banner-section
CALL US 402.398.9580

How to keep your business secure while allowing staff to work remotely

Alyssa Sisco

With the right company culture and technology tools, it’s possible to work effectively and efficiently while outside of the office. Given access to email, chat, video conferencing, cloud collaboration tools, and more, there aren’t a lot of office jobs that can’t be done off-site. Studies show that flexible work options reduce turnover, improve morale and to top it all off, over two-thirds of employers report increased productivity among their telecommuters.

Taking all this into consideration, it's no wonder why the number of people spending at least some of their hours each week working remotely is continuing to rise. When a business decides that allowing their staff to work remotely could positively impact their business, there are some steps they need to take to ensure that they have the proper security measures in place. Here are a few items your business should implement to thwart a cyber attack:

Read More
Topics: Owners & Managers, Trends, Network Security

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. Can you rely on each staff member at your company to successfully identify and protect against these attacks?

Read More
Topics: Staff Training, Security Threats, Network Security

Windows Server 2008 end of support

Alyssa Sisco

Support for Windows Server 2008 and 2008 R2 is ending on January 14, 2020.

This means that no more security updates will be developed or released after January 14, 2020. Running unsupported software on your server can leave your business vulnerable to any number of cybersecurity attacks and may keep your business from meeting compliance requirements.

Read More
Topics: Microsoft Products, Network Security

End of life for Windows 7

Alyssa Sisco

A constant drive to create new features, combined with limited resources, leaves software with an expiration date. Since the goal of most tech companies is to evolve and innovate, they can only lend so much time, money and energy on their old programs. So, software is given what's called an end of life date. On that day, the developer will no longer fix any issues found in the software. Not even Microsoft has the resources to keep software supported forever. So, it's coming time to say goodbye to Windows 7. Windows 7 will no longer receive patches for new bugs or holes discovered as of January 14, 2020.

Read More
Topics: Microsoft Products, Network Security, Alert

Are you an easy target for phishing scams?

Alyssa Sisco

The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself.

Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the addition of a subject line that will illicit a response, anyone could find themselves clicking on a link before even taking a second to think.

Read More
Topics: Staff Training, Security Threats, Network Security

The shift from ransomware to cryptomining

Alyssa Sisco

In its earliest days, ransomware wasn’t much of a threat, because it couldn’t actually encrypt data. But that was in the 80's and 90's, those days are long over in the field of technology. Within the past few years, not only has ransomware become a formidable threat but it has also grown exponentially. The world experienced a growth from 3.2 million ransomware attacks in 2014, to 3.8 million in 2015. Then, in 2016, ransomware attacks jumped to a staggering 638 million. Not only did the amount of attacks increase, but the ransoms themselves shot up from an average of $373 per computer in 2014, to $1,077 per computer in 2016. With 241,000 new variants of ransomware created in 2016 (about 660 new variants per day) anti-malware software was struggling to keep up.

Read More
Topics: Security Threats, Trends, Network Security

The proactive approach to IT

Alyssa Sisco

Sitting around and waiting for bad things to happen is not a recommended strategy for any aspect of life, so why take that course of action when it comes to your IT network? Stay on top of your network’s health by running preventative scans and taking proactive measures to keep your system running efficiently. Trying to fix every little bump or disruption after it occurs, is a lot more time consuming than running automated scans. Often, they are able to identify the root cause of issues, sometimes even before symptoms appear. Here are some of the automated scans we offer and what the benefit is to your business:

Read More
Topics: Network Security

What can a computer hack really cost you?

Alyssa Sisco

Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security Alliance states that about 60% of SMBs who experience a hack, go out of business within a six-month period after the attack.

Read More
Topics: Security Threats, Data Breach, Network Security

Your first line of defense: Firewalls

Alyssa Sisco
Why do you need so many different pieces of software and hardware to keep your network safe? Of course you want to keep your data secure, but why can’t there be a one-size-fits-all solution that protects you from every threat imaginable? That would certainly simplify things, however with the expanse of the web and the continual chain of ever-evolving threats, it's essential that we guard our business with a multi-layered line of defense. This approach ensures that if a new threat is able to sneak its way past one piece of your security system, you have several others standing guard. Today, I would like to introduce you to an essential line of defense: firewalls.
Read More
Topics: Network Security

The solution to your password problems

Alyssa Sisco

I’m sure this isn’t the first time you’ve heard how important it is to use secure passwords online. But here we are in 2018 and “123456” was still the most hacked password of last year. With all the recent security breaches large companies have dealt with, it’s easy to see how anyone could have their online security compromised. That’s why it is so important to create strong, unique passwords for all your online accounts. Nobody wants to have their personal data stolen, or be the reason their company's data is held for a sizable ransom. So why are so many still risking their security by clinging to weak passwords? Let's look at some common reasons and introduce some solutions. 

Read More
Topics: Network Security