Every IT professional would agree that servers are the lifeblood of your organization. No matter what daily task you perform, whether it is responding to email, preparing for a presentation, or completing other workday tasks, it’s important to have a server in your office that runs smoothly. No organization, no matter what the size, wants to face the IT issues associated with a slow or non-responsive server. While there is no way to accurately predict when a server will need to be replaced, there are some general guidelines you should observe to ensure that this critical piece of equipment is running properly.
With black Friday just around the corner, many of us are starting to think about holiday shopping. We all love the convenience of being able to be at home in front of a computer vs the hassle of crowded malls and searching for parking spots. You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.
Connected devices are essential to our professional and personal lives, and criminals have gravitated to these platforms as well. Many common crimes—like theft, fraud, harassment, and abuse—are now carried out online, using new technologies and tactics. Others, like cyber intrusions and attacks on critical infrastructure, have emerged as our dependence on connected systems revealed new vulnerabilities.
Oftentimes, when you come across an article that someone is raving about as a ‘”MUST READ – Changed my life”, you glance through it with some skepticism, and then realize that it won’t change your life. However this time I came across one of these “life changing” articles and wow – it peaked my interest! It gave me an entirely different perspective on how to approach a conversation.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet. Firewalls block unauthorized access to your computer network from hackers, malware and viruses. They monitor data as it passes between your computer, your server, and the Internet to make sure that nothing harmful or unintended slips through. A firewall may block certain downloads, or require system administers to grant authority before opening files that fail to meet their security standards.
Firewalls are a critical component to effective security, and so is the configuration. A poorly-managed firewall can block legitimate activity, causing workflow errors and excess frustration for the end user. Or, a firewall with overly lax restrictions could miss harmful data packets, lending the user a false sense of security while malware and viruses penetrate your network. If firewalls are not managed and implemented properly, it can leave gaping holes in your security and give hackers the keys to your kingdom.
A firewall should always be properly configured. Knowing when to override its rules and let data through, as well as to understand how to respond in case of an alert, are judgement calls that require specialized knowledge and experience. Fortunately, a trusted IT partner like Bryley Systems will not only recommend the proper firewall, but configure, manage, and support it so that your network is locked down.
Regardless of your organizations size, no business owner wants the horrible consequences that a security breach can bring. Larger organizations often have greater resources to dedicate towards security. If you are a small to mid-sized organization, you generally have fewer resources and smaller budgets, and having your IT network brought down by a cyberattack can bring an organization to its knees.
Unauthorized access to your system files can result in the loss of important data, the leak of confidential client information, or the compromise of other security features. A properly managed firewall can nip this problem in the bud.
Internet usage has become a surprising sore point in employer-employee relations, as they are often used to block access to certain sites online. While some employees feel that blocking access to popular social media sites and other types of Internet browsing during work hours is simply a way to micromanage personal habits, many business owners feel it is necessary to cut down on the type of distractions that eat up productivity, as well as open up security issues at the office.
There are definite pros and cons to each side, but by prohibiting access to all but a select group of websites (or by using strict controls to determine what other websites are permissible) business owners can safeguard against employees accidentally visiting a dangerous website by mistake. This type of protection can prevent an unsuspicious employee from falling victim to a phishing scam or from entering important information into an insecure website. A managed firewall/Internet-security solution that provides website filtering can help your organization identify which websites your employees need to be able to access, based upon the type of organization you are, and what the employee’s job role is. It can even create a custom configuration of settings to block problematic websites for safer Internet browsing.
Having your firewall and Internet-security solution managed properly by an IT partner dramatically reduces the disruption of your day-to-day business tasks while providing you with the protection you need. Your managed IT service provider will maintain proper system configurations and monitor your network for potential security threats and will respond to alerts in a timely manner. Furthermore, your managed IT provider should be up-to-date with new technology, proper certifications, and security compliance regulations that might affect your organization. While you focus on running your business at peak efficiency, your managed IT provider also ensures your software and hardware remains up-to-date.
Educate your staff about the importance and significance of firewall protection and other Internet-security measures. This training can also help your employees spot potential scams before they fall victim to them.
Your organization should also consider other safeguards, such as monitoring software that can spot suspicious activity, or programs designed to detect and remove viruses from your system.
One of the most secure ways to protect your most valuable data is by limiting user access. Make sure to store your most secure files in as few locations as necessary. Only allow access to those employees who need it, and protect it with encryption and strong passwords.
A family can benefit from sharing a computer – whether it be the kids, parents or even grandparents. When you set up this new computer there are a few things to keep in mind so that everyone can enjoy it, especially if you have a large family.
You will want to make sure that the computer will perform to the required standards so that it will fulfill all of your needs. If you are retiring an old computer, be sure to dispose of the old one properly.
First, if you have only one computer in your home, you should think about putting together a schedule that fits for both children and adults. Think about the things that need to be accomplished such as homework, study time, family related chores such as bill paying, scheduling the kid’s events, or work related tasks. Figure out the time when everyone needs the computer and set time limits appropriately. Kids can often overlook their time limits on the computer so have a plan in place as how you will address this.
Most kids will know how to use a computer but it’s important to set the ground rules and locate the computer in a common area so the computer is more visible. Also think about the location of your computer so that the device is in a safe location to prevent it from overheating.
Each individual member will need an account. You wouldn’t want your work documents to get mixed up with Jr.’s projects. Having separate accounts will enable you to control each account and set up the necessary restrictions so that the kids cannot access unsuitable material, chat with strangers or change system controls. The parental controls are important so make sure that you have put these in place prior to the kids use the computer. You can also set up shared folders, too. Since the majority of families have multiple devices such as tablets, smartphones, etc, so you should consider high speed internet. Most families will download and steam content so you don’t want a slow internet connection to be constantly interrupting your tasks, especially when you are sharing it with multiple people.
A key must for any computer is a good quality and up to date antivirus software. The internet is fun but it can be dangerous, especially for kids and even inexperienced computer users such as a grandparent. The best software will block web threats, block dangerous web sites, secure transactions, and safeguard your kids. Top antivirus systems will protect all of your devices. Take the time to ask questions, do research and be sure this is set up properly. Email is something every family member can use, but if you have young children then you should set them up with a kid-safe email service. These services will enable a parent to monitor and control who the kids are emailing, as well as content, and block out inappropriate language.
A family computer will have a lot of data on it. It typically will contain family photos, school documents, family schedules, music, work related tasks, financial information, and more. Backing up all of this data is crucial. Have a scheduled “maintenance” routine to back up data to a hard drive. You may even consider cloud storage in the event you are concerned about something happening to the hard drive. In your regular maintenance routine, include cleaning the computer going through files, software, etc., and delete the unnecessary things you don’t need.
Family computers are fun and with a few rules for usage and adequate protection in place along with fast internet and all the software you need, your family will enjoy it – and enjoy it safely.
Let security and confidentiality be your watchwords!
When it comes to safeguarding your CPA firm’s confidential data, there is zero tolerance for risk. CPAs rely upon various forms of technology to gather data – whether it is a tax return or an independent audit.
CPA firms have made great strides by implementing such technology as electronic data management systems, client portals, and cloud-computing systems. However, records maintained by CPA firms must remain confidential because of professional standards, statutes, and regulations governing record retention. Data breaches can happen in numerous ways, including the following: fraud, hacking, improper disposal of data, or even a lost or stolen device.
A CPA firm will need their IT department (or an outsourced Managed IT Services vendor) to implement and maintain a comprehensive list of data and network security controls. It is helpful to understand the basics:
Perimeter security. This first line of defense includes firewall and intrusion detection systems, in addition to intrusion prevention systems. These should be configured with appropriate restrictions to block and filter both incoming and outgoing Internet traffic.
Endpoint security. Endpoint security requires each computing device on a corporate network to comply with established standards before network access is granted. These measures protect the servers and workstations and include safeguards such as administrative access limitations and anti-virus protection.
Network monitoring. Part of the control environment should include a frequent and ongoing monitoring program for all IT systems.
What We Do
Comprehensive Support Program™ (CSP) — Bryley provides ongoing, proactive maintenance and remediation support to ensure a stable, highly-available computer network. Our most-popular Comprehensive Support Program (CSP) consolidates all end-user devices (mobile and desktop), servers, and computer-network equipment issues into one, Bryley-managed, fixed-fee program. Among the many services delivered under the Managed IT umbrella, Bryley installs and manages all software updates and patches.
Secure Network™ (SN) – An ongoing, managed-IT service that prevents intrusion, malware, and spam from entering the computer network through its Internet gateway and can restrict web-site surfing to inappropriate sites.
Multi-Point Security Hardening Service™ (MPSHS) – A periodic review to harden your computer-network security by reviewing/updating policies and configurations and testing. With this program, Bryley Systems can help your organization comply with the technical aspects of Massachusetts 201 CMR 17.00.
If you are looking for a business partner to help you navigate the ever-changing technology and cybersecurity landscape, we’re here for you. For more information about Bryley’s full array of Managed IT Services, Managed Cloud Services, and Cybersecurity Services please contact us at 978.562.6077 or by email at ITExperts@Bryley.com.
We all love receiving new technology during the holiday season, but we must remember to protect it. Whether we like it or not, cell phones and laptops are no longer simply devices – they are an extension of ourselves. They house important information and records that we wouldn’t dare give a stranger (social security numbers, passwords, confidential information). In fact, we use them for socializing, shopping, banking, browsing, and much more. Simply for the ease of use, it becomes a habit to stay logged into your accounts on your devices, but the downside is that if your phone is lost or stolen, it can lead to identify theft. Someone could also hack your phone and access information via web-pages you have visited. The importance of smartphone security is something we should all be aware of and implement right away.
Nearly 40% of data breaches are caused by mobile devices.
- Employee negligence is typically due to employees who are busy, traveling constantly, or hurrying through a task, and simply not knowing or paying attention to the risks involved.
- Theft is a big problem since there are ways to breach a smartphone.
- Malicious attacks. Hackers are responsible for the majority of breaches and thrive on those who leave the doors wide open to an attack. Don’t leave yourself vulnerable.
Here are some tips to enjoy that new device as well as protect your privacy and information:
- Activate Screen Lock. Perhaps the easiest and first line of defense on any device is the lock screen. After any time of inactivity (usually 30 seconds for cell phones and slightly longer for laptops and desktops), the device should be enabled to auto-lock so no one else can access your information. On a cell phone, the code is usually four characters, but can be longer. No matter how protective you may be of your devices, there’s no guarantee that you may not accidentally leave it somewhere.
- Encryption can do a lot to protect your phone’s data and the good news is that all iPhones and newer Android versions come with their phone automatically encrypt once you set a password.
- Mind your Apps. We all like the simplicity and efficiency that apps provide, but it’s important to keep an eye on them. There has been an increase in malware attacks, especially on smartphones, since most users gain access to confidential information. Always read the small print and consider the personal information the app requires. If an app requires significant personal information, reconsider installing it.
- Always use official app stores. App stores generally approve and vet apps prior to granting them space on the platform. (Always make sure the Web site URL starts with a secure https:// and contains a locked padlock icon.)
- Check permission for the app. Some apps will ask permission to access certain aspects of the device. While it will make sense for a GPS to ask for your location, the same cannot be said for a flashlight app asking permission to access your text messages.
- Browse Carefully. When you access a web browser on your smartphone, you should be very careful because it is easy to accept messages that pop up. For instance, you might decide to save your password and other information as it leads to easier access later on. Unfortunately, that can provide others a way to copy your data. Always use reliable and safe websites and never enter your information on new or unknown websites, especially when they are asking for sensitive information like your credit card or bank details.
- Remote Wipe. Have security knowing that if your phone is lost or stolen, you can safely wipe the device to protect the data from falling into the wrong hands. A similar feature can be enabled after a certain number of failed passwords to access the phone (usually it is around 10 attempts before the device is wiped). This service provided to our clients enrolled under the CSP agreement.
- Use caution with any links you receive via email or text message. Exercise caution when clicking on links. Phishing scams are not limited to email – a text message can incite you to click on a malicious link or ask for personal information.
- Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.
- All Wi-Fi was not created equal. Be mindful when using open Wi-Fi. When you are not using your wireless connection, you should keep it switched off. This can ensure that no one else can connect to your device without your permission or knowledge. You should also check your device’s network settings as they might be configured to connect to a network automatically when in range and may not ask for permission. In addition, your home wireless router should also be protected through a password or security code.
- Run the Updates. Don’t put off downloading updates. Many updates tweak and fix several flaws on your phone that could open a backdoor for hackers.
- Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings.
Technology is drastically changing the way we live and work and more adjustments will be apparent in the years ahead. Instead of thinking “bottom-up” or “top-down,” business and technology needs to be thought of in a hybrid solution. “From the bottom up, they are modernizing infrastructure and the architecture stack. From the top down, they are organizing, operating, and delivering technology capabilities in new ways. In tandem, these approaches can deliver more than efficiency – they offer the tools, velocity, and empowerment that will define the technology organization of the future.”1
IoT is one such tool that continues to gain traction and will have an even larger impact in 2018. It is estimated that there are currently between 8-15 billion IoT devices. That’s more than there are humans on Earth! These devices include everything from home security systems, pacemakers, voting machines, voice-activated cars, personal assistants (i.e. Alexa) and personal health trackers (i.e. FitBit), as well as toys, toothbrushes, and even pillows.2 Having these devices makes life simpler, but will truly help when the devices can “talk” to each other. Josh Siegal, a research scientist at MIT highlights the importance of interconnected devices and their usefulness: “It’s not about the car or the home, it’s about how your car can talk to your home to tell it that you’ll be arriving home early because your car talked to the roadway to avoid traffic, and now you need to put the heat on a little bit sooner than you would – while still saving energy due to having a smart thermostat. People aren’t used to thinking in such terms today.”2
These new IoT devices must also be able to function with the older technology. “Having the intelligence in the lightbulb makes it pretty easy to adopt. It’s as easy as screwing in a lightbulb. But the usefulness is diminished when my 8-year-old daughter turns off the light switch – and now my fancy internet-enabled lightbulb is offline.”2
Security is Paramount
Now, more than ever, security is a top concern for organizations. Individuals were rightfully upset about the Equifax breach, but IoT devices have the potential to leak information that’s just as valuable and sensitive. It doesn’t help matters that security of these devices seems more like an afterthought. The most vital, and yet underrated IoT applications are those that “allow administrators to automatically update them when issues are found and enforce strong defaults for things like passwords and encryption.”2 This highlights the importance of conducting due diligence and not rushing the vetting process for a shiny, new technology. Ultimately, organizations must balance the need for better production and employee satisfaction with protecting company data. They must know what and where the devices are attaching to the networks and manage accordingly.
IoT Data Analytics
As IoT expands, so too does the amount of information available to organizations. This information can and will drive business decisions. A prime example of IoT data analytics helping an organization work more efficiently and profitably is Navistar, who reduced the cost of managing its fleet of 180,000 trucks from 15 cents per mile to just 3 cents.3 Opportunities for cost savings exist in nearly every business, but it must be done judiciously; cost savings needs to be weighed against the cost of storing and sifting through the data.
2018 is poised to see technology have an even greater impact upon organizations. It helps to have a Managed Services Provider (MSP), such as Bryley Systems to help navigate the ever-changing landscape. Contact us at 844.449.8770 or by email at ITExperts@Bryley.com to learn more. We’re here for you.
2 Schuchart, Wendy. IoT for Business: Five Key Trends for 2018. Channel Partners