866-474-8515

Five Tips on Password Protection

Should you care about how your employees protect their personal passwords?  Depending on your password protection policy in the workplace, your employees may create passwords based on familiar passwords they use for personal use.  Cybercriminals often hack personal websites for privacy information, including username and passwords, so they can gain access to internal systems.  Offering tips to your employees on creating strong passwords may help you protect your valuable corporate data. Passwords are essential for keeping information safe. Since they are a fact of life, we need to know how to keep our systems secure. This takes individual and corporate responsibility. First, individual responsibility. What best practices can individuals establish to keep login credentials safe? Start with a Strong Password Create a strong password, instead of using easy guesses: Though they may be hard to remember, they are also hard for someone else to guess—and hack. Use combinations of capital and lower-case letters; if possible, include numbers and other special characters if your system allows. Numbers can replace letters (3 for “e”, @ for “a”, etc.). Avoid passwords using names of family members, pets, employers or favorite bands. Completely avoid default passwords like “password” or “admin.” Change Your Passwords Frequently Just like you change your smoke alarm batteries, you should change passwords even more frequently. According to a 2014 CompTIA Network+ training blog, change passwords every 30, 60 to 90 days or so. Even if a hacker or malicious site (“malware”) gets the old password, that password cannot be used.  Tagging a number to a previous password or using a similar password isn’t safe enough; the new password needs...

Is Your Network the Weakest Link for Data Protection?

Data protection isn’t just about reliably backing up your application data and files. It is also important to be able to rapidly restore data in the event of data loss. In addition to natural disasters, cyberthreat and human error drive the need for a solid data protection plan and reliable network performance. There are many aspects to keeping your data protected and your Network in compliance. Here is a short list of considerations: Networking and Broadband Connectivity Having a fast, reliable network and broadband connectivity helps you gain access to your online backups for rapid recovery of your application data and files in the event of a data loss. Without a reliable network, your time to recover may go from hours to days. There are many affordable ways to avoid unnecessary downtime, including Multi Protocol Label Switching (MPLS) and Software Defined Networks (SDN) options for Wide Area Networking (WAN) and connecting to the Cloud. Without reliability your network may be the weakest link in your data protection plan. Network Security and Compliance Keeping your network security up to date is a critical component of your data protection plan.  Making sure all endpoints and servers are protected with Antivirus and Anti Malware threat detection with up-to-date threat definitions will help avoid loss of data due to cyberthreat.  Consider routine monitoring of your network to ensure your network is secure. Not only will this help prevent and detect any security breaches, monitoring your network will keep you in compliance with industry regulations including the Payment Card Industry Data Security Standard (PCI DSS), a standard for credit card processing. Employee Awareness of...

Migrating to the Cloud – How to Avoid Turbulence

Migrating to the Cloud can be bumpy if you are not prepared. Chances are you have already started migrating to the Cloud. Without realizing it, you may be accessing the Cloud by using mobile and web based applications and services that store and share your data from the Cloud. According to International Data Corporation, (IDC) public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. The Cloud will outpace the total IT market at a rate of more than five times. With this shift, companies are migrating to the Cloud at a rapid pace, so it is important to plan your Cloud migration to avoid any unnecessary turbulence. Low Hanging Fruit for Cloud Migration Many applications lend themselves to Cloud migration. Communications and collaboration applications including Email, Voice and Web conferencing are great places to start your Cloud Migration. The Cloud can offer a secure, reliable and affordable alternative to maintaining these systems on premise. Along with providing additional capability, such as, File Sync and Sharing, previously unavailable from premise based solutions. Many companies have started their Cloud migrations with these subscription services to gain quick benefits from Cloud Computing. Planning Your Cloud Migration Moving your applications and their data to the Cloud, along with reliable data protection and online backup, should be carefully planned. First, determine which applications are candidates for Cloud Computing. When moving files, applications and back ups for data protection to the Cloud, consider your data volumes and network bandwidth. When this business infrastructure is in the Cloud you will need reliable connectivity to access critical information. Maintaining Security in...

Technology Outlook for 2016

What drivers will shape 2016 technology trends? Businesses using customer facing technology for competitive advantage will fuel demand for Cloud Computing, in particular, Software as a Service.  The Internet of Everything will amplify the number of connected devices in our world leading to additional needs for data protection and CyberSecurity defense. Mobile computing and Cloud Computing adoption will increase the adoption of fast, affordable and secure broadband networking. Here is the short list of what to expect from the biggest trends in technology for 2016. Cloud Computing Adoption Remains Strong Cloud Computing adoption is expected to continue throughout 2016. Software as a Service (SaaS) applications are expected to lead the way. Migration to Cloud based email, sales and customer management applications and other SaaS solutions will drive Cloud growth in 2016. Infrastructure as a Service (IaaS) will continue to grow, however demand will be driven by backup and disaster recovery, single sign on, file sync and sharing, application hosting and other core IT services.  With this increased demand for Cloud Solutions, migration and integration services are expected to also be in high demand. Greater Need for Fast, Affordable and Secure Broadband Mobile Computing and Cloud Computing will put additional demands on network infrastructure. With the additional need for SaaS applications, remote backup and file sync and sharing applications, companies will upgrade business Internet technology for fast and affordable broadband options. Companies will pay particular consideration to available, reliability and security as they adopt broadband network technologies. Internet of Things (IoT):  More Devices, More Security Tablets, Laptops, desktops and smartphones are expected to continue to grow. Now Smart Devices or...

Is Your Business PCI Compliant?

Payment Card Industry Data Security Standard (PCI DSS) is a common sense standard based on good IT Security policy. The objective is to protect customer credit card information from compromise. With the holiday season upon us, eCommerce and credit card processing activities will ramp through the end of the year. Trillions of dollars are transacted via credit card every year. So what can you do to ensure your business is PCI compliant? PCI Compliance Assessment Determine if your company policies and procedures ensure PCI compliance. In addition to technology considerations, your employees should be trained on how to protect credit card information. If credit cards are taken over the phone, never write down card numbers. If employees are entering credit card information into an order processing system or payment authorization gateway, ensure the data is encrypted when stored. If your business uses a Cloud Based service, check to ensure they are PCI compliant too. PCI Compliance and Network Security Another consideration for PCI Compliance is your network security. In addition to a firewall, you should lock down any unsecure WiFi access. Unauthorized access to your network could leave your business open to exposure of malware, virus and man in the middle threats in which credit card information can be accessed without your knowledge. Network Monitoring for PCI Compliance PCI Compliance is not a one time effort. To stay compliant you should periodically review your policies and monitor your systems. Periodic network monitoring can detect any unauthorized access, network security violations and any other deficiencies that require immediate remediation. Maintaining PCI compliance for your business helps you avoid costly security...

Mobile Hotspots – Is Your Business At Risk?

With almost one billion mobile connections in place, it is easy to understand why these devices are targeted by hackers. Employees connecting at Starbucks, in airports, on planes and in hotels open themselves up to additional security breach risk by accessing information through mobile hotspots. Mobile hotspots can be easy targets for hackers by setting up spoofs to get your employees to unknowingly log into unsecure networks, making them vulnerable to Man in the Middle (MitM) exploits. As an employer, it may be impossible to prevent employees from using hotspots, so it is very important to take steps to protect your business. Below is an example of how hotspot hacking works and how businesses with mobile users can protect themselves. Is Your Mobile Device Hackable? According to research by Gartner, almost half of us will first turn to a mobile device for online tasks. Business users in particular rely on mobile connectivity to be productive. Using a open Wi-Fi hotspot may put you and your business at risk of hacking. Most people are aware of the risks, however it comes down to convenience. Hackers can use software that makes a mobile device appear to be connected to a familiar Wi-Fi network, but in reality, all traffic is routed through an imposter that captures your data (MitM). Many mobile applications attempt to stop this type of proxy attack by ensuring a secure, end-to-end SSL connection refusing to make an unencrypted login. However, mobile applications may not always verify the secure SSL connection is actually secure. Does Your Business Needs a VPN to Protect Mobile Users? A Virtual Private Network  (VPN)...