IT Infrastructure Management Services

How Does Optimizing IT Infrastructure Increase ROI

You already know IT infrastructure isn’t just a back-office function. It’s a strategic asset that can drive profitability and growth. Many businesses like yours are realizing that an optimized infrastructure is vital to improving efficiency, reducing costs, and ultimately maximizing ROI. WYRE specializes in transforming outdated, inefficient systems into streamlined, scalable infrastructures that help support […]

Read More

WYRE Wins Company of the Year at TechX Awards

Chattanooga, Tennessee-Last night, local startup WYRE Technology was named Tech Company of the Year 2024 at the fifth annual Technology Excellence (TechX) Awards. WYRE was a finalist in two other categories, including Tech Excellence in Marketing and CXO Leader of the Year. Chattanooga Technology Council hosts the yearly awards to “honor and celebrate the remarkable […]

Read More

Disaster Recovery for Ransomware: a Ransomware Case Study

Disaster Recovery for Ransomware:

In the aftermath of a critical ransomware attack, an educational institution reached out to WYRE for help. With over 1,200 endpoints and more than 900 staff members, the scope of the cleanup was daunting. The attack had not only threatened operations but also left critical systems vulnerable. The institution urgently needed help to recover from […]

Read More

ChaTech 2024 TechX Awards Finalists Announced!

WYRE Main Logo

WYRE is a finalist for the 2024 Chattanooga Technology Council (ChaTech) TechX Awards in the category of Tech Company of the Year. CEO Tyler York is a finalist for CxO of the Year. And Director of Growth Angela Wade is a finalist for Tech Marketer of the Year.   The results of the awards will […]

Read More

Microsoft 365 Security Best Practices: When to Use Enhanced Security

Microsoft 365 Security Best Practices: When to Use Enhanced Security

No matter your industry, cybersecurity is no longer an option-it’s a necessity. This is where Microsoft 365’s enhanced security features come into play, with everything from automated threat detection to advanced conditional access policies. This enterprise-level protection bolsters your organization’s defenses and allows you to focus on growth, customers, and innovation, knowing your security is […]

Read More

Microsoft 365 Security Best Practices: When to Use Security Defaults

Microsoft 365 Security Best Practices: When to Use Security Defaults

Just as you would never leave your physical office unlocked and unattended, securing your technology is equally crucial. But wading through complex security settings can be overwhelming (to say the least). This is where Microsoft 365’s default security settings come in-a basic approach that offers a surprising amount of protection for your business. M365 Default […]

Read More

Understanding M365 and Azure AD Licensing

Woman Working Bright Desk

Microsoft 365 is a great fit for small businesses. Why? Its robust inclusion of products and services: Microsoft Office OneDrive cloud storage hosted email, your own business domain (e.g., mybusiness.com), shared calendars, shared storage and files, video and audio conferencing, and real-time collaboration through Microsoft Teams (source). Add in Azure Active Directory, a “cloud-based identity […]

Read More

Banking Digital Transformation Case Study

Banking digital transformation case study

For today’s banking industry, ensuring uninterrupted services is a more complex undertaking than ever. From fortifying digital banking platforms to protecting sensitive customer data, the challenges are unending. Recently, a regional bank reached out to WYRE for help with implementation of Microsoft 365’s Active Directory Certificate Services (AD CS). They were looking to incorporate encryption, […]

Read More

Encoded EtherHiding Sneakily Delivers Malware

encoded etherhiding attack

By Anthony Jirouschek, Security Architect On July 2nd, we published an article about an attack we observed using EtherHiding and Fake-Updates to deliver the Lumma infostealer. After the article was published, we did some threat hunting and found a different version of this attack that uses encoding to obfuscate, or hide, the attack better. As […]

Read More

EtherHiding and Fake-Updates Used to Deliver Malware

etherhiding

By Anthony Jirouschek, Security Architect We recently observed an attack using EtherHiding to deliver Fake-Updates malware, which eventually resulted in an infostealer named Lumma being installed. EtherHiding is essentially using smart contracts on a crypto platform to obscure and deliver malicious code. In this case, the threat actor used Binance’s Smart Chain contracts. EtherHiding is […]

Read More