5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber Security Training

Cyber Security Training

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.”

In other words, they require a login, personal access codes, or network access through malware to initialize their breach. Unfortunately, a recent report released by Verizon has concluded that 93% of the time, a cyber attacker’s “in” comes to them in the form of a social engineering attack on your employees.

The only way to prevent such breaches in your security is with proper cybersecurity training.

What is a social engineering attack?

Social engineering attacks are frankly less high-tech than traditional cyber attacks by highly knowledgeable tech criminals. In other words, they don’t require the extensive knowledge and tools needed to directly hack a highly protected computer system out of nowhere.

Social engineering attacks are more like street scams — only they’re usually done online or sometimes, over the phone. These scams use human psychology to fool individuals into willingly giving up sensitive information. In the case of your business, the targets are your employees.

There are several types of these attacks, including “phishing” and “pretexting,” which are quite similar and often go hand-in-hand. Phishing emails, however, remain the most common type of social engineering scam.

What are phishing emails?

In short, a phishing scam might be an email sent to the employees of your company that looks legitimate. It might (appear to) be from the employee’s bank, for example. It might request that your employee “click here” and login to (what looks like) the bank website so that the bank can “update your information” or “confirm your identity.”

A phishing email might also promise something to the recipient: “Here’s your free 50% off coupon! Click here!” or use a so-called emergency to illicit fear: “Someone has hacked your account. Click here to get it back.”

If your employee does indeed click on the malicious link of a phishing email, they will likely be taken to a blank or uninteresting page. In the meantime, however, the link click will have initiated the installation of malware onto the employee’s computer. This malware then enables the hacker to obtain sensitive information or disrupt or damage your company’s data.

How can company’s prevent phishing scams?

The reputational implications of any type of security breach — even one that doesn’t actually corrupt or steal your data or funds — can be enormous. Of course, it goes without saying that if you are caught in the crosshairs of a data ransom or cyber theft, the financial implications will be equally devastating.

As we’ve learned from the Verizon report, most security breaches are linked with phishing. Therefore, cybersecurity training for your employees is the best preventive solution you have for stopping security breaches before they start.

Employee training is not expensive, yet it is highly effective. Your employees should learn the following throughout their ongoing training:

  • How to identify a range of phishing and pretexting scams
  • How to proceed should they find an email, phone call, or social request suspicious
  • Your company’s strict policies and procedures for communication (for example, “We would never send emails requesting personal information from our employees as this would only be done in person.”)
  • Notice of increased risks for phishing scams around the holidays
  • Notice of the most recent and common scams currently trending

Cybersecurity training should be frequent and come at regular intervals throughout the year as attack strategies often come randomly in spurts and habitually change tactics.

While cybersecurity training is your best line of defense when it comes to phishing and security breaches, it’s also important to hire a reputable IT managed service provider (MSP) to handle your network and security. Your MSP should have experience and broad skill in protecting their clients from network breaches. Contact qualified MSPs in your area today to learn more about protecting your business from cyber attacks.

Here’s What You Need to Know About SD-WAN Technology

SDWAN

SDWAN

Moving from hardware solutions to software solutions isn’t a new concept for technology professionals, but network infrastructure has traditionally been a hardware-focused world even as applications move to the cloud. With the introduction of SD-WAN, or Software-Defined Wide Area Networks, IT professionals find themselves needing to retool their understanding of flexible networks and security. The MPLS (Multiprotocol Label Switching) has been in use for decades and is an extremely reliable — yet pricey — option for connectivity. Today’s SD-WAN provides the modern organization with the flexibility, scalability, security and efficiency needed to stay competitive in a fast-changing world.

The Basics of SD-WAN

At its most basic, you can think of SD-WAN as a way to tie together a variety of disparate networks as it is equally efficient with internal as well as external internet and even cloud-based applications. Instead of a more rigid WAN network, SD-WAN allows you to configure your network quickly from a centralized location, reducing the potential of human error that can bring your network to its knees and productivity to a screeching halt. Since all variables are driven by software that you configure, this structure can be quickly scaled and new remote locations added without requiring an intense investment in time and physical hardware or redesign.

How Do You Manage a Software-Defined Network?

A key value that you gain when you shift to an SD-WAN is the ability to make shifts locally as well as globally from a centralized dashboard. This makes changes swifter, but also helps protect your network by ensuring that universal security standards are applied at all locations equally. Using an SD-WAN configuration gives you the added benefit of consolidated troubleshooting and error reporting so you can quickly identify any trouble spots or network hotspots and shift resources as needed to add speed and efficiency to your network — something that users are sure to appreciate, even if they never realize it is happening.

What Are the Business Benefits of SD-WAN?

Upgrading your network from a more restrictive model to SD-WAN has a variety of benefits for your organization. While some of these gains are realized upfront, others will continue to add value to your organization over time.

  • The cost of connectivity using an SD-WAN is less expensive than traditional MPLS, an especially important point when you consider the bandwidth-heavy applications that business users require.
  • While there is a high level of expertise required for upfront configuration of a software-defined network, ongoing changes are less intensive and can potentially save you consulting fees in the future.
  • Your business users will appreciate that network availability is high because there is no need to take the network down to make configuration changes or upgrades.
  • Your technology team is able to define networking rules in the language of business — SLAs, security restraints, apps and users — making the network easier to understand and maintain in the future.
  • With Gartner noting that nearly 25% of businesses will utilize SD-WAN in 2019, there is a growing body of knowledge within the IT community that makes it easier to find resources to support your network infrastructure. The SD-WAN market is expected to grow to $1.3 billion by 2020.
  • Cloud-based applications continue to emerge in all sectors of business, and it can be challenging to protect these applications without a consolidated hub of security rules. SD-WAN allows everything from SaaS to traditional connections to be covered under the same business rules.
  • Branches and remote workers will appreciate having access to the same high quality of connection that they enjoy at the office, instead of having to deal with restrictive security procedures and application latency.

Instead of relying on the hardware to make decisions about connections speed and connections as with MPLS, SD-WAN makes agile decisions about the best way to connect users and the data or applications that they need to access.

What Type of Business Benefits from SD-WAN?

While there are many benefits of SD-WAN, there is one downside that can be a deal-breaker for certain organizations. Software-Defined WAN does provide extremely reliable uptime, but there can be more packet loss than you would see with a hardware-based network. In this case, you may want to consider a hybrid infrastructure that lets you gain the benefits of SD-WAN for the majority of your applications yet maintains any heavy applications that simply cannot abide packet loss on a more traditional MPLS. The majority of organizations are looking for ways to reduce their cost of connectivity and have very heavy use of their internet or intranet connections — making SD-WAN ideal. Businesses that are growing quickly or expanding into new regions are also likely to see gains from making the switch.

Many organizations are seeing that shifting to an SD-WAN model may help them future-proof their business by creating a flexible, scalable and secure model that can grow with their business. From the reduced cost of connections to the high availability environment, it’s clear that the conversation around SD-WAN will not be going away in technology groups around the world.

Small Business Guide to Protecting Critical Data

Small Business data protection guide

Small businesses technology and business leaders may feel as though their data is safe, but nothing could be further from the truth. According to SmallBizTrends.com, nearly 43% of phishing campaigns are targeted specifically at small businesses, a dramatic increase from 18% in 2011. Unfortunately, a 2017 report from Keeper Security also shows that the greatest cybersecurity threat to small businesses is their employees, with more than 54% of data breaches caused by employee or contractor negligence. Protecting the data within your organization is crucial, and the costs that are associated with a data breach continue to rise. Small businesses are increasingly focused on ways to mitigate the risk associated with data storage and use and that often starts with having a comprehensive backup and data recovery process in place. Here are some suggestions from industry leaders on how to protect your critical small business data from a cyber attack or other loss of access.

Importance of Immediate Data Access

Your business data is arguably your most important digital asset and one that is accessed hundreds or even thousands of times each day. Your employees utilize business data from a variety of systems to look up customer orders, create POs and track shipments while consumers are online placing orders and tracking status. Until you truly experience a major loss of data access, you may not realize the crippling effect that it would have on your organization’s operations.

Dangers of Data Loss

The first hit that you would feel with the loss of access to your data is in the productivity of your teams. Workflows grind to a halt as employees scramble to figure out how to perform their daily activities without access to the information that they take for granted. In many businesses, the data stored within your CRM or other data repository is driving your website, meaning ordering comes to a crashing halt should the secure connection to your data falter. Technology teams scramble to figure out where the problem lies, putting all other IT needs on the back burner for the foreseeable future. Plus, your team may need to call in consultants to help identify a breach and begin remediation as quickly as possible. If your team identifies that a breach has occurred, you may have to report to customers and stakeholders that sensitive data has been accessed by unauthorized parties. This can devolve into trust issues with your business, negative publicity and ongoing loss of revenue even while you’re attempting to return to operational readiness.

Data Consolidation Makes Protection Easier

Business data structures often grow organically, with additional databases and information structures added over time. While this may make sense as you’re bolting systems together, eventually it can become an unruly tangle of disparate systems that makes security and data integrity more challenging for your teams. A regular review of business systems with an eye towards data consolidation is a project well worth considering as your timeline permits. It’s often helpful to work with a trusted technology partner to ensure that you are considering all the options that are available for the security of your data both in transit and at rest.

Protecting Business-Critical Data

There are a variety of protections that you can put in place to maintain both access to your data as well as its integrity. Creating a robust backup and disaster recovery process allows your team to define the best case scenario for data backups — local only, short-term local with a regional cloud-based backup or cloud only. There are dozens of different ways you can configure your backup process, but what’s important is that it meets the needs of your business both now and in the future. When you have a documented backup and disaster recovery process in place and test it on a regular basis, you have added peace of mind that your small business data is protected and quickly accessible in the event of a cyberattack or natural disaster.

Assessing and Managing Cybersecurity Risks

As your business matures, it’s imperative that you create a review schedule to assess and manage your cybersecurity risks. This includes everything from monitoring employee activity logs to protecting passwords to educating staff members and contractors against tapping, clicking or interacting with suspicious website content or email attachments. Data encryption, email and web filters and the regular application of patches to your servers and applications can also help reduce the risk of a cyberattack on your small business. Sometimes, the challenge is as simple as assuring that you have redundancies on your power supply so you don’t run the risk of losing servers during a power surge. Other remediation issues can be much more intensive, but putting together a full list of options helps you understand and ultimately reduce the risk to your organization.

Your data is being bombarded with threats on all sides, and it’s up to your technology team to help protect your organization. Creating a robust backup and disaster recovery plan with a trusted technology partner can help you walk through an audit of all pertinent systems and quickly identify problems that can be resolved quickly and define a strategy for ongoing review and support. Without access to your data and business information systems, you can quickly find that your organization is grinding to a slow and painful halt.

How to Join a Microsoft Teams Meeting on the Go

Microsoft Teams

 

Microsoft Teams is a relatively new addition to Microsoft’s Office suite. Teams is a powerful collaboration tool. It’s kind of like Microsoft’s high-powered answer to Slack. Create teams for whatever purposes make sense in your business. Communicate and collaborate within those teams to get stuff done. The killer feature in Microsoft Teams is the ability to collaboratively use nearly any other component of the Office suite directly inside the Teams application.

Team Meetings

Whether your team is a mix of on-site and virtual or completely virtual, you still likely need to hold meetings from time to time. Microsoft Teams includes a Meetings function, allowing those that aren’t present to join in on an in-person meeting. All you need is a device running Teams in the conference room. If you’re the host, all you need to do is create the meeting in your Outlook Calendar like you normally do.

How to Join a Microsoft Teams Meeting on the Go

If you’re the one that needs to join the meeting from a distance, here’s what to do. Open your Teams app and click or tap on the Meetings tab. If your organization is using Outlook for its calendar functions, this tab will populate with the meetings you’ve been invited to. Look for the one you’re trying to join, and click the big “Join” button. This will launch a call, and you’ll see avatars or photos for the others who are joining the meeting.

Controlling Your Presence During the Meeting

Tap anywhere (or, on a computer, move your mouse) to bring up meeting controls. You can mute or unmute your device’s microphone, toggle video on or off, and adjust volume. In the upper right corner (on mobile) you may see a button for adding additional people to the meeting (if you have the rights). You’ll also see a button to view any chats associated with your Team or the meeting itself.

You or others can share files into the Teams meeting. Once displayed on your screen, you can pinch to zoom in. When you’re done viewing the file, close it out and return to your main meeting window (whether that’s a video or just an audio interface with avatars).

If You Don’t See the Join Button

If you don’t see a “Join” button, then you’re dealing with one of two problems. If you sometimes see them and sometimes don’t, then your meeting organizer likely isn’t creating the meeting properly. The organizer might need to experiment with creating the meeting within Teams rather than from Outlook.

If you never see the button, then your IT group likely has not implemented the Meetings function within Teams. Contact IT with a request to enable this feature.

Wrapping Up

You now know how to join a Teams meeting on the go, but there’s a lot more to Teams than that. For help navigating Teams or the rest of the Office suite, contact us today. We’re here to help!

Microsoft Teams

Enable Do Not Disturb on Your Android Device

Do Not Disturb Android

Do Not Disturb on Android can do more than you might expect. Here’s how to enable and customize Do Not Disturb on your Android device.  

Do Not Disturb AndroidToday’s quick tech blog explains how to enable Do Not Disturb on Android devices. We’ll also give a basic explanation of how to customize this feature, making it even more powerful. Note that terminology and locations vary on Android devices. If you don’t see exactly what I describe, look for something similar.

What Is Do Not Disturb on Android?

Do Not Disturb on Android does what you’d expect based on its name: when enabled in its default mode, it silences all notifications. It’s a good choice while you’re sleeping (or want to be), while you’re presenting at work or displaying content from your device, or while driving.

Default mode has its usefulness, of course, but sometimes it’s a little too…nuclear. You might want to cut down on the notification madness, but you still want to be alerted if your significant other (or boss, or VIP client) calls. This includes calls, texts, news alerts, and any other app notifications. Good news: Do Not Disturb can be customized, making it a powerful feature for tailoring which people and which apps are allowed to reach you. We’ll get to that, but first, here’s how to enable Do Not Disturb.

Enabling Do Not Disturb on Android

To enable Do Not Disturb, open your settings. Navigate to the Notifications menu. In most Android versions, you’ll see an option for “Do not disturb.” You can toggle this on right from this menu, or you can click on the widget for further options. “Turn on as scheduled” (or some variation of that) is a useful way to automatically toggle off notifications from, say, 11pm until 7am.

A few things to note about the default mode: first, toggling on Do Not Disturb essentially disables Android’s notifications system. You won’t receive any from anywhere. If it’s critical that someone be able to contact you anytime, day or night, you need to customize your Do Not Disturb (see below).

Second, you can always manually disable your scheduled Do Not Disturb. This is useful if you’re out late and still want to be notified about incoming calls or texts. Just come back to the main Notifications page and toggle it off. It will remain off until the next scheduled window.

Customizing Do Not Disturb on Android

Most people can’t get away with default Do Not Disturb. If you want to allow certain people or apps access to you even during Do Not Disturb sessions, go back to the notifications menu in settings and click the widget for Do Not Disturb. Click “Allow exceptions” and start customizing. There are tons of options here. You can enable notification from specific contacts or from repeat callers. You can choose to allow event/task alerts (think work calendar notifications), too.

From there, options vary depending on your phone’s manufacturer and the version of Android that you’re using. Use the principles described with whatever options your phone gives you.

Managed IT Improves Processes, Adds Value

Benefits of Managed IT Services

Benefits of Managed IT Services

If you’re running a small to medium business (SMB), you’ve probably come across the term “managed IT” or “managed IT service.” What is managed IT, and what can it do for your small to medium business? Today we’ll answer these questions and more. Read on to learn about managed IT and how it helps your business win.

What Is Managed IT?

Managed IT is a specific type of managed service. To explain managed IT, we first need to talk about managed services in general. Managed services are those services that a business outsources completely to another more specialized organization. These exist all over the business world for a wide variety of reasons. Usually, a company invests in managed services in areas that aren’t core competencies. Managed services are a way for companies to focus on their core business, outsourcing peripheral functions to other more specialized businesses.

Some businesses enlist the help of managed services firms to handle their HR needs, while others may outsource elements of their customer service. One of the most common examples of managed services, though, is managed IT.

Managed IT, then, is the intentional outsourcing of a company’s IT needs to another firm that specializes in IT support. The company using managed IT services pays the managed service provider (MSP) to meet their technology needs, reducing or even eliminating the need for in-house IT support.

What’s the Alternative to Managed IT?

The main alternative to managed IT services is to develop a robust in-house IT department. When they reach the end of their abilities, you’ll call in pricey contractors who usually can’t guarantee that quick of turnaround time. (Brutal honesty: they can’t, because they’re prioritizing their managed IT clients over you!) This is sometimes described as the “break-fix” model. Do what you can in-house, and then when something breaks that your team can’t fix, you call in the big guns.

The break-fix model worked when businesses weren’t so dependent on their IT infrastructure, but it doesn’t work well today. Think of a piece of crucial tech in your office. Maybe that’s your online sales platform, or it’s a server or database of some kind. If that one thing suddenly stopped working, how long could you survive waiting for a specialist to show up and start fixing it? You don’t want to wait until a specialist has an opening to come fix it. You need dedicated support.

Why Use Managed IT?

We’ve already alluded to a few benefits to using managed IT, like dedicated support. Here are a few more reasons you should use managed IT to win.

Massively Expand IT Capability

If you’re running an SMB, you have real, concrete limits to the number of IT professionals you can afford to hire in-house. A 50-employee company can’t have a 25-person IT department and stay in business for long. Take a long, hard look at your current IT capability. Can your staff really do everything? Chances are you have a few folks that are specialized in a few areas. Additionally, they’re all adequate in basic IT functions.

When you bring in a managed IT service, you’re hiring a company that specializes in just one thing: managed IT. If they’re a 50-employee company, well over 25 of those people are IT specialists. They bring a wide variety of specializations to the table, too.

You massively expand your company’s IT capability by bringing on a dedicated support team. A managed IT service can typically do far more than you can currently do yourself.

Allow Existing IT Staff to Specialize

Bringing on a managed IT service may allow you to reduce your own IT staff, but another option is to let them specialize. Right now, they’re probably overworked, running from problem to problem. They solve problems outside their expertise, but they do so inefficiently. Bringing on a managed IT firm to handle most functions allows your IT staff to focus and specialize on proprietary or value-added IT processes specific to your company.

Focus on Your Core Business

If you currently run all your IT in house, how much of your time as a leader is spent dealing with your IT team? Every hour you spend on IT is an hour you aren’t spending growing and improving your core business. Offloading 80, 90, or even 100% of your IT needs to a managed service provider frees you up to focus on what you do best.

How Can We Help?

If you’re ready to see what managed IT can do for you, we’re here to answer your questions. Contact us today to start winning with managed IT.

Can Your IT Company Handle Your Business Growth?

Business Growth

A healthy, growing business is almost always a good thing. Still, expansion brings with it certain responsibilities on your part.

If your business is growing quite quickly, it’s important to understand that large changes or adjustments may need to be made. This could mean hiring more employees, starting to provide employee health insurance, advertising more and spending more on marketing services, or obtaining more physical office space.

Business Growth

One area that you certainly won’t want to ignore as your business expands is your company’s information technology provider.

Many businesses who start small assume they can keep their IT provider as they grow. However, it’s important to realize that some providers aren’t equipped to handle larger businesses — those who often necessitate sprawling networks and extensive security needs.

To determine whether your company will soon require new IT services, consider the following questions about your current IT provider.

How familiar are they with your specific industry?

Often, when you’re just starting out, you’ll hire an IT provider who handles information technology services for a broad range of industries. Without a doubt, working with these types of providers will help your growing business by cutting costs. At the same time, you’ll still have your IT taken care of.

But as your business grows, you’ll want an IT provider with unique expertise in your industry. Niche IT providers who specialize in IT for hospitals, transportation services, or optometry offices, for example, are much more likely to provide you with better-quality service and improved security.

They are knowledgeable about and regularly brush-up on industry standards. They keep up with new and cutting edge technologies in your industry. And most of all, they are constantly aware of common security threats (and solutions) to businesses like yours.

Do they service other companies of similar size?

Take a look at who else your IT company serves. Are there any clients who match your company’s size? If so, do you believe those companies would also necessitate the same amount of attention and security as your company?

Even if your current provider services a company comparable to your size, if that company is a greeting card business and you own a chain of dental offices, you may have more to think about than just size. Namely, you’d have personal medical information within your network and a unique and crucial need to avoid breaches, scams, and possible liability catastrophes.

How often do you require troubleshooting services?

Are you already in near-constant communication with your IT provider for recurrent outages, network errors, slow-downs, and other problems?

Certainly, troubleshooting is one of the reasons you have an IT provider in the first place. However, the best providers should be able to set-up a network that requires infrequent service.

Moreover, preventable errors that happen once should not happen again. The downtime that results from problems in your network will inevitably hinder your business’s success. Moreover, as a company that’s growing, things will only get worse if you do not improve your service now.

How have they handled network problems to date?

When you have needed to make a service request in the past, what’s been your current provider’s track record?

Consider how easy they are to get in touch with. Are you able to speak with your own account manager or at least a representative who’s knowledgeable about your business?

How fast is your request handled? If it’s an emergency, such as a security breach or a system failure, how fast do they respond? If it’s a routine question or small system error, how fast do they respond?

Larger businesses need IT providers who know their business and are at-the-ready when a problem occurs. In fact, you should have a direct line to call when problems arise — one that answers to a live person.

Furthermore, as a growing business, you’ll want to anticipate that future problems will inevitably be more calamitous, especially when left unhandled for even a day or two. As your business expands, your IT provider must be immediately responsive, fully capable of handling any problem, and prompt in their service calls.

Have they presented a plan for accommodating your company’s growth?

First of all, have they taken notice of your company’s growth? A quality IT company will come to you first, noting that your company has been expanding and ideally, presenting a plan for your extended IT needs.

However, even if it’s you who needs to take the knowledge of your company’s expansion to your IT company, you’ll want to look for signs that they have a plan in mind to accommodate your anticipated needs.

They may, for example, suggest that you move from an as-needed payment plan to a monthly or yearly management plan. Many of the best IT providers who handle a range of company sizes will have at least these two options for their clients. When moving to a managed plan, you’ll be able to request assistance whenever necessary, paying a flat rate for their on-call care.

Find an IT Company Who Will Help Your Business Flourish

If, by evaluating the questions above, you’ve determined that it may be time to hire a new IT company, this certainly doesn’t mean that your current provider is entirely insufficient. It simply means that you’ve outgrown them, which in turn means that it’s time to move on to a more capable provider.

Taking the time to assess and realize your business’s extent of growth and possible outgrowth of an IT provider is an important step in your business’s expansion. Hiring an IT provider with adequate resources and capabilities to handle your expansion will ensure you’re fully prepared when it comes to your information technology — a foundational element that is, today, an invaluable component to businesses of all kinds.

Most Small Businesses Pay The Ransom

Do You Pay The Ransom

Are you willing to pay the piper when it comes to cyberattacks?

Do You Pay The Ransom

Despite the growing number of cyberattacks on small- and medium-sized businesses, there is still a lack of awareness or proactive defense of the networks, computer systems, applications and devices being used. This inattention means it’s even easier for criminals to attack your business by worming their way into your data, stealing it and threatening to expose it. Other cyberattacks target the business itself, making systems and websites inoperable, costing businesses millions in the process.

Freeing the data or access often means paying a ransom, usually in the form of Bitcoin or some other cryptocurrency that’s impossible to trace.

How Much of an Issue is Cybercrime?

When it comes to cyberattacks on small businesses, the reality is, if you haven’t already been attacked, you will be. What matters is that you have the security protocols in place to make sure your business withstands these attacks and is not victimized by intruders looking to do harm.

The scope of cyberattacks, especially on SMBs, is staggering.

According to the 2018 HISCOX Small Business Cyber Risk Report, almost half (47 percent) of small businesses suffered a cyberattack in the previous year. Of those attacked businesses, 44 percent encountered a second, third or fourth attack. Eight percent had five or more attacks.

Yet the report shows a paradox. Business executives surveyed identified cyberattacks as one of their top two concerns, along with fraud. Sixty-six percent said they were concerned or very concerned about cyberattacks.

However, among those executives, the majority haven’t taken even basic steps to protect their businesses.

What Does a Cyberattack Mean to My Business?

If you do not invest in cybersecurity measures, you are a sitting duck. That means you’ll have to pay a ransom when your business is attacked. You will incur costs as well, including steps to identify and eradicate the intrusion, notify customers and regulators and pay for deep web monitoring or credit monitoring.

What is that financial cost? According to HISCOX, it’s $34,600 for small businesses. The 2018 Cost of a Data Breach Study: Global Overview conducted by the Ponemon Institute shows that among SMBs and enterprises, the worldwide average total cost is $3.86 million. The costs are increasing each year, too.

The Ponemon study shows some of the other inherent threats and disruptions a data breach can bring upon your business. Among key factors influencing the cost of a data breach, according to the study, are:

  • The unanticipated loss of customers after a data breach is reported. Organizations that have established institutional trust and offer identity protection to victims are more successful in retaining customers.
  • The scope of the breach and the number of records lost or stolen. Ponemon calculates the per-record cost at $148.
  • Time. The longer it takes to discover the data breach and contain it, the more costly it is to the affected business.
  • Scope of remediation. When an attack is discovered, your business is going to incur expenses it didn’t plan for, including for independent investigators, forensic analysis, auditing services, crisis PR management and continuing brand and reputation repair initiatives.
  • Service needs. These included the demands for help desk services, marketing and communication, distribution of new account information or credit cards, legal costs, regulatory investigations and fines, product and service discounts to retain customers and increased insurance premiums.

The costs, both real and impressionistic, can cripple a small business that does not have the resources to recover from a cyberattack.

What Should Our Business Do To Protect Itself?

Protection begins with a thorough assessment of your systems and procedures to determine where there are vulnerabilities that need to be addressed. Working with a qualified managed service provider, you can understand where the exposures are and plan to fix them.

Your managed service provider will want to look at several components, including:

  • Network security that’s based in next-generation firewalls to identify and contain unwanted activity
  • Automated solutions to update anti-malware applications and install updates and patches
  • Policies regarding access, password protocols and authentication

With the proper security in place, you can avoid paying a ransom and putting your business at risk.

Critical Update From Microsoft: Remote Desktop Services

CVE-2019-0708

Impacted Systems:

  • Windows Server 2003
  • Windows XP
  • Windows7
  • Windows Server 2008

Nonimpacted Systems:

  • Windows 10
  • Windows Server 2016
  • Windows Server 2019

If you are still using Windows Server 2003 or XP, Windows 7, Windows 2008 R2, or Windows 2008 you could be in trouble. A wormable virus may be coming your way. The virus is designated as CVE-2019-0708.

CVE-2019-0708

This means that the virus can get into your system without you doing anything like clicking a malicious link. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights without your knowledge.

What Should You Do?

Microsoft has released a critical update for their Remote Desktop Services that impacts multiple Windows versions. The patches are for devices and systems that are both in and out-of-support, which is rare for Microsoft to do. This shows the importance of these patches.

The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests. To apply the patches, go to the Microsoft Security Update Guide for in-support systems and KB4500705 for out-of-support systems.

Note: Clients & Customers on a valid managed services agreement are being taken care of and there is no immediate action for any computer, server or other devices under a valid managed services agreement.

Microsoft recommends that customers running one of these operating systems download and install the update as soon as possible.

Does This Mean Even Systems Without Support Can Get The Patch?

Yes, Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. This means that you wouldn’t have received any security updates to protect your systems from the CVE-2019-0708 virus.

Given the potential impact on customers and their businesses, Microsoft decided to make security updates available for platforms that are no longer in mainstream support.

All Windows updates are available from the Microsoft Update Catalog.

What Should We Do Before We Apply The Update?

It’s recommended that you back up all of your important data first. If you have a reliable backup, if the patch creates problems you can still access your data. You should do this before you install any patches.

What If We Can’t Apply The Patches?

If you can’t apply the patch for your system there are other things that you can do:

  • If you don’t need the Remote Desktop Services, you can disable it.
  • Block the TCP port 3389 (this prevents unauthorized requests from the Internet).
  • Enable NLA (Network Level Authentication) for Windows 7 and Windows Server 2008.

Of course, the best thing to do is to contact your local IT services company. They’ll know exactly what to do.

What Is A Wormable Virus?

This means that any future malware that uses this vulnerability could propagate from one vulnerable computer to another. This is how similar malware like WannaCry spread around the world. Experts are worried that this flaw could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017.

Here’s what Simon Pope, director of incident response for the Microsoft Security Response Center tells us:

“This vulnerability is pre-authentication and requires no user interaction,” Pope said. “In other words, the vulnerability is ‘wormable,’ meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. It is important that affected systems are patched as quickly as possible to prevent such a scenario from happening.”

Have There Been Any Attacks Yet?

Microsoft said they haven’t found evidence of attacks against this dangerous security flaw. But one could happen at any time. Right now they are trying to prevent a serious, imminent threat with these patches.

Simon Pope goes on to say:

“While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.”

What Does The Microsoft Remote Desktop Do?

You use the Microsoft Remote Desktop application to connect to a remote PC or virtual apps and desktops made available by your admin. You can control your desktop computer and all of its contents from another computer.

The app lets you connect to your desktop from wherever you are. The access to the remote desktop happens over the Internet or via another network. It lets you interact as if you were physically working from your desktop.

The Remote Desktop application also gives the “master” computer access to all of the contents on the remote computer.

What Else Should We Know?

If you had updated from Windows 7 to Windows 10 or from Windows Servers 2008/2008 R2 to Windows Server 2016 or 2019, you wouldn’t need to worry. This is why it’s essential to keep your systems up to date.

Soon, on January 14, 2020, support will come to an end for all Windows Server 2008, 2008 R2 equipment and the Windows 7 operating system.

If you’re still using these servers or operating system, it’s crucial to replace them now so that there’s no disruption to your daily operations or loss of data.

Any hardware or software product that reaches its end of life is a potential gateway for hackers to enter through. In addition to the security hazard, there are other reasons why it isn’t a good idea to keep using old equipment such as unresolvable outages.

Where Can We Get Help?

Contact us to ensure your Microsoft desktops and servers are secure and protected from unauthorized intrusions.

Does Open Source Software Have a Role in Enterprise IT?

Open Source Software

Open Source Software

Open source software has come a long way since the 1980s. Back when the concept was first developed, it was a philosophical revolution in the software world. Releasing software for free wasn’t new, but releasing the source code behind the software and even encouraging others to improve upon it was game-changing.

In its infancy, open source software wasn’t the sort of thing most enterprises would consider. Times have changed, though. If your organization has never seriously considered whether open source software has a role in enterprise IT, you may be missing out on some serious advantages.

Open Source Software’s Changing Role

Open source software used to be viewed as the software equivalent of homebrew beer: an interesting hobby with sometimes attractive results, but not at all useful at scale. Over the twenty-five-plus years since its origins, things have changed. There’s no perfect analogy, but you might say the open source crowd has evolved into the equivalent of a network of craft brewers. Each brewer crafts something unique, and they all share their recipes and brewing techniques freely, both with other brewers and with consumers. Because of this collaboration and free sharing of information, the results just keep getting better.

Enterprise Adoption Grows

This evolution has had an effect on enterprise adoption. Today, most companies utilize some open source software. Red Hat, a Linux distributor and a major player in the open source space, commissioned a study of enterprise IT in 2019. The study determined that 83% of enterprises surveyed were using open source software, and 69% of those respondents described open source software as being either extremely or very important to their organization.

Uses of Open Source Software

Uses of open source software in enterprise settings vary widely, of course. Small businesses may not venture far outside OpenOffice, an open source alternative to Microsoft Office. Enterprise level businesses, however, tend to do more. That same Red Hat study names five areas where open source applications are being used in surveyed enterprise businesses at a rate of 41% or higher. These five are website development, cloud management, security, big data & analytics, and databases.

Pros and Cons of Open Source Enterprise Software

We don’t want to give you the wrong impression. The world of open source software isn’t a miracle utopia that will solve your every business IT problem. There are pros and cons to using open source software for enterprise IT. Here are a few.

Pro: Open Source Software Is Almost Always Free

If the source code is freely available, the software itself is almost by definition offered for free as well. There are limited exceptions, but most of the time, open source software is free to use. This makes sense practically, as it’s challenging to charge for the shell when you’re giving away the innards for free. It’s also a philosophical decision, as the open source movement is closely connected to the ideas of the free software movement.

Con: Supporting Open Source Software Isn’t Free

Open source software at the enterprise level isn’t being designed by hobbyists with day jobs. This is complex software that takes real development work. You may be wondering, then, how the developers put food on the table. In many cases, the answer is support.

When you purchase enterprise software from a traditional source, you usually enter into a license agreement where the seller or the developer will support your use of the software, for a yearly fee. Similar arrangements are available to help you support many open source enterprise applications. The software is free, and you’re free to customize it. If you need support, though, you’ll need a service level agreement (SLA) or something similar. These aren’t free.

Pro: Open Source Software Is Customizable

Off-the-shelf software solutions don’t allow you to customize the software beyond whatever settings the developer offers. You’ve likely experienced this on a small scale. Many people who use Microsoft Outlook for email, for example, aren’t thrilled with the program’s search function. Too bad: neither users nor company IT departments have the ability to enhance this feature beyond what Microsoft provides.

Open source software is different. Companies can tailor the software to their needs and can tweak the source code so that the new software interfaces properly with their existing systems.

Con: You Have to Do It Yourself

The previous pro is a bit of a double-edged sword. The ability to customize software is great, but your company needs people with the skills to do that customization well. Even the best IT pros may get stuck in this process, and finding dedicated support can be a challenge.

Contrast this with complex high-end proprietary enterprise software suites, which often come with support from the vendor. Vendor agreements may include some custom interfacing work. The software and service agreements are costly, but you aren’t left on your own to do the customizing.

Conclusion

For many businesses, open source enterprise software can save money and improve functionality, but navigating the open source waters can be a challenge. If you need help, contact us today!