about to start, where you can pay online, an envelope will be sent to you and you can send the drive the drive to Shred Disk, they will document the opening of that envelope on video along with the shredding of the unit. You can even opt to have the crushed remains sent back to you with a certificate of destruction.

You may think you can destroy a drive by yourself, using a hammer or even a shotgun, however, we advise against these alternatives due to the potential for shrapnel. Use a professional. Contact Shred Disk Onsite Hard Drive Shredding. They also shred other media too, such as tapes and entire electronic devices!

All hard computer hard drives left at Homeland Secure IT will be eventually DESTROYED by Shred Disk, so if you upgrade a computer through us, your drive and your data will NEVER leave our doors. We do *not* sell used hard drives for any purpose.

 

 

Secure IT Alert: Adobe offers Zero Day Flash exploit patch for Apple Mac OS X, MS Windows, Google Chrome & Android

Secure IT Alert Header

Homeland Secure IT Alert

Homeland Secure IT Alert for Wednesday, March 23, 2011

Adobe has released out-of-cycle updates earlier this week that affect Flash Player, Reader and Acrobat across many platforms such as Apple Mac OS X, Microsoft Windows, Android and Chrome… Here is the summary from the WatchGuard Security Center:

Severity: High

21 March, 2011

Summary:

  • These vulnerabilities affects: Recent versions of Adobe Reader, Acrobat,  and Flash Player
  • How an attacker exploits it: In various ways, but most commonly by enticing your users into visiting a website containing malicious Flash or Reader content
  • Impact: In the worst case, an attacker can execute code on your computer, potentially gaining control of it
  • What to do: If you use these popular Adobe products, you should download and install their various updates as soon as possible.

Exposure:

Typically, Adobe’s quarterly Patch Day falls on the same Tuesday as Microsoft Patch Day (the second Tuesday of the month). However, a recent zero day Flash exploit circulating in the wild has encouraged Adobe to release a few out-of-cycle patches early. Today, Adobe released two security bulletins that fix a  zero day Flash vulnerability in Reader, Acrobat, and Flash Player, running on all platforms (including Android).

Though the two bulletins affect different software, they both fix the same core Flash related vulnerability that we described in our earlier WatchGuard Security Center post. As usual, Adobe doesn’t describe this zero day flaw in any technical detail. However, they do mention that the flaw lies within the authplay.dll component, which all three vulnerable products use. By enticing one of your users to visit a web site or download a PDF file containing malicious flash content, an attacker could leverage this flaw to execute code with that users privileges. If your users have administrative or root privileges on the victim platform, the attacker would gain complete control.

As was the case during our first post, attackers have been exploiting this flaw in the wild (even before Adobe knew it existed). If you use the affected software (as most users do), we highly recommend you install Adobe’s updates immediately.

For more details about these update, see Adobe’s bulletins below:

  • APSB11-05: March 2011 Flash Player Update
  • APSB11-06 : March 2011 Reader and Acrobat Update

Solution Path:

Adobe has released Reader, Acrobat, and Flash Player updates to fix this flaw. If you use any of the software below, we recommend you download and deploy the corresponding updates as soon as possible, or let Adobe’s automatic updater do it for you. Note: Adobe has not yet released a Reader X update for this vulnerability, since Reader X’s default sand-boxing technology should protect you from this flaw by default.That said, we do expect a Reader X update at a later date.

For All WatchGuard Users:

Some of WatchGuard’s Firebox models allow you to prevent your users from downloading certain types of files via the web (HTTP) or email (SMTP, POP3). If you like, you can temporarily mitigate the risk of some of these vulnerabilities by blocking various Adobe-related files using your Firebox’s proxy services. Such files include, .PDF, .SWF, .DIR, .DCR, and .FLV. That said, many websites rely on these files to display interactive content. Blocking them could prevent some sites from working properly. Furthermore, many businesses rely on PDF files to share documents. Blocking them would affect legitimate files as well. For that reason, we recommend the updates above instead.

Nonetheless, if you choose to block some Adobe files, follow the links below for video instructions on using your Firebox proxy’s content blocking features to block files by their file extensions:

Status:

Adobe has released updates to fix these vulnerabilities.

References:

This alert was researched and written by Corey Nachreiner, CISSP. (@SecAdept)

If you require assistance with these or any other computer service related issues in Greenville or Upstate SC, please call 864.990.4748 or email info@homelandsecureit.com – We are WatchGuard partners and offer sales and support of their fine line of security appliances to help protect your network!

Homeland Secure IT Alert Footer

Homeland Secure IT Alert

 

 

 

 

Secure IT Alert: Apple Mac OS X Update Patches 57 Vulnerabilities #mac #osx #security

Secure IT Alert Header

Homeland Secure IT Alert

Homeland Secure IT Alert for Tuesday, March 22, 2011

Apple Mac OS X owners will be happy to know that they have not been forgotten and that 57 vulnerabilities that affect all current versions of OS X 10.5.x (Leopard) and OS X 10.6.x (Snow Leopard) are addressed in this major security update.

A total of 26 components that ship as a part of OS X and OS X Server, including five for Quicktime, ClamAV and Apache are affected.  In short, there exists many code execution vulnerabilities, Denial of Service (DoS) & cross-site scripting flaws, as well as information disclosure issues which this update will help protect you from. Suggested action – install all necessary updates as soon as possible, keep current anti-virus on your computer and avoid opening links and documents sent in email that you are not expecting.

Here’s the post from the WatchGuard site:

WATCHGUARD SECURITY ANNOUNCEMENT:

Summary:

  • These vulnerabilities affect: All current versions of OS X 10.5.x (Leopard) and OS X 10.6.x (Snow Leopard)
  • How an attacker exploits them: Multiple vectors of attack, including enticing your users to visit a malicious web site, or into downloading and viewing various documents or images
  • Impact: Various results; in the worst case, an attacker executes code on your user’s computer
  • What to do: OS X administrators should download, test and install OS X 10.6.7 or Security Update 2011-001 as soon as possible, or let Apple’s Software updater do it for you.

Exposure:

Today, Apple released a security update to fix vulnerabilities in all current versions of OS X. The update fixes around 57 (number based on CVE-IDs) security issues in 26 components that ship as part of OS X or OS X Server, including Apache, Quicktime, and ClamAV. Some of the fixed vulnerabilities include:

  • Multiple ImageIO Buffer Overflow Vulnerability. ImageIO is one of the components that helps OS X handle various image file types. Unfortunately, it also suffers from various security vulnerabilities involving the way it handles certain types of image files (such as a buffer overflow vulnerabilities). Though these vulnerabilities differ technically, they generally share the same scope and impact. If an attacker can get a victim to view a specially crafted image file (perhaps hosted on a malicious website), he could exploit any of these flaws to either crash an application or to execute attack code on the victim’s computer. By default, the attacker would only execute code with that user’s privileges. The affected image types include JEPG, TIFF, and XBM.
  • Many ATS Vulnerabilities. The Apple Type Service (ATS) helps OS X machines handle fonts. ATS suffers from various memory related vulnerabilities having to do with the way it handles certain types of embedded fonts. By tricking one of your users into downloading and viewing a malicious document containing a specially crafted font, an attacker can exploit this flaw to execute code on that user’s computer. By default, the attacker would only execute code with that user’s privileges.
  • Five Quicktime Vulnerabilities. Quicktime is the popular video and media player that ships with OS X (and iTunes). Quicktime suffers from five security issues (number based on CVE-IDs) involving how it handles certain image and video files. While the vulnerabilities differ technically, they share the same basic scope and impact. If an attacker can trick one of your users into viewing a maliciously crafted image or video in QuickTime, he could exploit any of these flaws to execute code on that user’s computer, with that user’s privileges.

Apple’s alert also describes many other code execution vulnerabilities, as well as some Denial of Service (DoS) flaws, cross-site scripting (XSS) vulnerabilities, and information disclosure flaws. Components patched by this security update include:

AirPort Apache
AppleScript ATS
bzip2 CarbonCore
ClamAV CoreText
File Quarantine HFS
ImageIO Image RAW
Installer Kerberos
Kernel Libinfo
libxml Mailman
PHP QuickLook
QuickTime Ruby
Samba Subversion
Terminal X11

Please refer to Apple’s OS X 10.5.x and 10.6.x alert for more details.

On a related note, Apple has released many security updates in the last few weeks. Besides the Java update we alerted about early this month, Apple has also posted the following security-related product updates:

If you use any of those products, we recommend you update them as well, or let Apple’s automatic Software Updater do it for you.

Solution Path:

Apple has released OS X Security Update 2011-001 and OS X 10.6.7 to fix these security issues. OS X administrators should download, test, and deploy the corresponding update as soon as they can.

Note: If you have trouble figuring out which of these patches corresponds to your version of OS X, we recommend that you let OS X’s Software Update utility pick the correct updates for you automatically.

For All Users:

These flaws enable many diverse exploitation methods. Some of the exploits are local, meaning that your perimeter firewall never encounters the attack (unless you use firewalls internally between departments). Installing these updates, therefore, is the most secure course of action.

Status:

Apple has released updates to fix these flaws.

References:

This alert was researched and written by Corey Nachreiner, CISSP. (@SecAdept)

If you require assistance with these updates or any others on your Apple Mac OS X system, Microsoft Windows workstation or server or have any other network computer security questions or issues in the Greenville, Upstate SC area, please call 864.990.4748 or email info@homelandsecureit.com

Homeland Secure IT Alert Footer

Homeland Secure IT Alert

Xperience Greenville review by Pamela Hoyt @PamelaHoyt #XperienceGVL #Greenville

XPerience Greenville Fun

Xperience Greenville as reviewed by Pamela Hoyt

After a very full day at TEDx Greenville, I wasn’t quite sure what to expect with Xperience Greenville that followed.  TED x proved to be an incredibly fast paced adventure that far outweighed my expectations.  TED meaning Technology, Entertainment, and Design was certainly carried through in Xperience Greenville as well.  The “X”perience was originally drafted to be an after party of the second annual TEDx of Greenville which showcases the innovative talent of our Upstate.

I enjoyed the fact that Xperience GVL encompassed a family friendly atmosphere.  I noticed most of the participants that were present at TEDx returned with their families in tow.   It’s difficult to be away from family all day and into the evening as well, so I considered this a great addition.  Fortunately, our children were able to meet us downtown which allowed us additional time to unwind and grab dinner with some friends that also attended TEDx and chat about our days’ events which started at 7:30am!

Aaron Von Frank, Susan Sebotnik, and other key planners did such a fantastic job of making Xperience a fun, inviting, relaxed atmosphere for people of all ages.   John certainly enjoyed the adult beverages that were tucked away in the Wyche Pavilion but the tables were not front and center for everyone to stumble over which was nice.  The music was fun and lively with a great goove… okay I was even dancing but please don’t ask LeeAnn Carter to see the video because our kids were a bit embarrassed by their  “MOM!”  What a great night to Celebrate:  TEDx, the anniversary of Google on Main, and the fantastic weather that was provided for us to enjoy.   Xperience certainly showcased exciting Technology, was wildly Entertaining, and involved creative Design from the best that Greenville has to offer and to that I say, “THANK YOU!”

Please watch John’s little video compilation filmed  on his Flip and enjoy a few moments of Xperience Greenville… we certainly did =)

I don’t wanna work… I’m gonna go to TEDxGreenville all day! #TEDxGreenville #XperienceGVL

Let me start off by apologizing to all of our wonderful clients…

I am sorry, from the bottom of my heart that I will not be reachable today via phone. I am one of the most reachable people on the planet normally, just about 24 hours a day, but…

Today is TEDxGreenville and I just can’t miss it again. (Click on the link for more information about what TEDx is)…    Last year, I worked through it and missed out, but this year, I made a promise to myself to attend!

The line up look amazing:

The Schedule

8:33 a.m. Russell Stall & Co. Kickoff
8:46 Christian Long Kids redesigning the classroom
9:04 Fine Arts Center Classical Quintet String quartet & piano
9:32 Derrick Goodwin Don’t wait to die to consider your purpose
9:45 Ian Curcio The technology and craft of photography
9:56 Jose de Guadalupe Flamenco guitar and dancer
11:06 Max Strom There is no app for happiness
11:22 Bob Kilgore Guitar solo
11:44 Brett Sims (Upstate Parkour) Parkour
11:55 Jim De Piante Watson – A bold party trick, or technological leap?
1:43 p.m. Moody Black & Co. Poetry slam (12 poets)
2:00 Prasanna Eswara Socially responsible sourcing
2:06 Discordia Arts Belly dancer with musical accompaniment
2:12 Shannon Pierce Innovation through pain
2:18 Niel Brooks Singer songwriter
2:24 Qiana Martin Soccer: the power to speak a global language
2:36 Note Ropers Honkabilly
3:47 Tucker Freeland & Co. Inline skate
3:58 Jeremy Make and Andy Raney kART Across America: What is your art?
4:34 Marsha Wallace Democratizing philanthropy through collective giving
4:47 Angie Aparo Singer songwriter
4:56 John Bielenberg A new collaborative capitalism: COMMON brand
5:14 Slideshow & FAC Jazz Quintet Jazz quintet, portraits, and graphic talks
5:22 Closing

After TEDxGreenville concludes, we will be heading over to XperienceGreenville, another simply amazing event that is going to help put Greenville on the map. We’re talking DJs, lasers, glow sticks, a few thousand people, aliens, ninjas. Consider it a family-friend rave!

If you want to follow the action on Twitter, follow #TEDxGreenville and #XperienceGVL

If you REALLY need me, call my office number, leave a voice mail, it will go to my cell phone and I will get back to you quickly. Or, send email, text message, etc. I’m taking a notebook and can provide the computer service you require if it is an emergency.  Scott should be around the office most of the day, and Greg is out there somewhere too…

Enjoy YOUR weekend, hope you get to do something as enlightening and entertaining as us!

Disaster Recovery Made Easy with Servosity Bare-Metal Restore

Those of us who have been through a hard drive failure know what real pain is! As a computer technician, it is no less devastating for us, all the same things have to take place after a failure, the routine is something like this:

  • Determine the drive is indeed dead, have last rites, it was a good drive.
  • Replace the drive in the computer.
  • Format and load our operating system. (We do have the install disks, right?)
  • Configure all the networking, ownership, accounts, etc. (What? No net access? Of course not, you don’t have the right driver)
  • Load drivers for network interface,  audio, video and other hardware. (They are long out of date if you are using the original install media)
  • Load all the updates, patches and driver updates. Windows XP systems may require 100 updates or more!
  • Load your applications… Of course you know where the disks and license keys are.
  • Find some applications online because they were downloaded. Guess what? Your key no longer works with the current version, your version is no longer available for download…
  • Restore your files from the last backup you made. YOU DID MAKE A BACKUP, RIGHT?
  • Spend the next week realizing you missed various things and fix those as you go.

Even for a seasoned techy type person, the time spent could literally be hours. New curse words will be invented. You may miss an important event like your son’s wedding, because this is far too important to put off.

There are many things that can shorten the time it takes to return your machine from a brick to a working system. You can ensure you have all your install media for the operating system and applications in one place, and that your product keys/licenses are tucked away safe and secure. Any hardware driver disks should be kept, and without question, you should always backup your system!

What if I told you that all of that can be avoided, and in the event of a hard drive crash or even a complete computer failure, that you could replace the drive, or failed system with another identical system, then have it running as if it never happened in about 20 minutes?

Through the magic of a “Bare-Metal Restore”, that is entirely possible! It is as if you went back in time, to happier days when the system was working correctly!

Many products are on the market that can accomplish this, but if you are using our Servosity Online On-Demand backup solution, you already have all the software you need!  You will require an extra hard drive to make the image to, a few minutes to configure it, and then let it run!

Watch it in action here as Damien Stevens, CEO of Servosity talks with Jon Evans, and George Law performs an actual restore:

 

We are so sold on Servosity that we use it for our own servers, recommend it to our clients and have partnered with them to offer it to you!

Convinced this may be right for you? Call us at 864.990.4748 or email info@homelandsecureit.com. Want a free trial? Sure you do! Click this link:

 

Free Servosity Online Backup Trial! Click Here...

FREE Servosity Online Backup Trial! Click Here...

Secure IT Alert: Zero Day Adobe Flash Vulnerability Results in Attacks on Microsoft Windows, Apple Mac OS X, Etc.

Secure IT Alert Header

Homeland Secure IT Alert

Homeland Secure IT Alert for Wednesday, March 16, 2011

Adobe has warned of a new zero day vulnerability the other day that is being used to exploit users of Adobe Flash Player, Adobe Reader and Acrobat across all platforms, including Microsoft Windows and Apple Mac OS X and Linux. It also covers Flash player for Chrome and Android users, as well as the Authplay.dll component from Adobe Reader and Acrobat X for Windows and Macintosh.

This is a critical vulnerability and at this moment in time, there is no fix for it.

Attackers are exploiting it by attaching malicious Excel (.xls) documents to emails. The Excel document will contain a specially crafted Flash (.swf) file, and if you open the malicious Excel attachment, the embedded .swf file executes and leverages the vulnerability to install persistent malware on your system, such as a bot client giving the attacker a stepping stone to install even more malware.

Since no patch exists, yet, it is advised that you use extreme caution when opening Excel documents attached in email unless you are expecting them.

If you feel you have done so in the last few days, please run a virus scan, or consult with your computer service or repair technicians. Those in Greenville / Upstate SC can call Homeland Secure IT at 864.990.4748 or email info@homelandsecureit.com for assistance.

Homeland Secure IT Alert Footer

Homeland Secure IT Alert

We offer Microsoft Office 2010 open / volume licenses for your business in Greenville / Upstate SC!

In a conversation today, I heard how much someone had just paid for 18 full retail versions of Microsoft Office 2010 Professional which they purchased online because they were not aware of other ways in which you can obtain the product.

If you are in Greenville / Upstate, SC and need to buy Microsoft Office 2010, please consider giving us a call! We may be able to save you or your business some money on Microsoft products, such as Microsoft Office Home & Student,  Home & Business, Standard Professional, Professional Plus and Office for Office for Mac in addition to making administration of larger quantities much easier.

Different ways Microsoft Office 2010 can be purchased include:

  • Microsoft FPP (Full Product Package) – This is the full retail package, includes media and product license and ability to load on a desktop AND  a notebook (restrictions apply). Versions available are Microsoft Office 2010 Home & Student, Home & Business and Professional.
  • Microsoft PKC (Product Key Card) – If you buy a new PC with the Office Trial loaded on it you can purchase the PKC for Microsoft Office 2010 Home & Student, Home & Business and Professional (cheaper than buying the Full Product Package)
  • Microsoft Volume Licensing – If you have a business or organization and need to purchase 5 or more copies at a time, this is the way to go! Open licensing is a downloadable product which saves on packaging and thus is better for our environment, and in turn, saves you money! You have only one product key to keep up with and can place the same installation package on a file server to install across machines on your domain. Microsoft Office 2010 Standard and Professional Plus are available via this method. We can help determine which is best for you!

In addition to those methods, non-profit organizations which we work with can obtain almost unreal pricing through some programs we have available!

If you would like more information on which version may be right for you or your business, click the more info banner to the left, or feel free to call 864.990.4748 or email info@homelandsecureit.com

We are a Microsoft Partner & Small Business Specialist and would love the opportunity to help you with any Microsoft purchase or support, whether it is Microsoft Office 2010, Microsoft Windows 7, Microsoft Server 2008 R2, Microsoft Small Business Server 2011, Microsoft Exchange 2010, Microsoft Link Server, Microsoft BPOS / Business Productivity Online Suite, Office 365, and more…  One seat or one thousand!