Mobile Hotspots – Is Your Business At Risk?

With almost one billion mobile connections in place, it is easy to understand why these devices are targeted by hackers. Employees connecting at Starbucks, in airports, on planes and in hotels open themselves up to additional security breach risk by accessing information through mobile hotspots. Mobile hotspots can be easy targets for hackers by setting up spoofs to get your employees to unknowingly log into unsecure networks, making them vulnerable to Man in the Middle (MitM) exploits. As an employer, it may be impossible to prevent employees from using hotspots, so it is very important to take steps to protect your business. Below is an example of how hotspot hacking works and how businesses with mobile users can protect themselves. Is Your Mobile Device Hackable? According to research by Gartner, almost half of us will first turn to a mobile device for online tasks. Business users in particular rely on mobile connectivity to be productive. Using a open Wi-Fi hotspot may put you and your business at risk of hacking. Most people are aware of the risks, however it comes down to convenience. Hackers can use software that makes a mobile device appear to be connected to a familiar Wi-Fi network, but in reality, all traffic is routed through an imposter that captures your data (MitM). Many mobile applications attempt to stop this type of proxy attack by ensuring a secure, end-to-end SSL connection refusing to make an unencrypted login. However, mobile applications may not always verify the secure SSL connection is actually secure. Does Your Business Needs a VPN to Protect Mobile Users? A Virtual Private Network  (VPN)...

Does Your Business Need Network Monitoring?

According to a recent Trends in Information Security report by CompTIA, malware, hacking, privacy and data loss/leakage top the list of serious concerns over security threats. Companies large and small have been victims of these security threats. While large corporate security breaches makes the news, smaller companies may not have the vigilance to detect, and the resilience to survive a network security breach. Hackers have evolved and are now more sophisticated than ever. Network Monitoring can identify security exploits before it is too late.   Network Monitoring is Proactive Just like getting your vital signs checked at the doctor’s office, network monitoring is a proactive way to detect a network security threat. Network Monitoring scans for viruses, malware, patch compliance and any unauthorized access to help determine network health and compliance. By using intrusion detection when a system has been breached, you are immediately notified. It’s important to proactively monitored your network and act swiftly. Network Monitoring Saves You Time and Money By remotely monitoring and managing your network and related IT assets, your IT Service Provider may be able to detect and remediate security issues without ever coming to your office. This will result in an overall reduction of IT costs. Routine IT tasks, including Patch Management will ensure that all Application and Operating System (O/S) patches are up to date thus protecting your business against vulnerabilities. In addition, keeping software up to date may give you productivity features and benefits. Avoiding Downtime and Increasing Security Secure remote support is an important element for delivering an IT Managed Service. In addition to remote support, many IT Service Providers...

Is Network Security Your Priority?

Everyday there are reports of businesses being targeted with security attacks. The list of large companies being hit is long. Small businesses are equally vulnerable to security hackers and may be less resilient. To say that security is a top business concern seems unnecessary. Most companies understand that security is not something to be taken lightly. In a recent CompTIA survey, 74 percent of business leaders said that security is a higher priority today than it was two years ago. Eighty-five percent of firms surveyed reported that IT security will have an even higher priority two years from now. Network Security Versus Human Error Everyone agrees that security is important. Malware and hacking are still the major concerns. Human error has become one of the most recent threats. This is a growing concerns that needs attention. To combat human error, significant education and training of employees is needed. Mitigation strategies for all businesses, whether large or small, are of the utmost importance. With new models of security, there are new loopholes to exploit; with greater technology reliance, there is a greater potential for disruption. Add in escalating privacy concerns and critical regulatory concerns, and it is easy to see how security is becoming much broader than firewalls and anti-virus software. Security Policies and Procedures It is important for your business to establish clear procedures on notification and escalation of a data leak or data breach. Ensure that your team knows how to escalate a concern within the company. It is more important to raise the issues quickly rather than cover up a security breach. Your business must have clear...

Is Your Network Ready for Windows 10?

Since the July release of Windows 10, the tech world has been talking about the latest update from Microsoft. According to Microsoft, within one day of its release, more than 14 million users had downloaded Windows 10. Microsoft is rolling the new product out in phases, so how will you be sure your network is ready for the new Windows? The Good News about Windows 10 What users like about Windows 10 is that it is fast and familiar. Windows 10 includes an improved Start menu and is designed to startup and resume quickly. It also has the Microsoft Edge – an all-new browser. With the latest Windows product all updates are cumulative. Windows 10 should be compatible with the hardware, software and peripherals you already own. The OneDrive online storage can help you easily share files and keep files up to date across all your devices. Windows 10 Bandwidth Requirements Some businesses will wonder if they need more bandwidth for Windows 10. Though Windows 10 was free to download, updating the operating system is costing some dearly. Some updates may use many gigabytes of bandwidth for a typical installation. The new product and the automatic updates may tax some users with data caps. Some users may need to budget for this and make sure they have adequate internet connectivity. New User Interface for Windows 10 New concerns with the way that Windows 10 enforces automatic download and installation of updates is turning a free update into a costly endeavor for some users. Make sure you are up to date on all the security features, so that you do...

Is Your Head in the Cloud?

Are you ready to embrace the benefits of the Cloud? Whether your company is ready to acquire new software-as-a-service (SaaS) capabilities or in need of infrastructure upgrades via infrastructure-as-a-service (IaaS), Cloud has now reached new heights in the small and medium-sized business (SMB) world. According to current research by International Data Corporation (IDC), fifty percent of all companies are using at least one public SaaS offering, with a further 20% planning to implement such a service within the year. Platform-as-a-service (PaaS) and (IaaS) are less used today, but there is interest and growth in that direction. Top Reasons for Moving to the Cloud According to the same report by IDC, here are the top five reasons that your business should be moving to the Cloud: Get access to the newest functionality faster. Improve utilization. Reduce the cost of overall IT spending. Improve staff productivity. Give business units more direct control over sourcing IT solutions. Bottom Line On Cloud There is no denying that the Cloud is here to stay and all indications are that the sooner you start to incorporate it into your technology portfolio the better. The fact is your competitors are getting the message and there is competitive risk at stake. Because the hallmark of Cloud is flexibility and agility, it can be relatively low risk to try it out.  The ‘pay as you play’ Cloud subscription model means there is little financial investment to get started. This all adds up to low barrier to entry. There are many economic reasons for moving to the Cloud and there are also compelling practical considerations and strategic opportunities. So...

Wearables are Fashionable, But Are They Secure?

Wearable technology, especially Smartwatches, including the Apple Watch, the Samsung Gear, and the Microsoft Band, are all the rage and are expected to become even more popular over the coming years. According to the International Data Corporation (IDC), 2015 will see as many as 72.1 million wearables shipped. They are popular and fashionable, but do they leave your network open to potential security breaches?  Wearables and Security Risks Wearables represent another attack target for the cybercriminals who are currently enjoying the opportunities presented by mobile devices. Wearables have the same potential for data leakage, data loss, and industrial espionage as mobile devices. Some security experts agree that the current wearables have a limited attack surface. Other experts believe that there is a risk of a hack and warn that the danger could increase. Future wearables will likely behave as current mobile devices, making them far more appealing than computers for cybercriminals. Like computers, wearable devices are built on familiar operating systems and have vulnerabilities. Because security and privacy are not a priority for developers, these devices are not being built with security front of mind.  Considering that some companies encourage employees to bring their own devices, security threats of wearables should be incorporated into a firm’s policies. Bring Your Own Device Policy and Wearables Bring Your Own Device (BYOD) policies, in which companies give employees the choice to use their own iPhones, iPads and Android smartphones for work, is a trend that business cannot avoid. A number of firms still do not have adequate policies, controls, or even the right technology. Some say a BYOD policy should include wearables...
Skip to content