Tag Archives: proactive support

Don’t Push Your Network’s Luck

Look around your office. Isn’t it great to see your team hard at work on their computers? Yet if we take a closer look, let’s see what’s really happening…

Joe, your new sales rep, is poring over last weekend’s game stats…

Amy in marketing is looking for a new job, surfing your competitors’ websites, chatting with their HR people…

Wes, over in customer support, just bogged down your entire network by downloading a video file of Metallica in concert…

Bob in accounting is browsing stock-investing sites, in search of a hot tip…

Okay, so maybe it’s not that bad at your company. But this type of behavior will happen to some degree if you don’t proactively prevent it. The real problem is, unfiltered content often links to malware and other threats. Ignore it and you risk productivity losses, legal liabilities, extortion, blackmail and fraud. And not only that, the resulting data loss and corruption can cost your company big-time. Cyberthreats stemming from unfiltered content aren’t something you can count on your lucky leprechaun or four-leaf clover to protect you from.

In today’s mobile environment, content filtering has becoming a greater challenge than ever before. Your company may already be doing some filtering at the network level. However, when was the last time you checked the number of mobile devices linked to your network? As your workforce goes mobile, your network is exposed to a rapidly expanding “attack surface.” With BYOD (bring your own device) now the norm, the old rules of content filtering just don’t cut it anymore.

Are You Making Any Of These Mistakes?

Old content-filtering models presume your network has a safe “firewall.” But now, with BYOD, you need a different way to protect your data. And that’s where endpoint security comes into play. Endpoint filtering keeps devices on your network safe from infection, no matter where they hook into the Internet.

But make ANY of the following mistakes with endpoint security and your network could be a sitting duck:

  1. Missing even ONE endpoint. This applies to tablets and smartphones as well as home-based machines that VPN into your network.

 

  1. Skimping on security policies, protocols and training. Believing that tech tools alone will keep your network secure is a recipe for breaches. In fact, no technology can keep a network safe if users cut corners.

 

  1. Leaving endpoint filtering out of your overall security plan. Ad hoc security invites disaster. An improperly designed system exposes holes that hackers love to find.

So, What Exactly Should You Filter?

Forrester Research states that companies whose users access the cloud should:

Detect and intercept unusual or fraudulent activities related to data in the cloud.

  • Detect, neutralize and eliminate malware in cloud platforms.
  • Detect and monitor unsanctioned cloud applications and platforms usage.
  • Protect against leaks of confidential information.
  • Encrypt structured and unstructured data in cloud platforms.
  • Investigate suspicious users and incidents.

Between BYOD and ever more complex cyberthreats, you simply can’t afford to run around putting out fires. You absolutely MUST proactively defend your network in depth with endpoint content filtering. We offer content filtering that is customizable to your business while still offering the highest level of protection. We can also help segment your wireless network, so those who do BYOD won’t ever touch the network that your critical business data is on. With a complete proactive managed service provider like ECMSI, you can sleep better at night and stop relying on “luck” to keep your network stable and secure.

How to Avoid Becoming the Next Hacking Victim

Cyber attacks are so common now that hardly a week passes without news of another major network security breach involving a high-profile company. Well-known brands like Target, Sony and Yahoo have all fallen victim to security breaches in the last few years.

But hackers don’t just limit themselves the market’s major players – they will, and do, attack companies of all sizes, exploiting their weak defenses to infiltrate and steal valuable corporate data. In fact, smaller businesses are seen as much easier targets, because they usually lack the robust defenses that large enterprises routinely use.

So why should you worry about being next? The costs of a network security breach can be enormous, sometimes even crippling. One study from the National Cyber Security Alliance reports that around 20 percent of small businesses fall victim to a cyber attack each year, and of these, just 40 percent are still around six months later.

Can your business foot the bill from a major cyber security breach? Not likely.

Keep the bandits out

At ECMSI, our overriding goal is to help your company thrive, but you won’t stand a chance of doing that if your servers are leaking corporate and customer data all over the place. That’s why we make your network security such a big priority. We want to see our customers to succeed — and enjoy longer-lasting relationships with them.

As one of the leading Managed Services Providers, we’ll strive to protect your network against everything attackers can throw at it.

Our big secret is that unlike other MSPs, we take time to get to know our clients and help them understand how to take full advantage of their technology.

When we uncover your unique risks and concerns, we prepare a plan to help you defend against the wide variety of cyber threats that could slow down and damage your business — and your reputation — including ransomware, insider attacks and other viruses.

And we go further to proactively avoid these threats by teaching you best practices to minimize the risk of becoming a victim in the first place. We’ll also help get you up and running with the latest antivirus software, firewalls and threat detection software to ensure your network security is as tight as it’s possible to be.

Your depend on your business technology to be successful, that much you know already. But it can also become your Achilles’ heel if your network defenses aren’t up to scratch. Contact ECMSI today and we’ll show you how to avoid becoming headline news for the wrong reasons.

Shut Off Your Bluetooth When You’re Not Using It!

Privacy and security seems to always be on everyone’s mind today. Intuitively we are always making sure our homes are locked before we leave and that our cars when left aren’t vulnerable to any intruders. Just like our homes and cars, we keep our technological devices secure and locked with some sort of authentication, but they too have a variety of different entrances for an intruder to sneak their way in.

The most popular digital entrance into a electronic device today is through its Wifi. We have all heard of the horror stories of connecting to a wrong network in a public place and having your personal information stolen. But few people think about how their Bluetooth can be effected. Minimizing your Bluetooth usage minimizes your exposure to the vulnerabilities. Most recently, an attack called BlueBorne allows for any affected device with Bluetooth turned on to be attacked through a series of vulnerabilities. These vulnerabilities don’t stem from the Bluetooth itself but the implementation in all the of the software including Windows, Andriod, Linux and iOS. This potentially puts millions at risk.

 

The Blueborn attack starts by going through the process by scanning devices with Bluetooth on, it then starts probing them for information such as device type and operating system to see if they have the vulnerabilities it can latch on to. The Blueborn bug can allow hackers to take control of a device and access private information. This attack can also spread from device to device in one motion if other vulnerable Bluetooth enabled targets are nearby.

The best defense against this Bluetooth security flaw is to make sure your device system is always updated with the latest software and firmware. This make sure there are no vulnerabilities in the implementation of Bluetooth within your operating system. Bluetooth does many amazing things that seem almost magical and the benefits outweigh the calculated risk of turning it on. However when not in use it is best to make sure to keep your Bluetooth setting off and use it when you know you are in a safe and secure area.

Equifax Breach! Get the Facts

On September 7th the consumer credit reporting giant, Equifax, announced a cyber security incident that could have potentially impacted over 143 million U.S. consumers. The company discovered the unauthorized access on July 29th of this year and believes it may have been occurring from mid- May through July 2017. The information accessed includes names, Social Security numbers, birth dates, addresses and driver’s license numbers as well as credit card numbers for over 209,000 U.S. consumers.

Now before the panic ensues, the company acted immediately to stop the intrusion and utilized the help of an independent cyber security firm to conduct an in depth forensic review to determine the impact of the breach. While Equifax reported unauthorized access to limited personal information for some U.K and Canadian residents, the company found no evidence that personal information of consumers in other countries have been impacted. There was also NO evidence of unauthorized access to core consumers or commercial credit reporting databases.

If this issue concerns you, or you think you may have been one of those consumers effected, Equifax has launched a website dedicated to informing users if their information could have been impacted. Which can be found here.  On this site Equifax offers an opportunity to find out if your information was potentially hacked into as well as a chance to enroll in their TrustedID Premier, that the company is offering to every US Consumer for free for a year. This service includes 3-Bureau credit monitoring of Equifax, Experian and Transunion credit reports, copies of Equifax credit reports, the ability to lock and unlock Equifax credit reports, identity theft insurance and Internet scanning for social security numbers.

This incident is not the first of its kind and will sadly not be the last. It is important for consumers to protect themselves as much as they can when handling their personal information online. This breach is also a lesson to all businesses, no matter how big or small that their IT security is one of the most important aspects to their business and core activities. A situation like this can leave a bad stigma on your businesses reputation for the future. The CEO of Equifax stated, “Confronting cybersecurity risks is a daily fight. While we’ve made significant investments in data security, we recognize we must do more. And we will.”

What Does your Business IT and Car have in Common?

THEY BOTH NEED TO BE INSURED!

When we talk about car insurance the dark thoughts and questions begin to arise. What if I get into an accident? What if I’m travelling and left on the side of the road? What if someone hits me without my control? While all of these thoughts are very pessimistic, these things do happen, sadly, more often than we would like them to. This makes driving without some sort of car insurance seem completely ludicrous. So why should your business IT be any different?

Think about your business IT as the “vehicle” that keeps your company running. What if your network “crashes”, what if your employees are working and your computers decides to leave them on the side of the road? Or what if a hacker “hits” your network with ransomware or the many other hundreds/thousands of malicious malware that is out there today?

When talking about business IT “insurance”, we mean something a little bit different. You need to make sure that the technology in your business is secure, protected and keeps your employees as productive as possible in order for your business to stay viable. Like a car, you have to have some sort of disaster protection, or else a whole bunch of time, money and productivity of your business is lost on fixing the issue when it happens. The best “insurance” for your business network is using an outsourced IT service management provider, and here’s why.

When you outsource the management of your important IT resources they help optimize your networks performance, to make it work at the peak efficiency and reliability levels that your business demands. This can allow you to stay focused on running your business and not your network. This security, networking, data protection and user support is handled at a fraction of the cost than if your business decided to take on all of that cost itself. Risk is something your business deals with every day from market competition, to the state of the economy, don’t let your IT be another risk. Businesses have limited resources, and every owner/manager has limited time and attention. Outsourcing can help your business stay focused on your core business and not get distracted by complex IT decisions.

Secure your network today with ECMSI !

330.750.9412

 

 

Our systems are down!- A CEO’s Nightmare…

In this day and age, having some sort of computer to do your job is as necessary as air. Chances are, if you have a lot of computers in your business, you also have things like servers, routers, access points, and switches. These are all critical pieces to maintaining your business and your employee’s productivity level.

Have you ever stopped to think about what would happen if your business suffered a catastrophic event? How long would it take to get you back up and running? Do you know if your critical data is being backed-up and if it is, how often is that happening? If you are reading this and starting to feel a tightening in your chest because you aren’t sure of your answers, then it’s time to stop ducking your head in the sand.

In a survey done by IHS in 2015, the average of cost of outages totaled the $700 billion dollar mark. This number has only increased for the past year in 2017. This total includes the loss of employee productivity, revenue and the cost to the fix the issue, which surprisingly was the lowest cost of the three.

So how do you calculate downtime loss?  Our friends over at My IT Pros shared with this basic formula:

 LOST REVENUE = (GR/TH) x I x H

GR = gross yearly revenue

TH = total yearly business hours

I = percentage impact (a high percentage would mean you can’t complete any transactions, will lose clients and have a PR nightmare)

H = number of hours of outage

Finally, to calculate the expected annual cost, multiply this number by the number of expected annual hours of outage. If you do this and you are absolutely panicking, don’t worry. While all of this sounds like something out of a nightmare, the solutions are fairly simple. We would first recommend that you have incremental back-ups of your critical data that are stored both locally and in the cloud. This way, if your hardware were to fail, with the help of your IT provider, you can pull your data down from the cloud onto a backup server (part of the redundancy plan). Secondly, we recommend that you have a redundant environment. Now, this can mean a variety of things but at minimum, it would mean that you’d have a secondary server that is only for emergencies. At maximum, it would mean having clustered servers where there are more than 1 server and if something were to fail, the data just seamlessly moves to the next available hardware.

We don’t want to see any businesses have to deal with this nightmare. If you are unsure of what disaster recovery plan you have with your current IT Provider, it may be time to strike up that conversation. If you have any questions and would like to discuss how downtime could affect you and how ECMSI can help you prevent a disaster please feel free to contact us at 330.750.9412.