Posts

Spring cleaning for your networks

Spring cleaning is often associated with cleaning out the sand, salt and other built-up winter soot. However, spring cleaning shouldn’t just be for your home. Most people spend 40 hours a week at work, and even the less physical aspects of an office could use some tender loving care. Consider cleaning up your networks. It’s essential to keeping them secure and running smoothly.

Your networks are the basis on which your business runs. If they aren’t secured, you can lose valuable data to cybercriminals. Our managed IT staff can help you through this process and monitor your security in the future.

Here are a few tips to get started.

Encrypt and secure your wireless network

If you set up your Wi-Fi network years ago, you may be using easily hackable, outdated encryption. The current standard for Wi-Fi protection is Wi-Fi Protected Access 2 — or WPA2. Second, make sure your wireless network has as random of a name as possible, avoiding dictionary words. Seasoned hackers have a list of the top 1000 most common network names with a list of passwords that could likely crack your wireless network. A unique name makes that network more difficult to find. Lastly, create a lengthy password with a mix of letters, symbols and numbers. You’ve likely already been warned about passwords time and again — to much frustration. There’s a reason for that. Get creative and create a password of more than 16 characters for the most protection. Remember, most Wi-Fi devices will store this password, so the aggravation of entering a long, complicated password should be minimized.

File away your old data

Don’t let clutter clog your network and slow it down. File away anything on your network you haven’t touched in the last few months. This is also a great time to organize files into one spot and back them up on a data recovery service. Emails should also be deleted or properly archived. Few things are more overwhelming than a cluttered inbox. While deleting unnecessary correspondence, organize other emails into labeled folders.

Determine space in your bandwidth

As you clean out your network, monitor the space in your bandwidth, which is the amount of data that can be transferred from one point to the next during a given time. As a business grows, it’s possible that its bandwidth may need to as well.

Talk with employees

No matter how secure your network and password are, daily use can still compromise it to cybercriminals. Teach employees about best practices with password creation and teach them how to recognize spam emails and hyperlinks. Additionally, limit access to your company’s critical data to as few people as possible.

Filter network traffic

Give your employees a leg up by filtering the traffic that enters your network. Use pop-up blockers and email filtering services to monitor any suspicious content that could be coming into your network.

Get rid of old devices

Old, unused devices can not only slow down your network, but they can also be a vulnerable access point for cyberthreats. Unplug and properly store or dispose of those unused fax machines, printers, copiers, computers and phones.

Why Your Business Needs a Disaster Recovery Strategy

Due to the multitude of cyberthreats we face today, businesses need to be ready for anything when it comes to data security. Whether it’s a natural disaster, a cyberattack, or just human error, there’s always the looming threat of a potential data disaster that could strike your company at anytime. This is why it is so important to have a disaster recovery strategy in place to avoid downtime—or worse, a complete shutdown.

Some eye-popping stats regarding data disasters
If you’re a small business, the following numbers are extremely unsettling. Again, this is a testament to the importance of a disaster recovery strategy. According to the Colorado Springs Gazette:
• Nearly 40 percent of small businesses close after a disaster—and only 25 percent of that group ever reopen
• 52 percent of small businesses say it would take at least three months to recover from a disaster
• 75 percent of small businesses do not have a disaster recovery plan in place

Mobile devices exacerbate the data security problem
Most likely, your employees utilize mobile devices to conduct business on a daily basis. Unfortunately, these devices increase your risk of a potential data breach. If a phone is left behind at a meeting or in a public space, it can easily fall into the wrong hands. A disaster recovery strategy will counter this issue by enabling remote lockdowns and device wipes on all authorized mobile devices in the event that one goes missing or stolen.

Your reputation is on the line
We know the kind of damage a disaster can cause your business when it comes to downtime and shutdowns—but don’t ignore the damage it will do to your reputation. It takes years of hard work to build trustworthy reputations amongst your clients. A data breach with no recovery plan in place will surely sour your relationships in no time. Potential clients will also be wary about going into business with your company after a data disaster.

A little preparation goes a long way
It’s essential for businesses to not downplay the seriousness of a disaster recovery strategy. Even with a temporary solution in place, you can keep your operations afloat following an emergency. Regular cloud backups and off-site backups are essential pieces to a disaster recovery strategy that require regular maintenance and management. This kind of diligence will show your clients just how much you value the vital data that makes up your company, and foster trust.

To learn more about data recovery strategies and how they can help your business in the event of a disaster, contact us today.

31 Flavors: A Variety of Email Threats to Beware of

Every business relies on email to communicate effectively. Unfortunately, email-centralized cyberattacks are a growing trend around the world. For this reason, businesses of all sizes are focusing on email security more than ever before. There are many ‘flavors’ of email threats out there with the potential to harm your network. Let’s take a look at a few of the most common types that are making the rounds in 2017.

Phishing
Phishing attacks are becoming increasingly popular. This is when a cybercriminal impersonates a business or person with the intent to steal personal data or login credentials. It’s usually in the form of an ‘urgent’ message that attempts to scare users into giving up vital information. Defensive technology is important to prevent employees from falling victim to phishing; however, do not overlook the importance of ongoing education and awareness for all users on your network.

Spear Phishing
This type of attack is on the rise in the ever-growing world of social media. Attackers create fake profiles on social media sites to gather information on unsuspecting users. This information is then used in email attacks. It is again important for users to be educated on how to safely navigate social media sites, especially in the workplace.

Ransomware
Ransomware has frequently been in the headlines over the past year or so as more and more businesses, hospitals, and government agencies fall victim to these attacks. Ransomware is a type of malware that encrypts the victim’s data and blocks access to it until a specified amount of money—a ‘ransom’— is paid. This epidemic is spreading quickly through emails that contain malicious links or attachments.

User awareness is an important component of protecting your business from these types of attacks. Along with this awareness, defensive technology also needs to be in place to balance out the risk of human error. Cybercriminals are constantly trying to fool users with new schemes; blocking these malicious emails from your network is your best bet to remain secure. For more information on how to protect your business from email threats such as phishing, spear phishing, and ransomware, contact Infomax Office Systems today.

Why You Need to Protect Yourself against Ransomware

Everyone has seen a movie or TV show where a criminal kidnaps a victim and demands a ransom in exchange for their release. What some people do not realize, however, is that demanding a ransom is not just confined to kidnappings. Today, many criminals employ ransomware, a form of malware or computer virus that locks a user’s keyboard or computer and holds their data ‘hostage’ until the victim pays a ransom in exchange for restoring access to it.

Recently, computer criminals used ransomware to conduct the largest cyberattack in history. More than 200,000 Windows operating systems in more than 150 countries—including the United States, England, Germany, and Japan—were infected with the ransomware strain WannaCry or WanaCrypt0r2.0. Victims had the data on their computers encrypted or scrambled, effectively locking them out of it while demanding they pay a ransom of between $300 and $600. The attack was not limited to personal PCs—WannCry victims included hospitals, banks, and government agencies.

So, how does ransomware work? Well, just like in the movies, someone takes something you own and holds it hostage until you send them the money they demand in return. The individual requesting the ransom infects your computer with a virus, usually by sending an email that requests the user to click on a link. Once the virus infects the system, the hacker can lock down the computer’s files and extort the user until he or she is paid the money.

While this may seem like a relatively simple issue to resolve, the problem lies in the information that is being held hostage. Few organizations can operate without their data, and if one doesn’t have this data backed up, the impact of a ransomware attack can be crippling. In addition, the FBI, Department of Justice, and many technology firms suggest you don’t pay the ransom. Doing so does not guarantee you’ll regain access to your data, and since you’ve already been exposed to the virus and shown a willingness to pay the ransom, you’re vulnerable to be re-targeted again in the future.

How can you protect yourself against ransomware? To help prevent these kinds of attacks, there are a few steps you can take to mitigate risk. First, regularly install Microsoft security patches and system updates, frequently backup your files, secure your router, and—perhaps most important of all—don’t open suspicious emails. If it’s too late and a virus has already taken over your system, the most crucial step is disconnecting from the Internet to prevent the virus from spreading. Then, you should report the attack to authorities and file a complaint with the Internet Crime Complaint Center. Finally, wipe your PC and restore your data and files from backups.

Big risks can sometimes yield big rewards, but not when it comes to cybersecurity. Be sure your organization is doing all it can to protect itself from ransomware and other cyberattacks. Contact Infomax Office Systems today to learn how our on-site Managed IT services can help give you peace of mind from ransomware attacks.

Email Best Practices to Keep Your Office Secure

Businesses are constantly targeted by cyber attackers using malicious emails to gain access to their systems. Ransomware in particular poses an enormous threat to organizations, becoming by far the most common form of malware today. Cyber attackers use it to lock down an unsuspecting recipient’s files and deny access to infected data until the victim pays a ransom. As an added bonus, ransomware has evolved to enable criminals to steal personal or financial information from the victim’s system as well, increasing the impact of an infection.

So, how can you ensure email security to protect yourself?

As humans are the weakest link in any company’s security, the first step to protecting itself is through education. Keep up-to-date on the latest cybersecurity trends and inform staff members of the various types of threats out there today. Stress how serious these threats are to your team, that they can and will likely be exposed to them, and how they can avoid falling prey to them.

The best way for users to protect themselves is by exercising caution in their email inbox. Never, ever, open an attachment or click on a link in an email from someone you don’t know, especially if it seems out of context. If you’re suspicious, contact your IT department before proceeding.

In addition, hackers are adept at spoofing who an email is coming from, making them appear to be sent by someone you know. If someone asks you to provide sensitive information via email, do not trust them. Verify their request by telephone or another form of communication before providing this information.

Perhaps the most effective defense against threats such as ransomware is to frequently back up your data. Even if a business does pay the ransom, there is no guarantee that the hackers will release the files being held hostage. By consistently backing up your data, you can avoid paying the ransom by simply restoring your files.

Hackers are skilled and shrewd enough to bypass SPAM filters and email security. Don’t let them lull you into a false sense of security that leaves you and your business vulnerable. Contact Infomax today to learn more about email best practices and our dedicated security solutions.