Password Security

Password Security

When it comes to security, the concern we should have is passwords. Whether you are a bank customer or business owner, your password is the key that can unlock valuable information about you and your personal/business assets. This information can be obtained and taken by malicious individuals who want to cause harm.

Passwords are one of the most important components and must be kept safe from hackers. These passwords are very easy to hack because we tend to reuse the same password for different sites or services. Once a password or password file has been compromised this information can be used to further harm you and your business/personal assets.

This article will provide you with some tips and tricks on how to keep your passwords secure and prevent any potential harm.

First thing when it comes to making your password stronger is not to use the same password across all services. This is a very bad practice and can result in you losing access to most of your banking information or your personal accounts. When it comes to passwords, we tend to keep them short, simple and easy for us because we are afraid of being hacked. This will make it much easier for hackers to hack into our system and steal sensitive information from us.

You might be worried that using a strong password is an inconvenience and might take away your time. The truth is, the most important thing to remember is that passwords are one of the first lines of defense between you and potential hackers. Just like your lock on the front door, it can stop a lot of unauthorized people from entering your house!

Password strength should never be compromised for convenience.

Read More
Cybersecurity, Managed Services John Enright Cybersecurity, Managed Services John Enright

What is Ransomware and How Can it Affect Your Business?

This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the last few years and its practitioners are so polished that in few cases they even have mini­call centers to handle your payments and questions.

So what is ransomware? Ransomware stops you from using your PC, files or programs. The business model is as old as the earliest kidnapping. They hold your data, software, or entire PC hostage until you pay them a ransom to get it back. What happens is that you suddenly have no access to a program or file and a screen appears announcing your files are encrypted and that you need to pay (usually in bitcoins) to regain access. There may even be a Doomsday-style clock counting down the time you have to pay or lose everything.

Interestingly, one of the more common “market segments” being targeted in the US has been public safety. Police department data is held hostage, and in many cases, they have given up and paid the ransom. They had little choice. They aren’t the only ones. A hospital in Southern california also fell prey, as did one in Texas.

Ransomware can be especially insidious because backups may not offer complete protection against these criminals. Such new schemes illustrate why you need to have a professional security service that can keep you up to date on the latest criminal activities in the cyber world. Talk to us about possible protections against ransomware.

Read More
Cybersecurity, IT Alerts John Enright Cybersecurity, IT Alerts John Enright

Complimentary IT Alert-Keys For Crysis Released

Keys For Crysis Released, As Decryption

Efforts Of WannaCryptor Files Continue

Description:
While the entire cybersecurity world is focusing on WannaCryptor ransomware and ways to help its victims, someone has released 200 master keys for the latest variants of another notorious ransomware family.
What you can do?




All users must keep their operating systems and software updated, use reliable security solutions with multiple layers of protection, and regularly back up all important and valuable data at an offline location (such as external storage).

Article Source:

https://www.welivesecurity.com/2017/05/22/keys-crysis-released-decryption-efforts-wannacryptor-files-continues/

Protecting your business from unwanted threats can save you time and money. We hope you found this information helpful. If you would like to find out if you are at risk, sign up for a complimentary security risk assessment today. A security risk assessment is a great way to identify the strengths and weaknesses of your IT infrastructure.

Best,

John Enright
Strategy & Business Development
(508) 872-6029 x2
Net DirXions, Inc
View Website
Read More
Managed Services, IT Management John Enright Managed Services, IT Management John Enright

Are Managed IT Services Right For You? A Few Things to Consider

Are Managed IT Services Right For You? A Few Things to Consider

How do you get a small business to recognize the value of manages IT services? In the start-up environment, we encounter an eclectic bunch of personality types. There is a reason people become entrepreneurs or C-level execs. When we meet the owners or decision makers at smaller companies and organizations, we can tell right away why they're where they are. They're visionaries. They're risk takers. They're competitive. They want to be in charge.

Therefore, they aren't always quick to place the fate of their business technology in the hands of a third party. They've come as far as they have by being in control and they're hesitant to give up that control. But we've learned a few things along the way.

For example, the Type A personality is highly independent but also very competitive. So we tap into the competitive advantage that managed IT services gives them.

The Type B personality is creative and doesn't like static routines. But their ears perk up when they hear terminology like "cutting-edge" and we can then paint the big picture for them once their listening.

But anyone we do business with has to be committed to the efficiency, security, and stability of their business technology to see our value proposition. And they have to recognize that managing their IT infrastructure is an investment they cannot take lightly.

So here are a few things we commonly have to address before any deal for managed IT services is signed.

Is my business large enough to even consider managed services?

The truth is, any company, regardless of its size or the number of people they employ, will run more efficiently if its technology is monitored, maintained, and managed properly.

These are facets of your operations that drive profitability and give our Type A personalities that competitive edge they crave. And they can rest easy whenever business is booming because their technology is built to sustain their growth. That's the big picture that our Type B personality can appreciate.

How is making another IT investment a cost-savings move for my business?

There are still many SMBs who feel a greater focus and investment should go towards their core operations or marketing and sales. They only worry about technology when it breaks, figuring they'll just call a service technician to come to the office and fix whatever the problem is. Or buy some new hardware at Office Depot.

There are some very obvious flaws to this strategy.

  • You're paying way too much when it's way too late – An issue that was likely preventable with early detection has escalated into a full blown business disruption and that on-call technician likely charges a high hourly rate, on top of hardware replacement costs, and may not get to your site right away. Being proactive rather than reactive to technology issues is important.
     
  • Don't forget productivity killers – It's taking your employees too long to boot their computers. Servers and applications are running slowly. Employee devices are full of Malware. Non-technical employees are running around troubleshooting tech problems. If you see this, your present approach to IT management is killing employee productivity and your bottom line.
     
  • What happens internally is noticed externally – Don't think for a second that customers or clients don't notice outdated or slow internal technology and mismanagement. If your site or applications are down often, run slowly, or your customer service rep tells them "I'm sorry, our system is down", they're noticing and it's hurting your business.

When all is said and done, professionally managed IT services will give you a competitive edge, guarantee your business is always leveraging the newest most cutting-edge technology, and enhance your relationships with customers and clients – all while reducing costs.

Read More
IT Management, Managed Services John Enright IT Management, Managed Services John Enright

Understanding Managed Services and How They Benefit SMBs

Understanding Managed Services and How They Benefit SMBs

Small to medium sized businesses (SMBs) receive a lot of calls each day from slick sales people peddling the next technology trend that’s going to save them money and revolutionize how they do business. They’re all too quick to caution that if you don’t listen to them, you’ll fall behind the times, and eventually be swimming in a sea of debt and out of business.

No doubt you’ve heard, or you’ve at least read about, the benefits of managed services. Managed services refer to clearly defined outsourced IT services delivered to you at predictable costs. You know the exact IT services you’ll be getting and what you’ll pay for them. There is no surprise sky-high bill for services rendered. So are solicitation calls that pertain to managed services worth listening to? We think so. Then again, we’re in the managed services industry. There may be a bit of a bias here.

How Managed Service Providers Work

Managed service providers (MSPs) use remote monitoring and management (RMM) tools to keep an eye on their performance and overall health of the IT infrastructure that powers your business operations.

Your MSP should have a 24/7 Network Operations Center (NOC) that acts as your mission control center. If the monitoring alerts them to any issue with your servers, devices, hardware or software, they respond quickly to resolve the issue.

Additionally, the NOC performs regular systems maintenance such as

  • Automated tasks like the cleaning of temporary files
  • Applying tested security patches as required
  • Installing virus and Malware protection
  • System backup and disaster recover/business continuity processes

Additionally, your MSP should give you access to a Help Desk that services your customers and employees – speaking to and working with them directly as if they’re part of your staff.

This proactive maintenance, stabilization of your IT environment, and rapid as-needed remediation helps SMBs control technology costs and better serve the end-users who rely on their technology.

Is Managed Services Better than Other Ways to Manage IT

We find that far too many companies have no real perspective about how much IT management costs them. Let’s review some of the alternatives to managed services.

Hiring In-House IT Support

Typically, a firm with anywhere from 20-60 employees may feel that one person can manage their technology. Understand that this one full-time employee can demand a significant salary since they’ll have to be proficient with desktop, server and network support, and interact with both end-users in the Help Desk role and management. They will likely be overworked and vulnerable to error or oversights that may prove to be costly. And what happens if they’re out sick or on vacation?

Read More
BDR, IT Management, Managed Services John Enright BDR, IT Management, Managed Services John Enright

Breaking News: Downtime Kills Small Businesses

Breaking News: Downtime Kills Small Businesses

Downtime is bad news for any business whether big or small.

A recent two-hour New York Times’ downtime occurrence sent Twitter ablaze and their stock price plummeting.

Google going down for one to five hours resulted in lost revenue up to $500,000 and decreased overall web traffic by 40%.

We know what you’re thinking. Holy crap, Google makes $100,000 an hour? Yeah… insane, huh?

While the hourly cost of downtime for a small-to-medium sized business won’t be nearly as large as that astronomical Google figure, downtime is often more detrimental to smaller companies. Smaller enterprises are more susceptible to downtime and are neither large nor profitable enough to sustain its short and long-term effects.

Downtime Leads to Unhappy/Unproductive Employees

Even the happiest of employees become dissatisfied when they can’t perform basic day-to-day job functions or properly service customers or clients.

While some employees may use downtime as an excuse to lean back, put their feet up, and comfortably collect their hourly pay, we’re talking about those employees who come to work to actually work.

And don’t forget your IT guy or tech crew. They can’t necessarily sit back and twiddle their thumbs when downtime occurs because they’re typically taking the brunt of the storm. They will ultimately grow tired of the daily routine of having to put out fires and having neither the additional manpower nor resources to change things for the better.

These things lead to high employee turnover and the expenses that come with training and re-training a revolving door of employees.

Downtime Leads to Customer Dissatisfaction

Customers and clients grow weary whenever critical components of your operations – or the services they either expect or pay for – cannot be accessed.

Nearly 50% of customers will move on to a competitor if they encounter downtime of five minutes or more. These customers represent significant lost revenue.

While some suggest this is a bigger problem in the retail sector, other types of businesses are impacted as well. Have you ever clicked a link from search engine results only to quickly bolt when the page didn’t load, you couldn’t complete an online transaction, or you were greeted with a “Technical Difficulties – Be Back Up Soon!” message?

Did you give up on finding what you were looking for or did you wait it out? You did neither. You went back to Google and found someone else offering a similar service or product that satisfied your yearning for instant gratification.

Downtime Ruins Your Reputation

One of the most commonly overlooked consequences of downtime is the hit your company’s reputation takes online. In this age of social media, one person’s bad experience is broadcast to dozens or even hundreds of followers. Bad news spreads faster than ever and has lasting repercussions.

Read More
HIPPA, Cybersecurity, IT Alerts John Enright HIPPA, Cybersecurity, IT Alerts John Enright

Get The Best of Both Worlds The benefits of cloud-based IT services + the HIPAA compliance healthcare providers need

In the healthcare sector, the storing and sharing of sensitive digitized patient data has become a significant undertaking and is a heavy burden on resources. Preparation for a complete conversion from paper medical records to electronic health records (EHR) by 2015 has independent practitioners and small healthcare entities making significant investments in equipment, hardware and software, and tech-savvy personnel.

Rather than focusing on the delivery of core patient care services, they must now worry about IT infrastructure issues, underlying network constraints and data center accessibility as well. This is problematic as very few medical offices or small health service organizations can afford to employ dedicated IT staff.

Recent modifications to the HIPAA Privacy, Security, Enforcement and Breach Rules have made it clearer that data center operators are to be classified as business associates under HIPAA. This means cloud-service providers are required by law to report and respond to data breaches and uphold their obligation to properly protect and secure patient info. These modifications are a game changer because they now assure covered entities such as doctor offices, hospitals, and health insurers that they can remain HIPAA compliant while adopting cloud technology.

Major Benefits of the Cloud for the Healthcare Sector ƒ

Security – Ironically, the biggest concern most healthcare entities have about taking to the cloud is one of its biggest strengths. Recent updates have made CSPs as responsible and liable for HIPAA compliance as the healthcare institutions that hire them. CSPs must ensure that data is encrypted, backed up, easily recoverable, and secured with permission-based access. 

Costs – Reduced costs are an incentive for healthcare entities to take to the cloud. Costs are dramatically cut since the cloud moves everything into a virtual environment, eliminating the need for costly hardware, software, maintenance, data center space, and IT labor. Payas-you-use fees requiring little-to-no capital investment replace these often overwhelming up-front capital expenses. 

Scalability – With the 2015 EHR conversion deadline nearing, and the fact that health service providers are generally required to maintain patient medical records for at least six years, it’s easy to anticipate that managing such a high volume of patient data will inevitably stress any on-site IT infrastructure. But the cloud presents a scalable alternative where additional server or storage capacity is available as needed. 

Mobility - The cloud improves a physician’s ability to remotely access readily available patient information. This enables even the busiest physician to review a patient’s medical records or test results even after they leave the office. 

Sharing – Cloud computing keeps physicians better connected to not just their patients but their colleagues as well. Patients will notice benefits to medical professionals being able to share patient information online – for example, referrals to specialists will be more timely, there will be less paperwork to fill out with each office visit, and no unnecessary repeat diagnostic tests. 

Are You Ready for This Transition?

The transition to cloud computing is underway in the industry. For healthcare service providers, it is no longer a question of if they will transition to the cloud, but when they can start benefiting from its potential savings and all of its capabilities. Healthcare is a heavily regulated industry and cloud computing will continue to evolve to meet the industry’s growing security requirements and regulatory mandates.

Many legitimate CSPs familiar with the healthcare sector already have strict security protocols in place to comply with regulations and will not hesitate to sign a BAA when asked. It is best to choose a CSP cautiously. Avoid any CSP who refuses to sign a BAA and carefully evaluate even those who do to get a feel for their stability, level of service, and delivery on promises. Taking care of people - not your IT infrastructure - is your core service. Why not put the money being spent right now on hardware, software and equipment back into patient care while actually strengthening patient data integrity and security? 

Read More
BYOD, Managed Services John Enright BYOD, Managed Services John Enright

BYOD: Why is This Concept So Attractive to Employees?

Bring Your Own Device, or BYOD, to work was an idea a few years ago that is becoming a reality very fast. To use your personal smartphone, tablet or laptop for work seems increasingly natural. Employees are embracing this concept without any serious reservations. As more and more business activity becomes technology driven, to have electronic gadgets right by your side all the time make sense. According to a survey conducted by Logicalis about 75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets bring their own devices to work.

Let's examine all the factors causing people to want to use their own devices at work.

  • Familiarity: This may be the most relevant reason for someone to bring their own tablet or laptop to work. It may be the operating system, web browser, or other apps on their devices that they know so well and feel comfortable using.
  • Convenience: Companies have been providing their employees mobile phones for business use for a few decades. Now those employees have to carry two phones, since everyone also has a personal phone. This duality is a nuisance. It is hard enough to care for one mobile phone and now they have to worry about two of them. The reality is that companies expect employees to be in contact 24/7, so company devices can't just be used at work. They have to be carried home, out to the store, etc. If the employees have a choice they would much rather carry just one phone, their own, enabling them to be reachable by family and friends anytime. Also it could be cheaper if their company offers to share the cost of using their device for business.
  • Productivity: Convenience can also result in better productivity. Having fewer devices means fewer distractions. Fewer distractions equals less wasted time. Saving time is always good for productivity.
  • Personal contentment:It makes employees feel good to be able to use their own devices at work. Higher employee morale is very important for any organization. Happier employees are more likely to work hard. A positive environment is also a factor in lower turnover. So if an employer gives its employees the liberty to bring their own devices to work it may have more satisfied workers.

Overall, people in the workplace are using their own devices so they can accomplish more in less time. It makes them happy to have their personal devices at work, as well as making them feel good about their job if they are allowed to use the devices that they are most familiar with.

Read More