Jun 1, 2017 | SMB Technology, SMB Technology, SMB Technology, Technology News
Last month’s blog provided information about ways to “Avoid Being Held Hostage by Ransomware.” Eight days later, on May 12, 2017, there was a global outbreak of the Wanna Cry Virus. With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike. Industry compliance regulations, including PCI, HIPAA, and SOX, drive best practices in Network Compliance. However, most businesses today rely heavily on their systems to access Cloud Services, Voice, and Data Networks for mission-critical applications that run their business. What can you do to maintain network compliance? Automate Your Network Administration Keeping operating systems and network configurations up to date is a top priority for network compliance. Each device that connects to your network needs to have up-to-date operating system security patches, anti-virus definitions, and malware threat prevention in order avoid un- intended intrusion of your network. There are abundant tools and managed services to help your business stay up to date without adding to your internal labor cost. Proactively Monitor Your Network Monitor your network to identify any systems that are out of compliance. Proactive monitoring can also identify unauthorized devices connected to your network. You can monitor your network traffic to identify unusual use of network bandwidth. Aside from slowing down your systems, excessive bandwidth may be the result of a malware-infected device that is exploiting your network. Documenting Your Network Security Controls Achieving compliance with documented security procedures including password policy, systems maintenance, backup procedures, and compliance measures, is critical to following most industry compliance regulations. It is a best practice to update...
Apr 18, 2017 | SMB Technology, SMB Technology, SMB Technology, Technology News
More and more companies are migrating to Cloud Computing to gain competitive advantage and reduce capital expense. According to CompTIA’s 9th annual Security Trends study, companies reported over 80% net usage of Cloud Computing. Over 59% reported moderate or heavy usage. What’s more, the survey found that 68% reported confidence in Cloud providers’ ability to provide a Secure Cloud Environment. An additional 17% responded they were very confident in the security of their Cloud environment. Let’s explore what drives confidence in the Cloud. How to Assess Cloud Provider Security There are many variables to consider when evaluating security of a Cloud Provider. According to the study, many companies evaluate their Cloud provider based on encryption–when moving data to the Cloud, it should be encrypted at rest and in transit. In addition, companies should consider the disaster recovery plans of their Cloud Provider. Some Cloud Providers adopt industry standards including SAS 70 to provide consistent, compliant cloud security. Industry standards are often used to evaluate a Cloud Provider. Identity and access management are also criteria for evaluating a Cloud Provider. Many companies also consider geographical location(s) of the Cloud Provider’s data center. Consider your Compliance Requirements Many industries have specific requirements regarding handling data. For example, PCI provides guidelines for how companies handle credit card information. Healthcare, Financial Services and Governments (or companies doing business with Government) also have compliance requirements for handling data. Understanding your requirements is key to ensuring you migrate to the Cloud with confidence. Some data may require implementation of a private cloud environment. Also, a Private Cloud has additional security benefits, being a Cloud...
Mar 10, 2017 | SMB Technology, Technology News
A managed services provider (MSP) takes on the responsibility for a company’s technology and infrastructure by proactively providing a defined set of IT services for a fixed monthly fee. This approach is preferred by businesses over the traditional Break/Fix services delivered on an hourly rate when needed. By emphasizing high availability and reliability, Managed Services align the MSP’s business model with a company’s business objectives. In contrast, the break/fix model addresses problems when they occur. According to research firm MarketsandMarkets, the global managed‐services market will grow to $193B by 2019, at a Compound Annual Growth Rate (CAGR) of 12.5%. Information Technology as a Service According to the fifth annual Trends in Managed Service published by CompTIA, “The central tenet to the MSP model is a provider-customer relationship based on a contract backed by a service level agreement.” This approach provides IT services similar to other utility models. Many Managed Service Providers (MSPs) rely on remote monitoring and management technologies to deliver a range of core IT services in a scalable and proactive manner. This approach streamlines the process for proactively identifying and resolving issues with IT infrastructure. What to Expect from an MSP CompTIA research indicates it is common for a managed service provider to include desktop and network management, applications management, and remote help desk in their service level agreements (SLA). Security (including firewall management), server management, storage, network monitoring, Business Continuity/DR, Backup as a service (Cloud Backup), Email, and Virtual desktop are often available as managed services. Benefits of Managed Services The managed service approach is favored by business for a variety of reasons. Managed services...
Sep 8, 2016 | SMB Technology, Technology News
Ransomware is a type of malware designed to block access to your computer until a sum of money is paid. Ransomware issues have impacted many individuals with home computers; however, it is only a matter of time before this malicious software attacks business. Starting with Cryptolocker in 2013, Ransomware exploits have become increasing sophisticated and have cost individual companies thousands of dollars in ransom. Here are some tips to take to help your business avoid being held captive by Ransomware. Backup to the Cloud to Recover from a Ransomware Attack. An inadequate backup strategy without real-time backups or offsite backup could hamper your ability to recover from a Ransomware attack. Being able to recover data from your Cloud Backup could get your systems up and running in a hurry, avoiding the need to pay ransom. Keep Your IT Assets Up to Date and in Compliance If your systems get behind in operating system and applications patches and updates, you may create a security hole that can be compromised by Ransomware. Many managed security and managed service offerings include proactive management and delivery of these important updates so your network will not be held hostage by ransomware. Training Your Employees to Detect and Report Ransomware Your employees are your front line of defense when it comes to your systems security. Make sure your employees know how to identify a phishing email and understand the risks of opening documents and attachments (including unfamiliar file extensions or .exe file formats) from unauthorized sources. Ensure your employees understand what Ransomware is and how it can impact your company’s productivity and drain financial resources....
Oct 13, 2015 | SMB Technology
According to a recent Trends in Information Security report by CompTIA, malware, hacking, privacy and data loss/leakage top the list of serious concerns over security threats. Companies large and small have been victims of these security threats. While large corporate security breaches makes the news, smaller companies may not have the vigilance to detect, and the resilience to survive a network security breach. Hackers have evolved and are now more sophisticated than ever. Network Monitoring can identify security exploits before it is too late. Network Monitoring is Proactive Just like getting your vital signs checked at the doctor’s office, network monitoring is a proactive way to detect a network security threat. Network Monitoring scans for viruses, malware, patch compliance and any unauthorized access to help determine network health and compliance. By using intrusion detection when a system has been breached, you are immediately notified. It’s important to proactively monitored your network and act swiftly. Network Monitoring Saves You Time and Money By remotely monitoring and managing your network and related IT assets, your IT Service Provider may be able to detect and remediate security issues without ever coming to your office. This will result in an overall reduction of IT costs. Routine IT tasks, including Patch Management will ensure that all Application and Operating System (O/S) patches are up to date thus protecting your business against vulnerabilities. In addition, keeping software up to date may give you productivity features and benefits. Avoiding Downtime and Increasing Security Secure remote support is an important element for delivering an IT Managed Service. In addition to remote support, many IT Service Providers...