SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
SPAM—Malware’s Super Highway
How To Protect Yourself Against Malicious Emails1
What The Good Guys Are Up Against
According to Kaspersky Lab:
• The decline in SPAM emails over the past few years has reversed
• March 2016 statistics show that malicious SPAM emails are 4 times the level they were in 2015
• SPAM emails have risen to 61% of all email traffic
• Over 50% of email phishing attacks are directed against banks, online stores and payment systems
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
2
Statista reports that in 2014, global spam volume reached 28 billion per day
What Spammers Do
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
3
Send thousands of emails
daily infecting as many PCs
as possible
The math is simple:
If a hacker sends 50,000
infected emails and just
1% take action, 500
computers get infected
Many compromised
computers are commercial
machines allowing entry
into highly-prized business
networks
If done on a daily basis,
each hacker can steal data
from millions of systems
Stolen data is sold to the
criminal underground for
lucrative paydays with
little effort
How They Do It
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
4
Large criminal enterprises sell Crime as a Service (CaaS) system packages to
newbie cyber-thieves making barrier to entry extremely low
• Wannabe thieves get comprehensive crime systems plus technical support
• They’re shown how to send malicious emails, infect PCs, recruit bots, and track results
They also use the Internet of Things (IoT) to spread SPAM
• Hackers easily compromise internet-enabled household appliances, TVs, baby monitors, home smart
sensors, medical devices, etc.
• Criminals use them to spy on people and steal their data
• They draft them into bot armies to send infected SPAM emails
The problem is fueled by millions of people freely giving their information on the
internet so hackers don’t have to work very hard to harvest email addresses
What Happens When You Click On An Infected Link Or Open An Attachment?
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
5
At first, nothing may appear to be happening at all, however…
• Malware is downloaded, undetected in the background
• Or you are redirected to an infected site where malware is downloaded automatically
• Passwords, financial data, personal and client information are all targeted and sent to criminal
servers—your system and/or network may also be encrypted and held for ransom
Fact: Current anti-virus programs can’t detect all malware, especially new ones
• Security companies must see the strain first before creating methods to detect it
• Some viruses even change their behavior to bypass anti-virus programs
• Newer strains have the ability to wait undetected, activating at a later time
• Encrypting ransomware has become cyber-crime’s number one cash cow
• It’s been estimated that over 250,000 new malware strains are produced each day
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
6
12 Critical things You Can Do To Protect Yourself From Malicious Emails
• Use a disposable email address for public use
• Keep your antivirus software up-to-date and scan suspect emails
• Strengthen your email client’s SPAM filter to send suspicious emails to your Junk Folder
• Use an Advanced SPAM Filter as an additional layer of protection
• Delete suspicious emails and don’t click on any links—not even the “Unsubscribe” link—since they may also infected
• Clean out your Junk folder and also delete suspect emails from your Deleted folder
• Read everything before agreeing to terms and make sure vendor’s aren’t selling your information to third parties
• For added protection, set your email to plain text rendering links inactive
• If you receive an email from the U.S. Post Office, FedEx, etc.—do not click on the tracking link—instead, manually enter
it into the search box on the official website
• Don’t operate your PC with Administrator privileges—that’s how ransomware propagates through business networks
• Disable macros on Microsoft applications to prevent their automatic execution when opening infected attachments
• Learn how to identify bogus links (next slide)
How To Identify Bogus Emails
Below is an example of a bogus email, annotated to show what to looked for:
If you hover your
mouse over the link
[DO NOT CLICK!],
you can see where it
leads to.
In this case, the Top
Level Domain (TLD)
of .ir shows that it’s
from Iran!
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
7
People Are The Weakest Link In Security
• No matter how cautious you are, others can break your security by the actions they take or fail to take
• One click on an infected link by a staff member can trigger a ransomware attack on the entire organization
• The simple fact is that a magic bullet to save us from malware and ransomware simply doesn’t exist
• To give yourself and your company a fighting chance, institute the steps outlined earlier and …
Make sure you have a viable backup of your data!
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
8
There Are Mainly 3 Types Of Backup To Choose From
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
Hybrid-cloud / Instant Failover Solution
 Takes images of systems and saves them to an onsite device and two
cloud locations
 Provides alternate server functionality both onsite and from the
cloud
 Daily Screenshots of boot-up screens for virtualized servers verifies
viability of backups
 Full Management: installation, monitoring, troubleshooting and
assisting in recovery
Data Backup
 Only backs up data
 Is slow since it backs up 1 file at a time
 Doesn’t guarantee a quick recovery
 It’s not easy to check if backups are viable
Image-based Backup
 Takes a complete picture or image of a server or PC
allowing for quicker restorations
 Is better than data backup because it snapshots the
entire system
 Does not provide instant failover should a server fail, get
damaged or destroyed
Best Option
9
BUSINESSES SHOULD INCLUDE THE DATTO SIRIS SOLUTION AS
PART OF THEIR DISASTER RECOVERY ARSENAL
The Datto SIRIS Is The Ultimate Protection Against Data Loss
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
What It Is What It Does What To Expect
 A Hybrid-cloud Backup Solution  Instant onsite fail-over  NO data loss
 Snapshots of your entire server
 Cloud Continuity for maximum
protection
 NO costly downtime
 Infinite data retention
 Image Capture for super fast
restores
 FULL Business Continuity
 Automatic onsite & offsite
protection
 Bare Metal Restore (BMR)
capability
 FULL Management & Support
10
XSolutions And Datto—An Unbeatable Combination!
XSolutions is an Elite Partner of Datto, the world leader
in Hybrid-cloud Business Continuity solutions whose systems
protect 180+ Petabytes of data with over 700 employees around
the globe.
We are experts in the configuration, installation and
management of Datto Business Continuity and Backup systems.
We'll manage, monitor and maintain your backup systems,
making sure that they're working properly and that they'll be
ready when needed.
With XSolutions, you're NEVER alone. We'll be there to help you
whenever you need it, from restoring individual files to full
server restorations.
In addition to automated alerts, we physically check backups
throughout the day making sure they're viable and taking place
on schedule. If an issue arises, we'll resolve it immediately or
work with Datto’s award-winning support team until the
problem is solved.
XSolutions: (845) 362-9675 | contactus@xsolutions.com |
www.xsolutions.com
Contact us to schedule a FREE demo!
Call: (845) 362-9675
Email: contactus@xsolutions.com
Web: www.xsolutions.com
11

Contenu connexe

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

How To Protect Yourself Against Malicious Emails

  • 1. SPAM—Malware’s Super Highway How To Protect Yourself Against Malicious Emails1
  • 2. What The Good Guys Are Up Against According to Kaspersky Lab: • The decline in SPAM emails over the past few years has reversed • March 2016 statistics show that malicious SPAM emails are 4 times the level they were in 2015 • SPAM emails have risen to 61% of all email traffic • Over 50% of email phishing attacks are directed against banks, online stores and payment systems XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 2 Statista reports that in 2014, global spam volume reached 28 billion per day
  • 3. What Spammers Do XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 3 Send thousands of emails daily infecting as many PCs as possible The math is simple: If a hacker sends 50,000 infected emails and just 1% take action, 500 computers get infected Many compromised computers are commercial machines allowing entry into highly-prized business networks If done on a daily basis, each hacker can steal data from millions of systems Stolen data is sold to the criminal underground for lucrative paydays with little effort
  • 4. How They Do It XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 4 Large criminal enterprises sell Crime as a Service (CaaS) system packages to newbie cyber-thieves making barrier to entry extremely low • Wannabe thieves get comprehensive crime systems plus technical support • They’re shown how to send malicious emails, infect PCs, recruit bots, and track results They also use the Internet of Things (IoT) to spread SPAM • Hackers easily compromise internet-enabled household appliances, TVs, baby monitors, home smart sensors, medical devices, etc. • Criminals use them to spy on people and steal their data • They draft them into bot armies to send infected SPAM emails The problem is fueled by millions of people freely giving their information on the internet so hackers don’t have to work very hard to harvest email addresses
  • 5. What Happens When You Click On An Infected Link Or Open An Attachment? XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 5 At first, nothing may appear to be happening at all, however… • Malware is downloaded, undetected in the background • Or you are redirected to an infected site where malware is downloaded automatically • Passwords, financial data, personal and client information are all targeted and sent to criminal servers—your system and/or network may also be encrypted and held for ransom Fact: Current anti-virus programs can’t detect all malware, especially new ones • Security companies must see the strain first before creating methods to detect it • Some viruses even change their behavior to bypass anti-virus programs • Newer strains have the ability to wait undetected, activating at a later time • Encrypting ransomware has become cyber-crime’s number one cash cow • It’s been estimated that over 250,000 new malware strains are produced each day
  • 6. XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 6 12 Critical things You Can Do To Protect Yourself From Malicious Emails • Use a disposable email address for public use • Keep your antivirus software up-to-date and scan suspect emails • Strengthen your email client’s SPAM filter to send suspicious emails to your Junk Folder • Use an Advanced SPAM Filter as an additional layer of protection • Delete suspicious emails and don’t click on any links—not even the “Unsubscribe” link—since they may also infected • Clean out your Junk folder and also delete suspect emails from your Deleted folder • Read everything before agreeing to terms and make sure vendor’s aren’t selling your information to third parties • For added protection, set your email to plain text rendering links inactive • If you receive an email from the U.S. Post Office, FedEx, etc.—do not click on the tracking link—instead, manually enter it into the search box on the official website • Don’t operate your PC with Administrator privileges—that’s how ransomware propagates through business networks • Disable macros on Microsoft applications to prevent their automatic execution when opening infected attachments • Learn how to identify bogus links (next slide)
  • 7. How To Identify Bogus Emails Below is an example of a bogus email, annotated to show what to looked for: If you hover your mouse over the link [DO NOT CLICK!], you can see where it leads to. In this case, the Top Level Domain (TLD) of .ir shows that it’s from Iran! XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 7
  • 8. People Are The Weakest Link In Security • No matter how cautious you are, others can break your security by the actions they take or fail to take • One click on an infected link by a staff member can trigger a ransomware attack on the entire organization • The simple fact is that a magic bullet to save us from malware and ransomware simply doesn’t exist • To give yourself and your company a fighting chance, institute the steps outlined earlier and … Make sure you have a viable backup of your data! XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com 8
  • 9. There Are Mainly 3 Types Of Backup To Choose From XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com Hybrid-cloud / Instant Failover Solution  Takes images of systems and saves them to an onsite device and two cloud locations  Provides alternate server functionality both onsite and from the cloud  Daily Screenshots of boot-up screens for virtualized servers verifies viability of backups  Full Management: installation, monitoring, troubleshooting and assisting in recovery Data Backup  Only backs up data  Is slow since it backs up 1 file at a time  Doesn’t guarantee a quick recovery  It’s not easy to check if backups are viable Image-based Backup  Takes a complete picture or image of a server or PC allowing for quicker restorations  Is better than data backup because it snapshots the entire system  Does not provide instant failover should a server fail, get damaged or destroyed Best Option 9
  • 10. BUSINESSES SHOULD INCLUDE THE DATTO SIRIS SOLUTION AS PART OF THEIR DISASTER RECOVERY ARSENAL The Datto SIRIS Is The Ultimate Protection Against Data Loss XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com What It Is What It Does What To Expect  A Hybrid-cloud Backup Solution  Instant onsite fail-over  NO data loss  Snapshots of your entire server  Cloud Continuity for maximum protection  NO costly downtime  Infinite data retention  Image Capture for super fast restores  FULL Business Continuity  Automatic onsite & offsite protection  Bare Metal Restore (BMR) capability  FULL Management & Support 10
  • 11. XSolutions And Datto—An Unbeatable Combination! XSolutions is an Elite Partner of Datto, the world leader in Hybrid-cloud Business Continuity solutions whose systems protect 180+ Petabytes of data with over 700 employees around the globe. We are experts in the configuration, installation and management of Datto Business Continuity and Backup systems. We'll manage, monitor and maintain your backup systems, making sure that they're working properly and that they'll be ready when needed. With XSolutions, you're NEVER alone. We'll be there to help you whenever you need it, from restoring individual files to full server restorations. In addition to automated alerts, we physically check backups throughout the day making sure they're viable and taking place on schedule. If an issue arises, we'll resolve it immediately or work with Datto’s award-winning support team until the problem is solved. XSolutions: (845) 362-9675 | contactus@xsolutions.com | www.xsolutions.com Contact us to schedule a FREE demo! Call: (845) 362-9675 Email: contactus@xsolutions.com Web: www.xsolutions.com 11