Businesses all around the world have had to adjust to the events of 2020. Many have ...
Deliver extraordinary experiences at your dealership.
Did you know? An estimated 50% of businesses do not back up their valuable data ...
Businesses all around the world have had to adjust to the events of 2020. Many have ...
Cybercrime is a global criminal industry that is growing every day at an alarming ...
Did you know? An estimated 50% of businesses do not back up their valuable data ...
Businesses all around the world have had to adjust to the events of 2020. Many ...
Cybercrime is a global criminal industry that is growing every day at an ...
Because of the current COVID-19 pandemic, many of us have been considering how we could respond to a worst-case scenario where a team member is diagnosed with the virus, or company and government decisions result in a significant number of people unable to visit the office. How can your organization be prepared for these events?
People might be unable to work from the office because of the shutdown of public transport, schools or large city areas.
Having an unplanned (and sudden) large number of remote workers using established solutions such as VPN access could easily overwhelm the capacity of the office network or have unanticipated software licensing impacts. Further, some applications may be sensitive to slow response times due to VPN or firewall bottlenecks and not function as expected.
Connectivity aside, there may be issues with the physical equipment itself. Maybe a person’s computer isn’t mobile. Perhaps it has not been configured for working outside of the office. Alternatively, the person has never worked remotely and has no idea how to install, configure and use VPN software.
If a person receives a diagnosis while out of the office, they may not be able to come to the office to collect their computer. This presents logistical issues as to how a company would get the equipment to the employee safely.
From an operations point of view, having a significant number of people working from home can present problems both in terms of ticket volumes and the types of issues. In a standard workplace, workers will often ask a co-worker how to resolve something before contacting the help desk. In the work from home context, this interaction is not possible. The types of issues that a worker may request assistance on will also be different while working from home, where all the equipment and connectivity is essentially uncontrolled.
rocketwise’s LaunchCloud virtual desktop is a service that could be one part of a COVID-19 response plan.
With LaunchCloud, we no longer need to be concerned with the constraints of the physical hardware or a person’s location. In the example above if the worker cannot come into the office, they can request a virtual desktop which can be quickly and easily provisioned based on their profile, and within minutes they can connect through the a Windows computer, web browser, Android device, Apple Mac/ iPhone or iPad.
In addition to being fast and scalable, LaunchCloud has the benefit of ensuring that your corporate data always remains within your control.
While in a “normal” virtual desktop deployment scenario we need to consider bandwidth to/from the workplace, for a situation such as COVID-19 this is not an issue, as connectivity is from the remote workers home to the LaunchCloud data centers.
Of course, some things will need to be overcome; for example, how does a remote worker access voice and video through a virtual desktop? One obvious answer would be to utilize a personal device just for this, although other solutions also exist.
We have been having discussions with clients about how we can enable LaunchCloud for them. The majority of our clients have been using LaunchCloud for daily operations over the last several years.
We have prepared a rapid start offer to allow clients to quickly enable and test virtual desktop deployments, allowing them to determine if it can form part of their COVID-19 response plan.
Topics: Windows, Web & Cloud, Virtualization, Security, Productivity, Business, Business Continuity
As cyber-attacks continue to make headlines, hackers are exposing or selling customer data files in record numbers. But just like with any threat, there are actions you can take to minimize risk and ensure your business retains a positive reputation among customers.
If you would like to make sure your business is secure from data breaches, give us a call at 888-686-5224.
Topics: Security
Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used.
A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a phishing attack captures the login details you enter so an attacker may use them to enter the genuine service later.
By sending out tens of thousands of emails at a time, attackers can guarantee that even if only one half of one percent of people fall for it, there is a lot of profit to be made by draining accounts. Spear phishing is a more modern, more sophisticated, and far more dangerous form of the attack. It’s typically targeted at businesses and their staff.
A Convincing, Dangerous Attack
While a traditional phishing attack throws out a broad net in the hope of capturing as many credentials as possible, spear phishing is targeted and precise. The attack is aimed towards convincing a single business, department, or individual that a fraudulent email or website is genuine.
The attacker focuses on building a relationship and establishing trust with the target. By building trust and convincing the target that they are who they are pretending to be, the user is more likely to open attachments, follow links, or provide sensitive details.
Consider how many times you have followed a link or opened an attachment just because it has come from a contact you have trusted before.
A Trusted E-mail
The malicious email can appear to come from a vendor you deal with regularly. It may even look like an invoice you are expecting to receive. Often attackers can simply substitute the vendors’ banking details for their own, hoping the target will not notice the difference.
Such an attack is very difficult to detect. It takes a keen eye, strong working knowledge, and constant awareness to keep your company protected. Even a single small mistake by an unaware member of staff can compromise your business accounts.
Defending Your Business
The key to stopping a spear phishing attack is education. Learning attack techniques, and how to protect against them is the single biggest thing you can do to enhance business security.
Whenever you deal with a vendor in a business transaction, you should always consider important questions before proceeding. Are you expecting this email? Is the vendor attempting to rush you into a quick decision or transaction? Have you checked all the details are correct and as you expected? Sometimes a simple query to the vendor can protect you against worst-case scenarios.
In many cases, a phishing attack can be halted in its tracks with a strong IT security package. Web filtering prevents malicious emails and links from entering the network, shutting attacks down before any damage can be done.
Good Security Practice
As with many types of IT threat, good security practices help mitigate damage. Locking down security to ensure employees only access the systems they need helps to prevent damage spreading across the network.
Enforcing unique and strong passwords prevents leaked credentials from affecting systems related to the one that has been compromised. Getting employees set up with a password manager and good security policies can do the world of good to boost your security to the level it needs to be.
Give us a call at 888-686-5224 to audit your security practices. It could be the difference that secures your firm against sophisticated spear phishing attacks.
Topics: Security
Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it?
A security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it.
A newly discovered attack might be packaged into a computer virus or worm. This will allow it to spread far and wide while inflicting the maximum amount of damage possible. When spread successfully, a new exploit has the potential to reach hundreds of thousands of computers before an operating system or anti-virus update can even be issued.
There are a number of ways we can protect your business or lessen the damage from a zero-day attack.
Preventative security
The number one way to mitigate the damage from any attack to your system is to prevent it from happening in the first place. Maintaining a good firewall and up-to-date antivirus is the best step you can take to ensure the security of your system.
A firewall, monitoring traffic in and out of your network, reduces unauthorised entry over the network. Even without knowing the exact nature of the attack, suspicious activity travelling in and out of the system can be stopped.
The same is true of modern Antivirus. Even when it can not identify the specific zero-day threat from its virus database; it can often identify malicious intent from learned behaviour in the system.
A Locked Down Network
Should a zero-day threat make it into your network, our next goal should be to limit its effects. By restricting user access to only essential files and systems we can limit the damage done to the smallest number of systems. Good security policy dictates that each account should only have full access to the systems needed to complete the user’s job. For example, users from the accounts department shouldn’t have access to sales department databases.
In this way, the damage of a single compromised account is limited to only the network area it operates in. Such limited impact should be easy to control and can be reversed with regular backups.
Good Data backup
Whether your entire network has been exploited or only a small area has been affected; good data backups are your protection against major lasting damage. Having a good backup means having the procedures in place to both create regular backup copies and make sure they can be restored at a later date.
Reliable and well-tested backups are worth their weight in gold. Knowing your data is safe and your system can be recovered is peace of mind against even the most highly destructive zero-day attacks.
Intrusion Protection
While the precise methods of a zero-day exploit can’t be known in advance, a network intrusion protection system (NIPS) can monitor the firms’ network for unusual activity.
The advantage of NIPS over a traditional antivirus only system is it does not rely on checking software against a known database of threats. This means it does not need updates or patches to learn about the latest attacks. NIPS works by monitoring the day-to-day patterns of network activity across the network.
When traffic or events far out of the ordinary are detected action can be taken to alert system administrators and lock down the firewall. Devices such as USB drives and mobile devices can all introduce threats to the network. They can often make it past the firewall because they are physically introduced to the system.
NIPS protects against threats introduced to the network from both external and internal sources.
Full Cover Protection
Used in combination these techniques can prevent, protect, and mitigate against the kinds of threats that even the top security firms haven’t patched yet. We think it’s important to keep your firm secure whatever it might come up against in the future.
If you could use help protect your business against online threats, give us a call today at 888-686-5224.
Topics: Security
We often tend to be creatures of habit, particularly when it comes to technology. Passwords are a prime example. Many of us use the same logins for multiple websites and applications because we don’t have a photographic memory. A large percentage of users aren’t aware that this is one of the most significant security dangers they can face online. It has a simple fix too.
Regularly, in the news today, there are stories about major companies being hacked, their customer data stolen, and their customers left stranded. Hackers commonly use data stolen from one site to access others where login credentials have been reused between accounts. In some cases, access to bank accounts has been gained simply by using a compromised email account.
Businesses and individuals can face significant losses simply because a third party outside their control has been hacked or compromised.
The Danger Of Old Passwords
MySpace is a key example of why old and possibly forgotten services pose a security danger when passwords haven’t been regularly changed. Once a thriving popular network, the use of MySpace services declined drastically from 2007 onward. While many people moved to new social networks, old accounts typically remained abandoned on their servers. Hundreds of millions of accounts remained on MySpace servers many years past the firm’s peak.
In 2016, MySpace suffered a data leak which exposed usernames, emails, and passwords of 360 million user accounts. Shortly after the hack, these details were published online for anyone to see. Many were used to access email accounts, servers, and accounts that shared the same details.
Shared Responsibility
Even if you have never had a MySpace or social media account personally, how many of your employees or coworkers have one or more? Many have had more social media, forum, or game accounts than they care to remember. Have their passwords been updated since 2016?
Your business network protects your systems, work, and intellectual property. For many firms it’s the single most critical component, the backbone to business operations. Keeping it secure regardless of the number of people, staff or clients using it is a crucial task.
Consider how many people currently have access and how many of those may reuse their password on another website or service. Just reusing your password once can expose you to the hacking of a third party entirely out of your control.
Password Management
Good security practice is to use a unique and strong password for every login you use. A strong password should include, where possible, capital letters, lowercase letters, numbers, and character symbols. Many consider this impractical or even impossible, but it is entirely achievable for every firm.
It is clearly impossible to manually remember a strong password for each one of the dozens of logins needed today. Few would even attempt to. A password manager makes storing, retrieving, and using unique passwords easy.
When using a password manager, an individual is required to remember only one single strong password to access a database which contains a different login password for each service. This database can be synced between multiple devices, saved and backed up to the cloud, and even used to create strong passwords for you.
Strong Protection
Password managers can be used to implement security policies that demand zero password reuse, between services or over time, and set strict limits over the duration a password can last. With the right policies in place, both your business and your employees are protected against attacks from hackers that have compromised third-party sites.
The maximum recommended lifetime of a password for any service is a single year. Make the start of the calendar year the time which you refresh your passwords and start new.
To help keep on top of your security and make sure your firm is safe well into the new year, give us a call at 888-686-5224.
Topics: Security
A single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.
Quickly spot the red flags and put phishing emails where they belong:
1. Poor spelling and grammar While occasional typos happen to even the best of us, an email filled with errors is a clear warning sign. Most companies push their campaigns through multiple review stages where errors are blitzed and language is refined. Unlikely errors throughout the entire message indicate that the same level of care was not taken, and therefore the message is likely fraudulent.
2. An offer too good to be true Free items or a lottery win sure sound great, but when the offer comes out of nowhere and with no catch? There’s definitely cause for concern. Take care not to get carried away and click without investigating deeper.
3. Random sender who knows too much Phishing has advanced in recent years to include ‘spear phishing’, which is an email or offer designed especially for your business. Culprits take details from your public channels, such as a recent function or award, and then use it against you. The only clues? The sender is unknown – they weren’t at the event or involved in any way. Take a moment to see if their story checks out.
4. The URL or email address is not quite right One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com] Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text, send that email to the bin.
5. It asks for personal, financial or business details Alarm bells should ring when a message contains a request for personal, business or financial information. If you believe there may be a genuine issue, you can initiate a check using established, trusted channels.
While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available.
Give us a call to discuss how we can secure your system against costly phishing attacks.
Topics: Security
Your dealership is under attack! Hackers can break into your email to plunder your business bank account. It happens every day.
Order your Free Copy of "Compromised" today and discover how to stop it from happening to YOU.
Your team has so much more to give, they just need the right tools to help unleash their potential - regardless of where they work. One key tool can do just that - Microsoft Teams.
Download your free copy of our Step-by-Step Guide for getting the most out of Teams.
Ready to make this a wildly successful year for your business? To shake off the memories of 2020, and focus on increasing sales and profitability? Excellent.
A great place to start is helping you and your team to get more done in less time.
As a precaution, many businesses have decided to have their staff work from ...
Read MoreBecause of the current COVID-19 pandemic, many of us have been considering how ...
Read MoreThe start of a new year is a challenging time for businesses. It can be a good ...
Read MoreYour old computer is beginning to slow down. So, you invest in a shiny new ...
Read MoreVery few things in life are as intensely frustrating as slow network speeds. ...
Read MoreTechnology today allows us to accomplish more tasks faster than ever before. ...
Read MoreYou’ve seen all the ads for Office 365. They’re popping up on your desktop, ...
Read MoreBecause of the current COVID-19 pandemic, many of us have been considering how ...
Read MoreAs a precaution, many businesses have decided to have their staff work from ...
Read MoreBecause of the current COVID-19 pandemic, many of us have been considering how ...
Read MoreBecause of the current COVID-19 pandemic, many of us have been considering how ...
Read MoreYou’re only three steps away from taking your dealership to the next level.