How Does Optimizing IT Infrastructure Increase ROI

IT Infrastructure Management Services

October 18, 2024

You already know IT infrastructure isn’t just a back-office function. It’s a strategic asset that can drive profitability and growth. Many businesses like yours are realizing that an optimized infrastructure is vital to improving efficiency, reducing costs, and ultimately maximizing ROI. WYRE specializes in transforming outdated, inefficient systems into streamlined, scalable infrastructures that help support […]

WYRE Wins Company of the Year at TechX Awards

September 27, 2024

Chattanooga, Tennessee-Last night, local startup WYRE Technology was named Tech Company of the Year 2024 at the fifth annual Technology Excellence (TechX) Awards. WYRE was a finalist in two other categories, including Tech Excellence in Marketing and CXO Leader of the Year. Chattanooga Technology Council hosts the yearly awards to “honor and celebrate the remarkable […]

Disaster Recovery for Ransomware:

Disaster Recovery for Ransomware: a Ransomware Case Study

September 17, 2024

In the aftermath of a critical ransomware attack, an educational institution reached out to WYRE for help. With over 1,200 endpoints and more than 900 staff members, the scope of the cleanup was daunting. The attack had not only threatened operations but also left critical systems vulnerable. The institution urgently needed help to recover from […]

WYRE Main Logo

ChaTech 2024 TechX Awards Finalists Announced!

August 27, 2024

WYRE is a finalist for the 2024 Chattanooga Technology Council (ChaTech) TechX Awards in the category of Tech Company of the Year. CEO Tyler York is a finalist for CxO of the Year. And Director of Growth Angela Wade is a finalist for Tech Marketer of the Year.   The results of the awards will […]

Microsoft 365 Security Best Practices: When to Use Enhanced Security

Microsoft 365 Security Best Practices: When to Use Enhanced Security

August 19, 2024

No matter your industry, cybersecurity is no longer an option-it’s a necessity. This is where Microsoft 365’s enhanced security features come into play, with everything from automated threat detection to advanced conditional access policies. This enterprise-level protection bolsters your organization’s defenses and allows you to focus on growth, customers, and innovation, knowing your security is […]

Microsoft 365 Security Best Practices: When to Use Security Defaults

Microsoft 365 Security Best Practices: When to Use Security Defaults

August 16, 2024

Just as you would never leave your physical office unlocked and unattended, securing your technology is equally crucial. But wading through complex security settings can be overwhelming (to say the least). This is where Microsoft 365’s default security settings come in-a basic approach that offers a surprising amount of protection for your business. M365 Default […]

Woman Working Bright Desk

Understanding M365 and Azure AD Licensing

August 14, 2024

Microsoft 365 is a great fit for small businesses. Why? Its robust inclusion of products and services: Microsoft Office OneDrive cloud storage hosted email, your own business domain (e.g., mybusiness.com), shared calendars, shared storage and files, video and audio conferencing, and real-time collaboration through Microsoft Teams (source). Add in Azure Active Directory, a “cloud-based identity […]

Banking digital transformation case study

Banking Digital Transformation Case Study

August 8, 2024

For today’s banking industry, ensuring uninterrupted services is a more complex undertaking than ever. From fortifying digital banking platforms to protecting sensitive customer data, the challenges are unending. Recently, a regional bank reached out to WYRE for help with implementation of Microsoft 365’s Active Directory Certificate Services (AD CS). They were looking to incorporate encryption, […]

encoded etherhiding attack

Encoded EtherHiding Sneakily Delivers Malware

July 16, 2024

By Anthony Jirouschek, Security Architect On July 2nd, we published an article about an attack we observed using EtherHiding and Fake-Updates to deliver the Lumma infostealer. After the article was published, we did some threat hunting and found a different version of this attack that uses encoding to obfuscate, or hide, the attack better. As […]

etherhiding

EtherHiding and Fake-Updates Used to Deliver Malware

July 2, 2024

By Anthony Jirouschek, Security Architect We recently observed an attack using EtherHiding to deliver Fake-Updates malware, which eventually resulted in an infostealer named Lumma being installed. EtherHiding is essentially using smart contracts on a crypto platform to obscure and deliver malicious code. In this case, the threat actor used Binance’s Smart Chain contracts. EtherHiding is […]