CYBERCRIME: BAD NEWS FOR MIDSIZE FIRMS

Two of the topmost concerns that appear in surveys of CIOs are cybercrime and data security. Rightly so. Nothing strikes closer to the heart of any client than the security of their data. No matter how excellent your product or service, if your clients feel their data is at risk, they are likely to go elsewhere. This fact is of special concern to medium and smaller sized businesses for two important reasons. First, smaller firms are the most likely targets of cyberattacks, and second, customers are harsher in their response to data breaches at smaller firms than they are about attacks on large corporations.

Let’s look first at the likelihood of attack. If you are a small business, then you are a strong target for cyber criminals. Last year, 71% of small to medium size businesses were the victims of cyber attacks. We hear on the news about big cyber attacks on large corporations, healthcare conglomerates, as well as government agencies. The trouble with this news coverage is that it creates a distorted view of where cyber attacks are taking place. These attacks are not solely hitting large organizations and being small by no means keeps you immune.

Smaller firms represent a significant portion of those who suffer from cyber attacks. In fact, small firms can be used as conduits to larger organizations. Smaller businesses have become vulnerable because they are often the inroad to larger, better protected entities. They may be sub-contracting as a vendor, supplier or service provider to a larger organization. That is likely what happened in the case of the Target Corporation in 2013, when over 40 million accounts were accessed.

What makes this even more serious is that smaller firms are less likely to be prepared to handle an attack. 31% of small to medium sized businesses do not have a plan of action for responding to IT security breaches, and 22% admit that they lack the expertise to make such a plan.

Research has found that customers affected by security breaches are generally less forgiving of smaller businesses, especially smaller online retailers, than larger companies. As a result, medium and smaller firms not only must contend with absorbing lost revenue and expenses, they also face a greater possibility of never regaining the customer’s trust.

What does all of this mean? Firms need to prove they are on top of their infrastructure’s security, or risk losing customers and not winning contracts with large businesses. CIOs need to keep on top of all the strategies available to protect their infrastructure. CIOs of large firms are deeply aware of this, but smaller businesses remain less likely to focus resources on anything not directly related to revenue production. Too often, this means less IT security investment. However, this is an area where you cannot afford to cut costs because the consequences are too critical for your business’s future.

Read More
IT Management, Managed Services John Enright IT Management, Managed Services John Enright

HOW NET DIRXIONS CAN CHANGE YOUR BUSINESS STRATEGY

Every business, small or large, has 3 basic levels of technology support needs.

1. Make sure it works - Every organization, from enterprise to not-for-profit, needs IT staff who are able to offer routine maintenance and support, including the updating of hardware and software, handling maintenance, and putting out daily fires.

2. Make sure it works when needed - Technology supports business activity 24/7. Even when everyone in a small business has gone home, there are periodic non-negotiable staff needs at unpredictable times.

3. Make sure it helps make you more money - This top tier is the most important. This is the support that is helping you to proactively manipulate technology to improve revenue.

 

Why Net DirXions?

When you have no or only have a part-timer or one full-time IT person in-house, too much of this well-paid resource may be focused on putting out fires, doing routine maintenance, and handling software updates. Result? The IT staff member that best understands your business doesn't have the time to help you devise forward-thinking applied technology to grow your business. This is a waste of resources. Instead, use their expertise to develop your business: use Net DirXions to provide all of the below-ground support.

 

Here are some areas where Net DirXions can be your best business ally.

1) Specialized areas of support - Net DirXions specializes in specific business sectors and have deep knowledge of the their needs, the specialized software packages and the Federal, state or provincial level regulatory environment. We can help you make sure your technology stays in compliance with regulations, such as those requiring the maintenance of verified security procedures. ( e.g, HIPAA)

2) Help desk support - For all of the various questions, problems, hardware and software crises that can happen anywhere, at any time, a 24/7 help desk means your IT staff isn't distracted by smaller problems, and dragged out of bed by a routine issue at 2am.

3) Security and data protection - With the increasing news about hacking and data theft, it is apparent that everyone will be compromised at some point or another. This is an area where you can benefit from the deep specialized knowledge of an expert. Because it seems new malware and hacking tools are invented on an hourly basis, Net DirXions can provide the support you need to protect your data.

4) Disaster planning and recovery - Smaller firms are the most vulnerable financially to the revenue damage that comes from downtime. However, they have the least resources to focus on this vague and seemingly improbable threat. Net DirXions can provide consulting resources to plan what needs to be done to minimize the effects of a disaster, and put into place procedures to ensure a speedy return to business-as-usual if something does goes wrong. 

5) Software updates - Software updates are a necessity, but can potentially create headaches for every user. Instead of distracting your in-house IT staff with this routine and time-devouring procedure, use the resources of Net DirXions on a scheduled or as-needed basis to handle all of this in the background.

6) Avoid expensive emergency upcharges and exorbitant one-off fees. Net DirXions can offer you a service plan that provides on-going levels of support and includes priority attention in the event of an emergency, so you avoid becoming just another client in the queue. To summarize, the Net DirXions model offers more than IT support. The model provides a different business model for the role of IT as an integral part of your entire long-term development strategy. Technology is more than just a low-level distraction that takes you away from the core issues of your mission as a business. Technology, when managed right, is a key driver of that mission.

Read More

Tech Quick Tips - Understanding Cloud Technology

1. What is the Cloud?

The cloud is virtual and therefore does not require any hardware of your own to deliver a service. Cloud technology can deliver that service to you, without having to install anything or have it on a server at your business. This is something that you can access remotely, or via the Internet through your web browser. Offsite, secure third party data centers manage all of your cloud data so that you can access it at your convenience. 

2. You May Already be Using the Cloud

Are you using Gmail? Amazon Music? A Kindle? Dropbox? These are all cloud services that store the data you access. All you have to do is log in to their servers to get what you need. If you use an Apple iPhone or iPad, then you're familiar with the iCloud service, the cloud technology that allows you to sync and upload your photos and contacts.

3. Why Use the Cloud?

The cloud is convenient for accessing and backing up data no matter where you go. With it, you can access servers anywhere, rather than just locally from your office. This allows you to perform your job duties at home and on the go! There is no need to carry around (and risk losing) USB drives with sensitive information on them. If you lose that USB drive, then your files are gone forever. If you back them up to the cloud or store them there, however, you can easily retrieve that data.

4. Why is the Term “Cloud” Used?

There is both a literal and figurative meaning here. Have you ever laid down in the grass, and looked up at the clouds in the sky? Oh, look, an elephant! A boat! Oh nice, a dinosaur! But the person next to you may not see the same shapes. They may see a sandwich, a skyscraper or an airplane in the clouds instead. The possibilities are almost endless, and not everyone has the same vision. Cloud technology is similar, offering a plethora of possibilities to help support and scale your business. Also, clouds are generally always above us. Just head on up, and grab whatever you need on-demand. The sky is always accessible. 

So, you can store and access files in the Cloud. You can use cloud-hosted applications, like Gmail and GoogleDocs. Finally, the cloud gives you access to your data anywhere with a network connection. This all sounds great, right? It is, but as with anything on the Internet, these services need to be used responsibly. Is your IT services provider helping to manage this?

Read More
BYOD, IT Management, Managed Services John Enright BYOD, IT Management, Managed Services John Enright

Net DirXions Mobile Device Management (MDM)

Keep Your Employees Happy (And Your Data Secure)

Smartphones and tablets continue to flood the workplace, and businesses everywhere are racing to appropriately regulate and manage these mobile devices. To support today’s bring-your-own-device (BYOD) movement, you’ll need a mobile device management (MDM) solution that keeps your employees happy – and keeps you in control.

Net DirXions Mobile Device Management is an affordable, easy-to-use cloud platform containing all of the essential functionality for end-to-end management of today’s mobile devices, including iPhones, iPads, Androids, Kindle Fire devices, Windows Phones and BlackBerry smartphones.

With MDM, you can provide users with fast and secure access to corporate data from their personal devices. And with the industry’s broadest device support, intuitive workflows, simplified deployment options, and advanced management and security features, we make BYOD simple.

 

• Powerful, secure monitoring & management of mobile devices

• Fast and easy deployment – enrollment takes just a few clicks

• Multi-device and OS support (iOS, Android, BlackBerry, etc.)

• Secure containers successfully separate work from play

• Selective & remote wiping of corporate data

• Jailbreaking and device rooting alerts

• Direct technical support – we’ll manage as much the MDM process as needed

 

Unparalleled Peace of Mind

Net DirXions answers the MDM challenge, with an easy-to-use platform that simplifies the management of personal devices – without compromising the user experience, security or privacy. Our solution provides flexible approaches for enrollment, asset management, policy enforcement and the distribution of profiles, apps and docs, all based on device ownership (whether corporate- or employee-owned). We’ll even handle day-to-day MDM monitoring and management, and only escalate back to you the alerts that you want. It’s truly a set-and-forget solution. 

Getting started couldn’t be easier. In just a few quick clicks, you can start enrolling devices and immediately manage the entire mobile device lifecycle — from enrollment to enterprise integration, configuration and management, monitoring and security, support, and analytics and reporting.

Separating Work & Play

Your employees want to maintain one device for both work and play – they want to access corporate email, then check Facebook, jump back to email and review an upcoming presentation over lunch. This need for “dual personas” is exactly what our MDM solution aims to address. So go ahead, let your employees leverage their devices – and rest assured that critical business data and applications will remain safe, secure, and accessible. On your terms!

Read More

Fully Managed Backup & Disaster Recovery

Fully Managed Backup & Disaster Recovery

If the power in your office fails tonight, and all of your computers crash, how quickly can you recover? And more importantly, at what cost? According to the U.S. Department of Labor, 93% of companies that experience a disaster go out of business within 5 years – even if they can recover in the short term.

We’re here to ensure your business doesn’t become another statistic. Our business continuity solution is about more than just backup – it’s designed to quickly revive your network following any unplanned downtime, and ensure your employees are operating productively in almost no time at all.

 

• Complete end-to-end management of backups

• Block-level encryption

• Continuous Data Protection technology

• Fully-managed & monitored

• Cloud replication

• Off-site virtualization

 

Unparalleled Peace of Mind

In today’s always-on business landscape, maintaining an effective backup and disaster recovery (BDR) strategy is becoming more important than ever before. Data is playing an increasingly critical role in decision-making processes, and the costs and risks associated with downtime are skyrocketing – not to mention the damage your brand and reputation can suffer in the event of a disaster.  

Net DirXions’s business continuity solution includes features like continuous data protection, cloud-based replication and recovery, and more – all for one low fixed monthly price per protected server.

What does that mean? It means you can rest easy knowing that your critical data, emails, reports, and other information are all protected, backed up and securely tucked away until you need them. 

Direct Support

Having a backup appliance in place is only the first step in a successful business continuity strategy. To minimize the risk of data loss as much as possible, you’ll want to have technicians proactively monitoring the entire backup process to ensure things are working as expected.

That’s why we’ve got a dedicated team keeping a watchful eye over your protected servers, ready to jump into action should any problems arise. And if the worst should happen, don’t worry – we’ll have you back up and running quickly.

Read More
IT Management, Managed Services John Enright IT Management, Managed Services John Enright

Net DirXions Help Desk and Managed IT Services

Full Problem Resolution & Expert Customer Service

In the world of IT, problems happen. Computers crash, passwords are lost, email stops working, and the list goes on. And without proper technical support in place, these problems can bring your business to an abrupt – and potentially damaging – halt. 

With Net DirXions’s Help Desk, you can enjoy peace of mind knowing that our certified technicians can quickly and efficiently resolve even your most complex technical problems.

Proactive Care & Maintenance

Not every support issue can be called a catastrophe…until it prevents you from being able to do your job. We’re here to help you stay ahead of the curve, so you can focus on growing your business – and to do so, we’ve adopted a proactive approach to network monitoring and IT maintenance. 

That’s why our help desk is a seamless extension of our remote monitoring platform. So when you call to report an issue, there’s a good chance we’re already aware of the problem you’re experiencing – and are actively working to resolve it.

Our technicians receive regular training, coaching and quality review to continuously sharpen their skills, and they’re backed by a team of professional supervisors and managers to ensure consistency and unmatched service delivery. Our technology certifications include:

 

• Microsoft and Apple desktop operating systems
• Microsoft Office and leading third-party applications
• E-mail applications and Web browsers
• Thin clients and virtual desktop infrastructure (VDI)
• Hardware and network troubleshooting
• Printer installation and support
• Mobile phones and tablets
• User administration
• Desktop performance problems

• Virus and malware infections

Read More

Here are the channels hackers can use to break into your IT infrastructure

  • Your website: Hackers have become very sophisticated in cyber attacks on websites. They can access specific information by targeting websites that have the information they are looking for. For example, if they want only financial information about their victims, they can use tools that will fish for the websites that carry that kind of information. Implementation of web-based applications has made it easier for cyber criminals to connect to your website data base. They are able to find the loopholes and hack into systems. They can then access your customer’s personal information, allowing them to steal from your clients by committing credit card and bank fraud. Or they can just sell your client’s info on the Internet.

 

  • Your computers and servers: Your computers and servers are treasure-troves of information. By sending malware into your systems they can steal your admin passwords, and then login to your servers and other network devices. These hardware devices are the ultimate prize for cyber thieves because these devices not only hold important information about your clients, they also have all the information about your business and possibly about your vendors and associates. There is nothing about your business that these hackers don’t know. Imagine how devastating this attack can be.

 

  • Mobile devices used by your employees: If you are one of those entities that allow their employees to use their mobile devices to conduct business, you have another security dimension to worry about. You don’t know how secure their mobile phones, iPads, laptops or tablets are. You don’t know how hard or easy their passwords are to crack. Breach of security into those devices will lead hackers right into your networks where they can steal data at will.

 

  • Unsecure Wi-Fi network: Most businesses keep their Wi-Fi networks well protected, but unsecured Wi-Fi is an open invitation to cyber criminals. If your Wi-Fi network is not secure, hackers are one step closer to breaking into your systems without even trying.

 

  • Your PoS systems: PoS systems are the prime targets for hackers who want to commit financial fraud. Cyber thieves know that PoS systems that come with pre-loaded software can be hacked using an unsecured Wi-Fi network. This fraud has a direct impact on an individual’s finances because a hacker can make unauthorized credit card charges quickly and move on before anyone realizes what happened. Ruined credit can take years to mend.

 

  • Your emails: Email is another venue that hackers use to infect computers with malicious software. They send viruses that replicate themselves in the host computers, performing various tasks such as denial of service to the users of your systems, spamming your contacts and accessing data without authorization.

 

Summary: After reading this article you probably feel like you are in cyber warfare with hackers and your IT infrastructure is the battlefield. You are absolutely right. Hackers are relentless and they are devising new methods all the time to steal from businesses. But this is one fight you can’t let them win. Protecting client data is not just a moral obligation. You are legally bound by the privacy laws to protect this information by all means. Breach in data security can ruin your reputation, and the financial liability to meet legal obligations may become too much to sustain.

So how do you fight this war in which you have to make certain that there is only one winner? Outsource your IT managed services to professionals who will monitor your networks 24/7 from a remote location. Your in-house IT management team may be able to fix problems, but it is important that proactive solutions are in place in case there is data loss as a result of a breach. Managed services can create solid data backup & recovery plans that will have your systems up and running quickly, so you can reduce downtime and protect your revenue.

Read More