Is Ransomware A Threat to My Business?

Ransomware

Ransomware

What is ransomware?

Ransomware is an unusual type of threat because it holds your files for ransom while leaving your systems essentially otherwise operational. A piece of malicious software enters your network and applies an encryption algorithm to your computer files, rendering them unavailable. The files are still there, and you can see them in a file structure, but you will not be able to open them with any program. Additionally, ransomware affects not just the device you are using, but any connected storage devices and mapped network drives. As a result, this type of malware poses a serious threat to your information systems. One infected device can bring your operations to a standstill. The person or group behind the attack provides information as to how to submit a payment, and in exchange, they will provide the decryption key. The attackers demand payment in some form of cryptocurrency, in order to maintain anonymity.

Some victims of ransomware attacks have not been confident in the integrity of their data backups and have paid the ransom to obtain the decryption key, and others have paid the ransom and obtained a key which did not decrypt the files. Both situations can be very expensive to your business.

How does ransomware gain entry to my network?

The purveyors of ransomware can inject the malware into seemingly innocuous documents, like invoices or estimates, or they can use internet links in an email to direct a user to a site that automatically starts a download and installation of the program. Documents containing macros provide an excellent opportunity to run the installer package without requiring direct interaction from the user. Some forms of ransomware take advantage of unpatched and unsolved vulnerabilities in the configuration of your devices and systems.

What are the most effective steps I can take to protect my business?

1. Deploy updates and patches in a timely manner. The operating system and application patches should be tested as soon as they are available, and applied to your systems as soon as your team can verify compatibility. Patching vulnerabilities will reduce the number of ways ransomware can execute itself in your systems.

2. Ensure that your technology team has an effective backup and restore process, and that they are able to fully test a restore from backup. Having a backup and restore procedure that you have validated will allow you to return your business to normal without paying an exorbitant ransom, still running the risk of not being able to decrypt the data.

3. Know the devices on your network and implement the same security procedures on any employee-owned devices touching your network that you have implemented on your business-owned devices. Maintain separate profiles on mobile devices, if possible, allowing only the business-facing profiles access to your network.

4. Disable SMB v1 on all devices on your network. SMB v1 is an outdated protocol and was the window that the creators of WannaCryRansomware exploited a few years ago. There may be some favorite processes that fail with the disabling of this protocol. If this is the case, you will need to perform a risk assessment against the cost you will incur with a ransomware attack.

5. Ensure that all your employees understand the hazards of active content like macros, and that they exercise caution in using them. Train them as well not to execute macros on documents received from external sources. Common documents like invoices do not need macros enabled, and in fact, such documents should be saved without active content before sending. If necessary, ask your vendors to send only documents without active content. Ensure as well that the appropriate teams understand the billing and payment cycles, and that they become suspicious of out-of-cycle documents and requests.

6. Train employees to be extremely cautious about clicking on links in emails. Messages with links unrelated to your line of business, messages themselves unrelated to your line of business, and messages with spelling and grammar errors should raise suspicions. Your employees should also not use links in emails to connect to websites of business contacts unless the employees have verified with the sender that the link is expected, and an explanation of the necessity of the link. When calling contacts to verify the validity of links in emails, employees should use their own contact source, such as a corporate address book, rather than a phone number in the message that contains the link. A message with a malicious link may also contain a compromised phone number.

Can I recover from a ransomware attack?

Possibly, but it will not be a pleasant process. Your best chance of recovery is a restore from a backup, and you will lose the records of transactions that occurred since the last iteration of your backup process. As explained above, paying the ransom may or may not produce a working decryption key. Attackers inexperienced in encryption and decryption have provided decryption keys which failed to release the files back to the owner. Prevention is going to serve you much better than hoping for a recovery, so take the necessary steps now to reduce the likelihood of infection.

How Will Technology Change Healthcare In 2019?

Technology In Healthcare

Technology In Healthcare

Technology is transforming virtually every industry, and healthcare is no exception. Digital applications are becoming more readily available for patients and providers alike. Analytics and similar tools are allowing doctors to provide more accurate diagnoses and targeted treatments, while researchers can better predict health trends. Here are some of the most notable ways technology is changing the face of healthcare in 2019:

Patients Are Empowered to Make Informed Decisions

Portals and other digital tools enable patients to better understand diagnoses and treatments, empowering them to take an active role in their care. Since information can be made available in real-time, patients can easily stay up-to-date on their health status and make informed decisions when seeking medical services. Consumers have long been using the Internet to obtain medical information– researching symptoms, treatments, and their own health conditions– and that trend is only expected to accelerate.

Health Monitoring Devices Are More Widely-Available

While we’re on the topic of patient empowerment, it’s worth noting that, in addition to portals, patients can take control of their health with a variety of portable products, such as cardiac monitoring devices. (Remote monitoring is especially helpful for those with pacemakers). These items either provide patients with useful data about their health or allow them to take proactive steps to promote wellness. These are just a few of the products that are rapidly taking over the market:

  • portable gluten testers
  • wireless blood pressure monitors
  • headbands that measure brain activity and assist with stress-management
  • smart forks that help you avoid eating too fast
  • handheld ultrasound devices
  • fitness trackers (armbands, watches, and other wearables)

You can probably think of other items to add to the list. As technology continues to evolve, the coming years will likely see the introduction of many new-and-improved products to help consumers optimize their health.

Of course, smartphones play a critical role in empowering patients, too. From tracking heart rates to measuring sleep quality, there’s an app for that.

By making it easier for patients to keep tabs on their health, these devices can reduce the likelihood of hospitalizations and the frequency of doctor visits, minimizing costs and stress. With remote monitoring, clinicians can detect health problems early and intervene before they become more serious or other complications arise.

Communication Is More Effective

Multiple modes of communication, such as email, text, and chat, allow practitioners and patients to connect when it’s convenient. Patient portals and similar platforms permit them to share information without violating HIPAA regulations. As long as providers follow proper security protocols, they can ensure that sensitive data is protected from would-be hackers. Furthermore, automated systems help patients stay on top of their health by sending them reminders about follow-up visits or procedures.

Healthcare facilities– especially hospitals– are reaching wider audiences than ever before through another well-known platform: social media. Healthcare providers are capitalizing on the power of these sites to answer health-related questions, advertise their services, and educate the community about potential health risks. While this practice began on college campuses, it has quickly gained momentum among the general population. Even senior citizens are using Facebook to chat with doctors and nurses and read articles about new diagnostic procedures and treatments.

Digital channels are also improving doctors’ ability to collaborate with colleagues across the globe. This practice– telemedicine– is proving especially indispensable to isolated or underserved communities; doctors can consult with medical experts from around the world without traveling long distances or playing phone tag. They’re not limited to relying only on the resources within their immediate area.

Diagnostic Procedures Are More Accurate

Digital tools are improving the accuracy of diagnoses, eliminating the need for procedures that do not always yield consistent results. Technology has improved nearly every aspect of direct care-delivery: testing, physical exams, health evaluations, and more. Practitioners regularly use tablets to take patient histories and send prescriptions to the pharmacy. Big data is revolutionizing how health information is managed. Electronic databases make it easier to display and retrieve data, streamline workflows, and arrive at diagnoses in a timely manner.

Artificial Intelligence Is Becoming More Intelligent

Most of us associate artificial intelligence (AI) with images of house-cleaning robots or apps that let us use our smartphones to set the thermostat or turn on the lights. AI is improving the efficiency of health services too, performing routine tasks such as transporting supplies or sending out alerts when patients are in distress.

Technology Can Keep Pandemics from Panning Out

Epidemics such as the Ebola outbreak that swept through Africa a few years ago are more difficult to contain when communication is stymied by weak digital infrastructure. It’s worth noting that incidents of death and illness were highest in countries that lacked reliable Internet access, making it more difficult for governments to warn citizens and establish protocols for containing the contagion. Researchers are capitalizing on the use of databases to predict outbreaks and take appropriate preventative measures.

Additionally, new technologies are improving research techniques and data-integrity, providing valuable insight toward developing new treatments and other interventions to minimize the toll of diseases on vulnerable populations. For instance, the aforementioned epidemic created an impetus for scientists to expedite their research endeavors to identify other animal-borne pathogens– and take steps to combat them before they pose a significant threat to humans.

Technology is revolutionizing the healthcare experience for practitioners and patients alike. While some practices have been slow to adopt new innovations, the benefits of going digital outweigh any disadvantages, leading even skeptics to begin buying in. New advancements in medical technology will prove invaluable as large segments of the US population reach their golden years, increasing the need for clinical services. The frenetic pace at which the digital world is evolving will have far-reaching implications for healthcare not only in 2019, but for years to come.

Industry Buzzterm: What Is A vCIO?

vCIO

vCIO

Managed Service Providers globally have introduced a new buzzword into their service vocabulary….Introducing, the vCIO!

What is a vCIO?

How Does A vCIO Benefit Your Company?

Technology can be so tantalizing, especially for a small-to-midsized business. The promise is there. So is the hype. With the right Information Technology (IT), you can streamline your business processes and make your employees more productive. You can analyze your business data and gain insights that will propel your business to growth and greater profitability. Except… It takes expertise and resources to reap these benefits. Big companies have a Chief Information Officer (CIO) who can lead efforts to make technology drive business results. Now, a small business can have the same advantages by means of a vCIO, a virtual CIO.

What is a vCIO?

The term “vCIO” describes the outsourcing of CIO functions to an experienced IT services firm. The firm provides the Chief Information Officer’s functions on an as-needed basis. This puts big company-level CIO expertise in the hands of a smaller company on an affordable basis. A vCIO, or outsourced CIO, is a good option for a business that needs a CIO but lacks the resources for a full-time executive in this role.

What does a Virtual CIO do for you?

To understand what a vCIO does, it’s first necessary to grasp what a full-time CIO does. This varies by company, of course, but there are several standard aspects of the job in any organization. The CIO’s main job is to be in charge of technology strategy. This means defining and executing plans for IT that align with overall business strategy.

For example, if a company wants to compete more effectively in the market through better customer engagement, the CIO will be responsible for fulfilling the technological aspects of that strategic goal. It might mean investing in customer-facing technologies like mobile apps or online user experiences that outpace the competition.

From this responsibility for technology strategy flows most of the CIO’s other mandates. With the goal of realizing technology strategy, the CIO is tasked with selecting IT vendors, specifying the technology “stack” that will implement the strategy and so forth. Imagine, for instance, that a strategic goal of improving customer service requires letting customers track their orders online. This might involve connecting the e-commerce system with third-party shipping APIs.

What is the best way to execute this technological requirement? In a large organization, the CIO will oversee the team that plans and executes the API integration project. The CIO’s job is to make sure the integration project is economically and technically sound. The API integration should use the same software stack (e.g. Microsoft Visual Studio/Windows Server) that is standard for the company. That way, the project won’t accidentally add complexity and unforeseen maintenance costs in the future.

On a day-to-day basis, CIOs manage IT resources and budgets. What needs to be replaced, and when? What are the hardware standards that will keep the business operating and keep costs down, and so forth? They issue recommendations on hardware, software and infrastructure expenditures. They engage with other stakeholders to define and enforce security and compliance policies. They own the tech roadmap.

The vCIO does all of this, but without working for your business full-time. This arrangement works partly because a smaller company does not usually have the same depth of need for a CIO as a big business. The CIO role might take a few hours a week to fulfill at a small company. It’s still a critical role, one which will negatively affect the business if it’s neglected, but it doesn’t require a full-time executive.

The need for a vCIO in a small-to-midsized organization

In some ways, smaller companies actually have a greater need for a CIO than big corporations. In a large organization, there is usually enough technological expertise among senior IT managers to work through strategic decisions collectively. This may not be optimal, but a group of seasoned IT executives can assess vendors and solutions and build alignment with business strategy. In a small company, this is a true rarity.

A small company IT department is designed for efficiency. It’s typically tasked with keeping IT systems operating and troubleshooting problems that arise. Generally, and this is not a knock on IT departments, they lack the experience to devise and implement large, complex technology initiatives. You might have superb people on staff who know how to keep email and PCs running well, but they may not have the knowledge or skills to assess an API integration vendor pitch.

The CIO deficit in a smaller organization creates business risk. Without a knowledgeable IT leader, a company might commit to a technology that is more expensive to maintain than it first appears. Unforeseen costs might include ongoing software maintenance tasks that must be performed by outside resources, patching, license and maintenance fees and so forth.

vCIO benefits

In addition to the cost savings inherent in not having to hire a six-figure executive on a full-time basis, the vCIO can be objective about your business and its IT needs. They have a valuable outsider’s perspective. They aren’t committed to defending earlier IT investment decisions. They also bring potentially new ideas into the business-IT dialogue. And, hopefully, they do so in a reasoned way.

The IT world offers some exciting ideas for business managers. Data analytics, cloud computing and process automation are just a few examples. A knowledgeable outsider will be able to lead a discussion about why these types of solutions will or will not be a good fit for the company. The vCIO can help the business assess the potential benefit and weigh it against the cost and risks associated with pursuing a solution.

Engaging with a vCIO

You have a number of options for engaging with a vCIO. Some are available on an individual, contract-basis. A more preferable approach might be to receive the services of a vCIO as part of an overall IT services agreement. The same vendor that manages your network and infrastructure will be well-positioned to offer vCIO services as part of an IT service package.

Building on Success: The Indispensable Role of Your Quality Construction IT Services Partner

Construction Computer Support

Construction Computer Support

It is not an overstatement to note that today’s successful construction companies depend on their IT systems as much as they do any hammers and nails. Successful contractors find integrating the role of a quality IT partner critical to meeting budgets and deadlines while maintaining profitability.

It’s All About the Right Information at the Right Time

Information Technology is a catchall term for a combination of powerful and complex computer-based resources. However, just like an important tool, you don’t want to worry about how IT works or even why. You just want to be confident that your IT partner is managing and providing you with the information you need in the most efficient, timely, and cost-effective manner possible.

Rather than creating management challenges, the quality IT partner will help you prevent problems and assist in solving those that do arise. This is critical to you as the one that is responsible for getting the job done, especially in today’s demanding environment.

There is hardly any aspect of the construction process that well-deployed and effectively managed IT cannot enhance. This includes such disparate areas as:

  • Bidding and proposals
  • Project scheduling and process management
  • Compliance and regulatory requirements
  • Inventory management
  • Communications among all participants

Each of these areas of the construction continuum require the proper IT approach. Moreover, these individual components must integrate into a useful whole that provides needed information and controls from the conception of the project to its conclusion.

No Longer an Optional Tool

The right IT partner will help design, install, maintain and manage the proper information technology infrastructure. While these capabilities can provide competitive advantages when properly utilized, they are also essential basics in the hyper-competitive construction industry. Just as your competitors can buy the same tools you can access, it is how they are put to work that makes the difference.

As the use of the Internet and computing migrates into all aspects of the construction industry, you find everyone from customers to vendors to regulators expecting companies to utilize efficient IT methods and resources. It is increasingly impossible to meet those expectations without the right IT partner to handle the many intricacies involved.

Managing the Ongoing Evolution

You know the construction industry is constantly changing and introducing new materials, methods, and processes. There is a similar reality in the IT world, and the changes often come even faster. Whether it is tracking the latest software updates or moving information between local computing devices and the cloud, IT is managed in an ever-changing environment.

Achieving the right partnership will allow the right division of tasks and responsibilities so the IT process facilitates every component of the job to be accomplished. When properly implemented this infrastructure will be largely transparent other than the results it provides. The characteristics of any solution offered by a competent IT partner will include:

  • Detailed and customizable real-time reports and information flow
  • Full access to systems onsite and remotely on multiple devices
  • Integration of data between different applications
  • Flexibility to modify requirements to reflect changed orders and schedule modifications
  • Comprehensive analysis, estimates and updates to facilitate management decision-making.

Managing a Dynamic Process

There is no one-time solution to the properly designed and functioning IT equation. Managing and monitoring the flow of data and inputs across multiple applications requires a robust and dynamic approach to the challenge. Your IT partner must provide a scalable solution that works in the pre-construction process as well as in the midst of the most intense construction phases.

Achieving this result requires the melding of trained and experienced personnel with the right hardware, software and networking resources. It is that competence you find in your best subcontractors. Even more, this partner is not just handling the one component a subcontractor might be tasked to accomplish. Rather, they are in the seat with you coordinating both the overview and the infinite details involved in the entire project.

There was a time just a few years past when the IT component of the construction industry could end up being somewhat of a hindrance. It often seemed that the computer made your job tougher rather than being a productive assistant.

With a qualified IT partner, that is certainly a reality that is in the past. If you understand the importance of the right partner, you won’t settle for one that can’t deliver the total solution. Once that carefully selected partner is on board and working alongside you, you’ll never tackle another project without them.

Selecting The Right Business VoIP Provider [2019 Guide]

Business Phone Systems

Business Phone Systems

To experience growth and stay relevant in their given industries, companies rely on productivity-enhancing and cost-effective communication systems that provide a robust, efficient platform for critical interactions, both internal and external.

Voice over Internet Protocol (VoIP) systems have risen to the forefront as a viable communication solution for businesses of all sizes, replacing traditional telephone systems and securing a spot as a standard for communication in the professional world. While VoIP systems require an Internet connection to operate, they can support high-quality long-distance calls while offering a number of other modern features, including integrated video conferencing, file sharing, and call recording.

Selecting a suitable service provider to set up and manage your VoIP system is an important decision, but if you know what you are looking for, the process becomes significantly simpler. We have organized the following list of criteria to guide you in picking the best VoIP service provider for your company.

Affordable Cost

Cost is an important factor in the decision-making process. Different vendors will have varying prices for the system hardware and installation, as well as a range of rates for managing, updating and maintaining a VoIP system. You should take stock of your company’s communication needs, as well as the budget you have available for meeting them. Keep in mind that with a quality service provider, you should not have to pay hidden service fees or extra chargers for standard features, including conference bridges, voicemail boxes, auto attendants, custom messages, and ring groups. Avoid VoIP providers who are not upfront about the costs associated with their technology and services.

Robust Cyber Security

Advanced security features should be a given. Even small- and medium-sized businesses can be targets of cyber attacks, including malware, phishing scams, and other viruses, which threaten their infrastructure and information. According to the U.S. Computer Emergency Readiness Team, VoIP, which relies on an Internet connection, “may be vulnerable to many of the same problems that face your computer and even some that are specific to VoIP technology.” Your VoIP service provider should be well aware of risks associated with this type of technology and ensure you have access to cutting-edge security features that protect your organization from cyber threats.

Call Management

A basic feature offered by top-notch VoIP providers is call management. This can include a number of functions that benefit your business, including call waiting for service, caller ID, call forwarding, voicemail, dial-in directories, call blocking, and other basic calling options. When shopping around for a provider, find out what call management options they offer that will be convenient and helpful for your organization’s employees.

Reliable Support

You should be able to access and use your VoIP system for business operations consistently and without delay. That is why a quality VoIP provider will emphasize a high level of uptime and round-the-clock technical support, which includes monitoring and maintenance. You should be able to reach your provider via email, phone call, or live chat when you need assistance with your service or encounter technical difficulties. Another important aspect of customer support is a plan for disaster recovery, in case you experience a system failure or other emergency. VoIP providers should have intensive protocols in place to quickly address the issue and get you back on track without losing valuable time or important information.

Intricate Integration

Any cost-worthy VoIP service should offer organizations more than the simple ability to make calls. To enhance productivity and efficiency, you should be able to integrate company smartphones, since many people rely on their mobile devices to do business outside of the office. You also should pick a VoIP provider that allows you to integrate your system with existing third-party processes, applications and extensions, including Google Drive, Dropbox, Salesforce, Desk.com, and office software, among others. Without easy integration, you could face the resource-intensive task of transferring business data or creating new databases.

Unified Communication

Unified communication is another industry standard that you should keep in mind when searching for the right VoIP solution for your company. Unified communication is a feature that allows you to integrate a variety of communication methods into a single system, mitigating your need to open separate apps or windows. Some of the communication methods you will likely want to access from your unified platform include email, video call, voicemail, and conference calls.

Local Area Codes and E911

You do not want clients, business partners, or other individuals to incur a charge when they call you on a traditional telephone system. That means you could look for a VoIP system that supports local area codes. Additionally, your provider should offer enhanced 911 (or e911) service, which enables emergency service dispatchers to automatically locate a caller’s geographic location.

Sound Quality

In this day and age, there is no excuse for subpar audio when using modern technology for business communications. Quality VoIP providers should be able to ensure high sound quality, as well as a guarantee to address technical problems if you experience choppy audio.

Obviously, there are numerous factors to consider when you are searching for the best VoIP system and service provider for your organization. Working alongside experienced IT consultants or information service providers can help you select an option that fits well with your existing communication systems, serves your professional needs, and stays within budget.

A Look At The 2018 Cybercrime Stats

2018 Cybercrime Stats

2018 Cybercrime Stats

What Is the Big Picture in Terms of Cybercrime in 2018?

The past few years have revealed trends that show us cybercrime won’t just go away. The following stats put the breadth of the threat into perspective:

  • Cybercrime was the 2nd largest crime in terms of the number of incidents reported.
  • Cybercrime accounts for more than half all criminal activity in the U.K.
  • An attacker is present in a network an average of 146 days before getting caught. That’s enough time to get what they need without getting caught.

What Did Cybercrime Cost in 2018?

With technology continuing to advance in favor of cybercrime, 2019 is likely to see its share of hacking headlines. The Cyber Security Breaches Survey revealed that 43 percent of businesses experienced some kind of cybersecurity breach in 2018. California alone lost $214 million to cybercriminals.

VPNs are one way people try to protect their online privacy, but user behavior continues to counteract the best firewalls and security strategies. For example, despite knowing the risks of clicking an unknown link or email, many people do so anyway.

What is a Cybercrime Platform?

The cybercrime economy mimics the global economy’s shift towards a platform model. This mirrors the legitimate shift to social media, Amazon and Google. Platforms connect retailers and consumers and give people a place to interact in other ways. Unfortunately, this has given unscrupulous people an opportunity to get to know how these systems work and use that knowledge to commit cybercrimes.

What Is the Most Common File Format Used By Cyber Criminals?

Hackers love Microsoft Office file extensions. They know people trust them and are more likely to click on them. Emails are the most common way that cybercriminals defraud their victims, and they do so by sending files with familiar extensions to mask malware and spyware. People use emails every day for all kinds of communications, including very sensitive information. Unfortunately, it’s relatively easy for bad actors to send you an email that opens you up to viruses, identity theft and other risks.

How Are Cyber Criminals Making Money Off Your Computing Power?

Some hackers aren’t interested in your personal information or causing havoc with your sensitive files. Believe it or not, some cyber criminals break into your computer to steal your computing power. They may use these unauthorized resources to mine cryptocurrencies, for example.

One of the latest threats involves the use of your computer or other devices for bitcoin mining. Symantec has reported an increase of 8,500 percent in the number of people caught coin-mining. This indicates that there are hackers dedicated to accessing and using a victim’s computer resources in lieu of stealing personal data.

How Much Money Can a Cybercriminals Make?

The short answer to this is that an individual with the right skills can earn far more via cybercrime than most legitimate lines of work. Individuals can earn about half a million dollar a year by selling stolen data. There are several levels involved, however. Low-level hackers may be happy with petty crimes that put extra cash in their pocket. Highly specialized hackers can make millions working alone or as a team. Generally, though, hackers make about 15 percent more than those in traditional crime brackets. High earners bring home about$167,000 a month, mid-level earners rake in $75,000 a month and at the low end of the spectrum, petty cybercriminals make $3,500 a month. For instance, someone managing multiple card data forums can bring in millions each month.

How Do Hackers Use Existing Platforms to Make Money?

Just turn on the news any given night and you can find stories on data breaches, the bread and butter of cyber thieves. Personal data can be sold as is or used to created bank accounts and apply for credit cards, which are sold for small or large fortunes. Theft isn’t the only crime possible. Major platforms are targeted for the myriad of data they collect. Even Facebook is not immune. It was in the news for a significant data leak in 2018. Yahoo also had a major breach that compromised 3 billion user profiles. Cybercriminals aren’t shy about going after these giants, so it’s up to you to increase your vigilance at home and at the office.

Are Smart Homes Vulnerable to Cyber Attacks?

Smart home devices usually connect to your home network from an outside network. If your router is adequated protected, you’re opening the front door of your home for cybercriminals. With smart home devices becoming more common, savvy criminals are learning to take advantage of their vulnerabilities.

How Construction Companies Can Benefit From Managed IT Services

Construction IT Services

Construction IT Services

Construction companies have specific IT requirements. Time is money in any business, but that’s especially true in the construction industry. You need excellent communication and coordination between management and workers and the ability to oversee contractors and order materials quickly. For that, you need top construction planning software and your company needs a comprehensive IT strategy. Just as you subcontract out certain work in your construction projects because it’s more efficient, your IT needs are usually better served by those who can deliver at less cost and more efficacy.

State-of-the-Art Technology

A managed service provider (MSP) offers clients access to state-of-the-art technology. There is no need for constant tech upgrading and the additional cost on the part of your company when you use managed IT. When your company goes the managed IT route, you also won’t experience any unpleasant surprises when it comes to charges. You pay a fixed fee every month, according to your contract. You can also design the right type of IT management for your construction company, as the MSP does not deal with companies on a one-size-fits-all basis when it comes to IT.

State-of-the-Art Skills

When hiring an MSP, you are hiring expertise. You know that, but you may not realize that circumstances may arise in which your business requires an IT specialist in a particular field. If you rely on an in-house team in which no one has this specific skill, you must either pay for training or hire an expert for this certain task. That’s not an issue with managed IT, as you are dealing with a team with state-of-the-art skills that can deal with your company’s problems as needed. Managed IT offers advantages not only over the costs of an in-house team but means you don’t have to outsource to another entity when problems arise.

Security Issues

Your construction company needs top IT support for security. It’s likely that you have an in-house team  especially one consisting of just a few employees  that does not have the expertise to deal with the latest threats. That means your company’s computer systems are far more vulnerable than you might think. Just as your construction business involves core competencies, security is a core competency of any managed IT company.

How an Outside IT Firm Saves Money

It makes no sense for a smaller construction company to hire an in-house IT expert, but it really does not make sense for most larger construction companies, either. When you have in-house IT professionals, you must pay salaries and benefits. When you hire an outside IT firm to provide services, those items are not your concern. A third party IT provider is probably more aware of the latest viruses, malware, cyber threats and other factors that can harm your system than an in-house team. For those providers, staying abreast of current threats is a vital part of their business. If your system is hacked or otherwise compromised, the outside firm is available 24/7. That means reduced downtime when a problem arises.

Even if you do have an in-house IT tech team, a third-party IT provider is not working on the same projects, and this frees up your employees to focus on your business needs and your bottom line rather than dealing with typical IT administrative tasks or outages. A third-party IT provider deals with troubleshooting, upgrades and new tech implementation, allowing your IT employees to concentrate on your construction projects.

With the money saved by outsourcing your IT requirements, you can direct those funds toward areas most needed by your company.

Company Expansion

Managed IT allows for easier company expansion, especially across state lines or nationally. Managed IT with a cloud strategy avoids many of the difficulties construction companies face if relying on their own technology when expanding. You no longer have to worry about primary office connectivity and loss of productivity due to a local power outage.

Peace of Mind

All sorts of factors affect your construction business and your bottom line. Whether it is a common situation such as materials delivery, the weather, permit delays or equipment failure, or the more exotic, such as discovering human remains or artifacts during digging, you know that complications occur on projects. With all that you must deal with on a daily basis, using a managed IT service for your construction company gives you peace of mind for that crucial aspect of your business.

The Risks Of Using Auto-Complete For Passwords

Autocomplete Passwords

Autocomplete Passwords

The auto-fill feature that makes it easy to enter in usernames and passwords on various websites may be putting your information at risk.

While auto-fill is a convenient way to keep track of the many combinations of letters, numbers and special characters you need to access sites, the feature is also being used by advertisers and hackers. That’s why many security experts are suggesting turning off the auto-complete feature in your web browser.

Password manager programs embedded in browsers are a simple way to get access to a password-protected website. The password manager auto-fills your details, giving you one-click access to account information meant to be kept private.

How Hackers Get Access

If hackers get access to a compromised website, they can put an invisible form on the site and easily collect users’ login information. If your browser automatically enters this information when it sees the appropriate boxes on a web form, it adds the info everywhere those boxes are found on a page, whether they’re seen by the user or not.

Because most web users use the same username and password for multiple sites, the theft of this information on just one website can expose your information on many others.

Not Just Hackers

It may come as a surprise to learn that hackers are not the only ones trying to use your login information. Some ad networks are using tracking scripts to grab email addresses stored in your password manager for auto-filling. That tech can be used to grab passwords too, whether stored on a browser or an independent password management site.

The ad networks are using the same technique as hackers — an invisible form that captures your credentials provided by the password manager. Here’s a helpful demo page that shows you how it works.

Ad networks are using this information not to hack your data, but to understand what sites you navigate to better target ads to you. And while they claim to only be grabbing email addresses, the potential for further abuse is there.

What Computer Users Can Do

Password managers by themselves are still useful tools, especially given the number of codewords we need to go about daily web browsing. It’s the auto-fill mechanism that needs to be disabled. That’s simple to do.

On Chrome

  • Go to Settings
  • Search for Passwords and click on the Passwords arrow
  • Toggle the Auto Sign-In tab to the left (it should be grayed out not blue)
  • For more protection, you can stop Chrome from saving any passwords by toggling the Offer to save passwords to the left

On Firefox

  • Open Options
  • Click on Privacy & Security in the left-hand navigation
  • Click on History
  • Select Firefox will: Use custom settings for history
  • A new submenu will appear
  • Unclick on Remember search and form history
  • To fully disable saving any passwords, go to the Logins & Passwords section (just above History) and unclick Ask to save logins and passwords for websites

On Safari (Desktop)

  • Open the Preferences window
  • Click on the Auto-fill tab
  • Turn off all features related to usernames and passwords

On Safari (iOS)

  • Go to Settings
  • Scroll down to Passwords & Accounts and click on it
  • Toggle the AutoFill Passwords tab to the left

Disabling the auto-fill features means spending a little more time finding and entering usernames and passwords manually. However, these steps protect you from prying eyes looking to gain more information about you and your accounts.

14-yr-old Teen Who Discovered Eavesdropping Bug to Be Paid by Apple

Facetime bug fixed

Facetime bug fixed

Apple is yet to disclose how much it is going to reward a 14-year-old U.S. teenager for discovering a massive security breach on its FaceTime video call system. It is believed that part of the reward money will be set aside for his high school education fund.

On Thursday, Grant Thompson noticed the group FaceTime bug while on a video call with his friends. Apparently, they were discussing different strategies they could implement on Fortnite, a 3D video game which is widely popular among the teenage demographic.

Upon contacting Apple, necessary action was taken and the iOS 12.1.4 iPhone update was then released on Thursday. Prior to the discovery, an unknown security researcher noticed the presence of the FaceTime bug but was unwilling to come out with it, since Apple had not put a bounty on offer.

Missed Opportunity

Towards the end of January 2019, details of a suspicious bug on FaceTime emerged. A couple of users noticed suspicious activity on the widely used video call system among iPhone users.

Sometimes when they contacted friends and family, they could distinctly hear what was happening on the recipient’s end (regardless of whether they answered the call or not). Apple got word of the bug and immediately disabled the recently-launched group Facetime feature on iOS phones.

Earlier that same month, the teenager and his mother phoned the trillion-dollar company with a similar potential security threat. As expected, Apple considered the 14-year-old’s discovery a hoax and thought the boy was craving attention.

The problem was uncovered by Grant on one of his group FaceTime video calls. When Thompson’s plea was given a deaf ear, his mother, Michele Thompson stepped in and repeatedly reached out to Apple via social media and emails. For some reason, Apple was adamant to heed to the vulnerability in their FaceTime feature.

Ever since other users of the video call system came out with a similar bug issue, Apple has credited Grant, who hails from Catalina, Arizona, with this major finding. Grant’s name went viral hours after Apple released a software update to counter the bug’s detrimental effects.

About the Update

The iOS 12.1.4 is the latest update from Apple for all iPhone 5S phones, iPad Air devices and the 6th generation iPod Touch. A week ago, Apple disabled Group FaceTime when news about the bug emerged.

Apple noted in turn that it solved a similar unknown issue some time ago in FaceTime’s Live Photos feature. On Friday, Apple reported that it solved the major security flaw on its servers. It would also release an advanced software update to re-activate Group FaceTime.

iOS 12.1.4 release notes state that there was an existence of a logic issue in Group FaceTime. It was also emphasized that the bug was fixed with “improved state management”. On Thursday, as of 10 a.m., the system status page of the massive tech company noted that Group FaceTime’s restoration was successful.

iPhone users can update their gadgets by doing the following:

  • Open settings
  • Tap on ‘General’.
  • Select Software Update
  • Download the update

Once the download is complete, your iPhone will automatically install the new software.

Swift Security Measures

A representative for Apple had this to say in regards to the update and the reported bug: In regards to the bug that has noticeably established its presence in the FaceTime feature, a security audit has been conducted by our team. Additional updates have been made to not only the Group FaceTime app, but its Live Photos feature as a whole in a bid to enhance our security. This will go a long way in securing our customers who are yet to upgrade to the latest software.

The representative also revealed a major server upgrade to block older versions of macOS and iOS from making use of FaceTime’s Live Photos feature.

For a global company that is keen on preserving users’ personal information, the bug was a huge misstep. Tim Cook, Apple’s CEO, has often advocated for increased regulation of privacy. In the recent past, he has subtly called out companies that utilize their customer’s vital data for the creation of personalized ads. In this case, it’s safe to say that Apple is not so perfect either.

Apple’s bug bounty program

Apple missed a massive opportunity to solve the FaceTime bug problem soon enough. Based on reports from The Wall Street Journal, as early as the start of January, Apple received warnings from a concerned teen but decided to do nothing about it.

Fortunately enough, before the issue escalated to something even more serious, more and more users noticed the flaw and issued a public outcry to the company.

Apple has offered its sincerest apologies to the teen and his family and is yet to fully reward them for their vocal assistance on the bug issue. The company is not willing to share the exact amount they will pay, but it will be substantial enough to see Grant through high school, according to a report by Reuters.

In regards to this incident, Apple developed the ‘bug bounty program’ in late 2016. In most cases, researchers can receive more than a hundred thousand dollars for reporting bugs early enough. One of the first people to receive substantial compensation from the program was 19-year old Luca Todesco.

In that same year, Facebook followed suit and rewarded a 10-year-old Finnish youngster a whopping $10,000 in bug bounty. The boy allegedly figured out how to delete anonymous users’ comments from all Instagram servers.

Aside from Grant Thompson, a 27-year-old software developer from Texas by the name of Daven Morris was also credited. Unlike Grant, Mr. Morris reported the problem several days after it was already made known.

Either way, Apple rewarded the young man for noticing the problem soon enough.

Why Local Companies Need To Hire A Local Cybersecurity Specialist

Cyber Security Specialists

Cyber Security Specialists

Cybersecurity threats have shown no signs of slowing down, and small and mid-sized organizations are expected to be more heavily targeted going forward. Although splashy headlines about Fortune 500 companies suffering breaches may lead some business leaders to think that hackers are after big corporations, cybercriminals are just as likely to steal data or infect your system with ransomware.

It’s important to keep in mind that these nefarious people are nothing short of petty crooks, and they look for systems that can be breached at every level. That’s why it’s in every business’s best interest to have a high-caliber cybersecurity specialist in place.

If you own or operate a local small or mid-sized outfit, you may be mulling over the cost-to-benefit ratio of outsourcing your cybersecurity defenses. Consider these key reasons why outsourcing to a locally-based cybersecurity specialist makes sense.

Hiring A Talented, Full-Time Expert Proves Difficult

There is a school of thought in business that having your own team in place would be more beneficial than outsourcing. The arguments for that position include having control over work-hours, in-house supervision, and the ability to review performance. The clincher is often that decision-makers know the person managing the tasks.

This old school thinking is often tried-and-true when hiring for profit-driving positions. It’s difficult to imagine outsourcing a sales team or other critical positions, but cybersecurity is not necessarily an old school job. It remains highly unlikely that a small or mid-sized organization has a supervisor in place to train cybersecurity specialists like they would a salesperson or other full-time posts.

A cybersecurity expert has years of education and training under their belt. They also are tasked with keeping up-to-date on the latest hacker methodologies and tools. It’s just impractical to have an in-house professional stay abreast of the fast-changing threats and keep your systems secure. Even if your company invested heavily in a full-time cybersecurity specialist, in all likelihood, they would be wooed away by other opportunities resulting in turnover.

The difficulties associated with filling a cybersecurity position and keeping that person does not make good business sense. It’s far better to outsource the cyber defense work to a local company staffed by experts. Why pay for a full-time person with benefits when you can contract with a local expert?

Benefit From Real-Time Industry Intel

Along with keeping a stable expert to protect your systems, local cybersecurity outfits are tasked with keeping tabs on real-time cyber attack methods. Outsourcing your technology and data protection to a cybersecurity specialist allows small and mid-sized organizations to have a critical risk assessment performed by a consultant that has hands-on experience.

Cybersecurity experts offer business leaders an opportunity to protect and defend critical data and communications in ways that might not occur to even the best in-house IT staff member. Enhanced knowledge and training can help identify cracks in your cyber defenses, inconsistencies in the password or login protocols, and advise you about forward-thinking employee policies.

It is not uncommon for hackers to target employee email and devices as a way to infiltrate a company’s data and personnel files. Given the fact that the methods hackers use change quickly, it’s imperative to an organization’s survival that a vigilant line of cybersecurity defense remains in place. Working with a local company that specializes in cybersecurity brings expertise to the table many outfits might not be able to afford otherwise.

BYOD Is Becoming Commonplace

The line between employees using company devices and personal ones has increasingly been blurred. Millennials tend to be of a mind that their device is just as, if not more suitable for professional tasks. In many cases, that probably holds true.

This new era of “Bring Your Own Device” poses a more significant challenge to organizations that merely have team members on fixed in-house desktops. These days, valuable staff members prefer to use their own mobile device, laptop and work from home options. This emerging tech reality inherently increases potential entry points for cybercriminals. In the BYOD business world, cybersecurity requires employees to be more educated about protocols and have a working knowledge of how and why they are being implemented and routinely changed.

Hackers are not necessarily working night and day to skip off with a big criminal payday. They are more prone to identify outfits with poor or low-level defenses. While cybercrime profit can be gained by breaching a major corporation with a strong defense, it may be a lot easier and more lucrative to knock off small and mid-sized organizations that are ripe for the picking. Outsourcing to a specialist can prevent you from becoming the low hanging fruit.

Data Breaches And Lawsuits

Captains of industry often think of cybersecurity as a way to protect their trade secrets, critical data and avoid costly work stoppages. While all of those ideas have merit, there’s another level of cybersecurity that CEOs and other decision-makers do ordinarily understand. You could face civil litigation if a hacker breaches your system.

That idea seems incredibly counterintuitive. Why would you — the victim — be sued? The simple reality is that businesses use technology for company-to-company communications and file transfers on a regular basis. When one system suffers a breach, access to others in the network may become available to the cybercriminal.

Just as your organization is responsible for bringing a safe product to market or shoveling snow off your doorstep, you could be held liable for not adequately securing critical data and access. Along with your business reputation taking a significant hit, previous clients and associates may be looking to recoup their losses from you. Civil litigation can prove costly unless you have taken industry standard measures to protect your system.

Hire A Local Expert Cybersecurity Specialist

Cyber attacks are an ongoing reality of living and working in the technology era. Organizations of all sizes and sectors are routinely tested by hackers to see if their cybersecurity defenses can withstand an assault. Cybercriminals are not going away any time soon and unless you want to risk shuttering, it’s time to contract with a cybersecurity specialist to protect your vital business interests.