866-474-8515

Is Cloud Computing Secure?

In the early days of Cloud computing, the common perception was that the Cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems. Yet, as Cloud adoption becomes more universal, these high levels of adoption are actually seeing an increased level of trust in Cloud computing systems, which begs the question: Can the Cloud lead to more secure computing? Traditional Network Security Traditionally, organizations have used on-premises security solutions or contracted with network security experts to protect their network, data, and applications. Data centers imbue a sense of security and control for businesses – feeling more secure is likened to locking down a warehouse and visualizing that anything within the walls of the organization is safe. There’s no question, then that businesses feel an inherent unease with the Cloud concept, because the approach itself seems insecure; your data is stored on servers and systems you don’t own or control. Yet, does control necessarily equate to security? The Cloud is Just as Safe as On-Premises Security IT security experts are claiming that fears of the Cloud being unsafe can largely be put to rest. In fact, the Cloud may actually be able to improve the state of IT security. Many Cloud  security experts dispel the Cloud insecurity myth. Many believe the Cloud is  more secure than traditional systems. So, can your business trust your Cloud Service Provider (CSP) to also handle network security? Which Platform is Right for Your Business? The answer depends on...

Do You Have an Effective BYOD Policy?

According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300 million shipments for the second quarter in a row. Although there have been rumors of a slowing market, the data clearly states otherwise. As technology pushes small to medium sized businesses towards smartphones and other mobile devices in the workplace, it is more important than ever to establish an effective BYOD (Bring Your Own Device) policy. 1.     Decide What Mobile Devices Are Allowed  If your company allows your employees to bring their own devices to work, it can be a nightmare for IT to have to support multiple platforms. Therefore, it is important to decide what devices are allowed to be used for work. Decide whether it is more cost-effective to purchase your own company devices to hand out to employees. 2.     Establish BYOD Security Policies It is important for your company to establish an “acceptable use policy” for their mobile devices. This will curb employee distractions and reduce risks for harmful viruses and malware. Your company should also develop a monitoring system and disciplinary action for employees who disobey the policy. Although this may seem harsh, it may avoid a security breach down the road. 3.     Employee Exit Policy In addition to creating an acceptable use policy, it is equally important to come up with an exit policy for when employees leave the company. Document in your employee exit checklist to ensure you remove the employee from access to information on the network,...

It’s Time to Take Cloud Security Seriously

While cloud security concerns are top of mind with many business owners, the benefits of the cloud far outweigh the risks. Nevertheless, as companies deploy cloud computing, taking cloud security seriously will ensure a smooth transition to the cloud. Top Cloud Security Concerns If you are moving your business to the cloud it is important to understand and address your security needs. For many companies, the top concerns of cloud security are cloud service provider’s encryption policies, business continuity and disaster recovery capability, data protection and data integrity. There are a number of other critical concerns, such as the physical security, identity and access management, and regulatory compliance. How to Protect your Data in the Cloud Create Strong Passwords An important step you can take to protect your data in the cloud is to create a policy for passwords within your organization. By requiring a string of text combining numbers, letters (both uppercase and lowercase), and special characters your employees will avoid common passwords that are easily hacked. Also, ensure that your company policy requires changes to passwords regularly and asks employees to use unique passwords when accessing the cloud from their desktops. Network Compliance In addition to creating strong passwords, it’s important for your company to keep your network in compliance. Your network is secure as its/ weakest point of access.  Ensure desktops, laptops, tablets and smartphones are maintained with the latest operating system patches and are protected by up to date antivirus and antimalware definition updates. End User Training on Security Employees with a clear understanding of security policy and related risks will help keep your data...

Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats.  Cybercriminals hack databases for passwords for unauthorized access to your network.  Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks.  Small businesses may be more vulnerable to downtime and loss of productivity because of thinner margins and resources. Here are a few steps you can take to survive a network security attack. Prevent Network Security Attacks Before they Occur Protect your network by making sure all devices are in compliance with the latest anti-virus and malware updates. Ensure your operating system (O/S) patches are up to date. Protect your network with strong passwords and require your employees to change them regularly.  Discourage writing passwords down, and make sure employees are aware of the risks of a network security attack. Lock Down your Mobile Devices Mobile devices including smartphones and tablets are particularly vulnerable to theft and loss. Passwords on these devices can be easily cracked leaving your applications and data vulnerable to unauthorized access. Train your employees to report theft or loss of mobile devices quickly, and make sure that all data on the device is encrypted.  Having the ability to track and wipe data from these devices is another option to ensure you can survive a network security threat. Backup Your Data Online Backup and Cloud Backup are affordable options to have quick access to applications and data...

Windows XP Updates to End on April 8

According to Microsoft, support is ending for Windows XP after April 8, 2014.  Technical assistance, including automatic updates that help protect your PC, will no longer be available after this date. Microsoft will also stop providing Microsoft Security Essentials for download on Windows XP. When Microsoft withdraws support for Windows XP updates, many businesses will need to migrate to Windows 8.1 or modernize their IT Systems to another platform.  With Cloud Computing and Mobile Computing, there are a variety of options available.  For those who choose to stay on Windows XP, here are some considerations: Windows XP Updates for Security Discontinued Microsoft’s discontinuation of automatic updates and security patches for Windows XP may leave you vulnerable to Malware and viruses, which may cause IT Security risks for your PC and network.  Remember: your network is only as secure as its weakest link. ISV and Software Support for your Popular Applications The latest versions of your applications may not be available for Windows XP.  Web conferencing applications, office productivity applications, and other business applications may not be supported by the software developer when Microsoft discontinues its XP support. Maintaining Compliance on Windows XP After April 8 your Windows XP machines will no longer have O/S patches. Without O/S patches, your ability to comply with your IT policies and procedures for industry and regulatory requirements, including PCI and HIPPA, could be compromised. Consider these tips to keep your IT Systems up-to-date and keep your business running in a secure and reliable manner.  Migrating from Windows XP with the help of an IT Service & Support Professional can help you get the...