Home » Blog » Main

Category: Main

New ‘KRACK’ Wi-Fi Security Issue: This Affects All of Us

The invention of Wi-Fi has been a science fiction dream come true. We can use our laptops anywhere in the house, our phones are using home internet instead of sucking down our cellular data, and our gadgets are all communicating. It’s essentially the backbone of the smart tech boom for home and business alike. Most networks are password-protected with an encryption called “WPA2” and this has been safe and secure, until now.

Recently, a security flaw called KRACK was discovered that allows hackers to break into Wi-Fi networks – even the secured ones. Your laptop, mobile phone, gaming console and even your smart fridge are possibly vulnerable as a result.

How KRACK works: The Key Reinstallation AttaCK isn’t a problem with your device or how it was set up. It’s a problem with the Wi-Fi technology itself. The attack gets between your device and the access point (eg router) to reset the encryption key so hackers can view all network traffic in plain text. Since we rely on Wi-Fi so much, this might mean hackers have a front row seat to your credit card numbers, passwords, chat messages, emails, photos and more.

NOTE: The hacker must be in physical range of your Wi-fi to exploit this flaw, it doesn’t work remotely like other attacks we’ve seen recently. Given most Wi-Fi ranges extend well past your own home/business, this is small comfort, but important to know.

How to protect yourself

Run your updates: Software updates are being released which fix the flaw. Microsoft has already released one for Windows, Apple has one coming in a few weeks. Take a few minutes to make sure you’re up to date with all your patches on any device that uses Wi-Fi (your smartphones, laptops, tablets, PCs, game consoles, etc). Unfortunately, some devices may be slow to get an update, or if they’re older, may not get an update to fix this issue at all. If possible, consider using a cabled connection on those older devices or upgrade to one with support.

Be very careful with public Wi-Fi: While your local business center, library or school campus has expert IT professionals keeping guard over your security, it’s a very different matter at your local coffee shop. It’s unlikely small locations such as this will be on top of security patches. Remember, a hacker exploiting this flaw only needs to be in the same Wi-Fi area as you, so be careful you don’t give them a dollop of private information with their coffee.

Check your browser security: Before sending anything secure over the internet, check you’re using a HTTPS site. You’ll know these by the little padlock you see next to the URL, and the address specifically begins with HTTPS. Major sites like Facebook, Gmail and financial institutions already use HTTPS.

If you need help updating your devices, or want us to check if you’re safe, give us a call at 570-779-4018.

business disaster

Most Businesses Won’t Survive a Disaster. Could Yours?

With the crazy weather we’re seeing, natural disasters and cyber terrorism echoing for years, it’s not a case of ‘if’ a disaster will strike your business, but ‘when’. Surprisingly, it’s not the scope and scale of the event that influences how deeply your business is impacted, it’s your business continuity plan.

Put simply, this is the all-important set of precautions and pre-planned responses to an event, laid out in bullet-proof detail and implemented with one driving focus: keeping your business running with little or no downtime. Think about what would happen if your business was hit by a natural disaster tomorrow. Would it survive? How much downtime would it take to push you into dangerous territory?

According to an IBM study of all the companies that had a major loss of data, 43% never reopen, 51% close within two years and just 6% will survive long-term. For a fraction of those survivors, business even continued as usual thanks to their ‘failsafe’ business continuity plan. It’s more than disaster recovery, it’s full preparedness that bypasses the need for 2+ weeks of downtime, financial ruin, wasted salaries and reputation loss – but it does require a higher level of planning…in advance.

Recommendations to Put You in the Surviving 6%

Prioritize: You’ll need to plan exactly what you’ll recover first and know who’s in charge of making it happen. It goes beyond jotting down a checklist of things to do, it’s taking an analytical, process-based approach to recovery for each unique business perspective. But it’s also realistic: there’s no point dedicating precious time to reviving the email system if your customer data is leaking onto the internet, even if email did rank as your top communication priority!

Backup: Of course, the most critical part of your business continuity is having full backups in three places. Why three? One copy locally which you use each day, a backup on another (disconnected) device in the same location, and one in the cloud. That local backup is your life-saver for system crashes, cyber-attacks and the like; the cloud backup comes into play when your business has taken a major physical hit, perhaps from fire or flood. Some businesses can run entirely location-independent when using cloud systems like Office365, which can be enough to put them in that 6% of disaster survivors.

Test: Make sure all employees know what the plan is if something goes wrong, and their specific roles in these scenarios. You can test, prepare and rehearse your continuity plan under simulated disaster conditions, which will uncover new obstacles, priorities and additional threats.

As your IT environment becomes more complex, carrying more responsibility and risk, so does the importance of a robust business continuity plan. The best BC plans look beyond disaster recovery, taking into account scalability of your system and scope of your individual business, to create strong battle lines that will keep your business operational, both now and for the long term.

Give us a call at 570-779-4018 to create a custom business continuity plan for your business.

mac malware

Apple devices and Macs get malware!!

I don’t like picking on Macs… Oh, wait. That is a lie. I do like picking on Macs because I am tired of hearing “Apple’s don’t get viruses or malware.” This absolutely not true!

There hasn’t been a serious ransomware outbreak on Mac but that doesn’t mean isn’t coming. There are a few ransomware programs in the wild and there has been increased activity in the mac security sector just like there has been in the PC world. Other malware and scam software are out there and on the rise.  “Our tracking of Mac malware has seen a more than 220 percent increase in malware so far in 2017 over 2016,” said Malwarebytes. The main reason that Mac desktops and laptops seem to not be affected is that they only are about 7% of computer users. They are a much small target so there are less malicious programs out there. That doesn’t mean they don’t exist. They will still steal your data if they can. WIth RaaS (Ransomware as a Service) and cross-platform malware, it is becoming easier for the bad guys to target whatever they want. They don’t even have to be proficient at programming anymore. And with an attitude like “we don’t get malware,” you might be easy pickings.

Beyond that, you are also just as likely to lose your online data as a PC user! Just because you are browsing the internet from your Mac doesn’t mean things like the Yahoo and Equifax data breaches will not affect you. You still need to be vigilant in the cloud and protect your personal information.

Protect you and your Mac

  • Backup your data – Onsite, Offsite and Cloud
  • Keep your software and OS up to date
  • Don’t use unapproved software
  • Use an extra anti-malware solution
  • Be wary of unknown websites and unsolicited email
  • Use strong password and 2fa (Two-factor authentication) wherever you can
  • Use a standard account over an admin account for everyday use
  • If you have a laptop, consider full disk encryption

We offer backup, monitoring, and antimalware solutions if you use Apple products in your business. Let us know how we can help!

Public Sector IT Security

NEPA Public Sector IT Security

Are you in a NEPA local or state government entity? Are you worried about audits and compliance? Have you been quoted some solution that you can’t afford?

Ask us about our NG firewall and endpoint solutions!

Our NG (next generation) firewall has an option that was designed specifically for state and local government compliance. There are public sector discounts for all the security packages.

Already have a system in place? We ofter a conversion service as well as system optimization service. The NG firewall device can be installed “inline” which means you may not have to replace all your current network hardware.

We will monitor these solutions for you via our MSP/MSSP packages. Monitoring is part of compliance rules!

Some of the key features of Untangled NG Firewall:

  • Helps meet compliance for FISMA, NERC, NIST, FIPS, and several other state and county rules
  • Unique and granular policies for specific departmental and user access
  • Firewall, Router, IPsec VPN, Advanced Antivirus, Intrusion Prevention and Phish Blocking
  • HTTPS/SSL traffic inspection
  • Active Directory/LDAP Integration
  • Prioritize network traffic for mission-critical applications
  • Layer 7 application awareness to identify all incoming application traffic regardless of port destination
  • Prevents network slowdowns caused by any individual or group of users and applications

Give us a call at 570-779-4018 so we can schedule your free consult!

 

better business owner

3 Tech Tips to Make You a Better Business Owner

There’s no doubt about it, business can be tough! You’re juggling employees, customers, suppliers, stakeholders…the list is endless. You’re also operating in a competitive, high-tech economy that keeps trying to speed ahead without you. It’s no wonder you’re craving ways to get ahead of the competition, cut costs, boost productivity and dreaming of a vacation. Here are 3 tech tips that will make your life easier – and maybe get you closer to that ‘World’s Best Boss’ mug.

Consider a commuting policy

With better technology and faster internet connections, remote working isn’t just a possibility now, it’s an expectation. Clearly, not for every job (virtual burgers anyone?), but there are a lot of computer tasks in your business that could be done from home. Even if you offer a split week with 1-2 days at home and the remainder in the office, this can be a huge boost to your productivity.

From your perspective, remote employees can be more efficient without the distractions of yet another birthday sing-along, they have fewer absences and stay in the job longer. From the employee perspective, they don’t need to waste time commuting, get their work done faster, and generally feel happier and healthier.

Don’t cheap out on technology

Unsurprisingly, a tech newsletter is advising you to invest in tech, but hear us out. Technology is rapidly becoming the backbone of most businesses, yet we still see people who try and get by with the bare minimum investment and maintenance. And by ‘see people’, we mean they’re our most frequent repair and data recovery clients.

When you take shortcuts with your tech you’ll always get higher failure rates, more downtime, and employees who can’t do their job even though you’re still paying them by the hour. When businesses keep old tech longer than they should, thinking of the immediate cost saving, they usually end up paying more in the long term.

Embrace the cloud

Many of your existing software packages have a cloud version, which would allow multiple people to access it at once and give added backup or synchronization benefits. Your remote workers, mobile staff, accountant or CFO can all view the same reports without anyone having the trouble of sending out separate copies.

Cloud technology is also perfect for notetaking and collaboration using software like Evernote or OneDrive. You and your employees can think of ideas while out and about, make a few notes on a mobile device, and have it all synced perfectly to your desktop when you need it. You can even scan in paperwork and have your entire filing cabinet in your pocket.

Your business tech can unlock multiple possibilities that will make your days run smoother, more profitable and put you miles ahead of the competition. Ready?

Give us a call at 570-779-4018 to make your tech work harder for you.

nonprofit nepa

Nonprofit NEPA – What do you do for computer service?

Is your nonprofit company calling for computer support only when things are broken? Are you calling an IT company at all?

IT can be challenging even for larger nonprofit organizations. Many places have older equipment but have a high demand to use new software. Some do not have computer savvy staff to take of the mundane computer tasks. Most appear to have a high employee turnover. A few desire secure remote access. All have sensitive client info that needs to be kept private. All of these things require cybersecurity to be high on the list of priorities as they all present opportunities for hackers and evil doers to gain access.

It is all too expensive to worry about, right? And who would want to hack our small company? You would be surprised. On both counts. Even Non-Profits can get HIPAA Fines. You can still be held accountable for your client’s data loss.

Cybersecurity and IT can be affordable. You may not be a “for profit” business, but you are still an organization that needs to have a secure and efficient computer system. There are many budget-friendly ways to accomplish this for nonprofit companies.

  • Free hosted email
  • Free spam scanning and encryption
  • Low-cost hardware and software options
  • Open source software solutions
  • Donated or Recycled hardware
  • Monthly service or all-inclusive plans that are easier to budget

These are only some examples. If our years of experience working with NPOs has taught us anything, it is each organization is unique and may benefit from different solutions.

Let us take a look at your current setup and see if we can offer some cost-effective solutions to get your nonprofit on the right track.

 

Hackers, Ransomware, and Malware. Oh, My!

Is your company protected?

These attacks continue to rise. They are targeting more and more small businesses. 1 in 5 small businesses will suffer a cyber breach this year. 97% of breaches are preventable. There are affordable solutions to protect yourself.

These are some things that you and your IT company should talk about implementing:

  • Backup — Backup. Backup. Backup. You should have onsite and offsite backups. Consider full operating system disaster recovery and testing. These should be monitored and tested frequently.
  • Updates — Update everything! Software, firmware, and operating systems. If you are running on unsupported or outdated systems you are asking for trouble.
  • Spam email prevention — This is one of the main sources of attacks. You need to train your employees and have a spam filter in place. Even if you are using a service like Gsuite or Office 365, you should consider using additional protection.
  • Passwords — Everyone hates passwords but they are a necessary evil. At the very least you should make sure they are long and not easy to guess. We recommend changing your passwords every 90 days. And please don’t use the same passwords everywhere! All it would take is one breach to loose all your data. There are tools available to help keep track if you are like me and have 300 of them.
  • Multi-factor Authentication — Consider using this everywhere you can. If your password is stolen, this adds another layer of protection to your data. Avoid SMS/Text if possible as these can be intercepted.
  • Advanced endpoint security — Simple definition based anti-virus is not enough anymore.
  • Firewall — Make sure built protection systems are enabled and the log files are being monitored.
  • Encryption — This protects hackers from accessing your data via stolen hardware. Mobile devices (phone, laptop, tablet) should always be encrypted. Consider encrypting at rest data and devices as well.

Feeling the Budget Pinch? Here’s How Managed IT Can Help Save Your Business.

When it comes to running a modern business, technology is always a growing line item in the budget. Costs seem to creep up every quarter, along with a new learning curve for simply keeping everything running along smoothly. It’s no wonder then that budget restrictions for tech were recently found to be a universal concern for small/medium business.

You’re balancing the outlay of maintenance with replacement, plus securing against a steady stream of threats – all while making sure every dollar gives maximum return on investment. It even sounds exhausting! What typically happens is the tech budget gets stripped to a bare minimum, hoping nothing unexpected pops up and everything keeps moving along nicely. After all, everything is working just fine and that money could make a real difference elsewhere… except as soon as an IT emergency strikes, that tiny budget is obliterated and you’re left to either limp along with insufficient tech or dip into another budget area.

Now imagine if budget wasn’t an issue. Imagine all your tech expenses were predicted and capped, and you got everything you needed without resorting to financial magic tricks. Sounds good, doesn’t it?

Put simply, that’s how a Managed IT Service works. It’s a service designed for businesses with a limited budget who don’t have time for tech issues. For a fixed price each month (which is no doubt less than you’re thinking), you get a team of IT technicians actively monitoring your systems in order to catch issues before they occur, repairing problems on the fly, and ensuring your business is always as secure as possible. Included as part of your Managed IT Service, you also get expert business consulting around the solutions you need now, which solutions will help you rapidly scale, and which technology you don’t need. All for one predictable, fixed price each month. It gets better:

You’ll reduce downtime and associated revenue loss.

Forget scrambling while systems are down, with Managed IT Services you’ll know which tech is failing and can proactively repair or replace before it impacts your business. Downtime is planned/minimized and your staff are working uninterrupted by tech drama.

You’ll skyrocket efficiency.

You’ve probably been responding to your IT events in ‘firefighter mode’, essentially dealing with problems as they arise and switching to new, improved tech only when you must. With Managed IT Services, problems are automatically reported and optimal solutions designed in advance. Even the small issues that have been slowing your business down and limiting progress come to light, ready to be solved for greater efficiency.

You’ll secure against data loss.

Whether you’ve been following the news and worrying about the next cyber-attack, or you’re working with confidential customer or proprietary data, your Managed IT Service has you covered. Our technicians secure your business against attack using the latest technology, full backups, software updates and leverage every drop of their know-how to keep your valuable data safe.

Learn more ways Managed IT Services can benefit your business – give us a call at 570-779-4018.

Why Do People Create Viruses?

You’d be right in thinking it’s hard to program a computer virus that can spread across the world in a flash – we’re talking days of constant desk-jockey nerd-work. So why do they bother? Well, it generally comes down to 3 reasons: Money, showing off their skill, or to simply being a jerk. While showing off or being a jerk is pretty self-explanatory, the money side is fascinating.

Here’s how people are making money with computer viruses:

Bank account theft: Virus creators are more than happy to help themselves to your bank details, sneaking in to grab your login details or credit card info. They can either transfer your funds away or use your credit card details to go on a shopping spree. Sometimes they’ll leave the fun to another person though, and simply sell your details to the highest bidder.

Ransomware: Rather than a financial snatch and grab, sometimes a virus will encrypt your files and demand money for the unlock code. Without a true backup plan in place beforehand, you’re at their mercy. You’ll be given very helpful information on how to pay, plus a firm deadline before your files are destroyed permanently.

Ad swappers: A cheeky technique, this is when they create a virus that either puts annoying ads on websites you visit, or places affiliate codes on pages so that when you buy something legitimately – eg, from Amazon – they get a percentage as a ‘referral fee’. Their kickback doesn’t make your purchase cost more and you may not even know you’re supporting their activities.

Bitcoin mining: You might have heard of digital currencies being used for payment, but did you know you can also earn them with your computer processing power? Unfortunately, ‘renting’ out your computer’s processing power means paying more in running costs than you’d make – unless you were very clever and sneaky, and used a virus to rent out other people’s computers.

Botnets: Certain infected computers can be remotely controlled to do whatever the virus creator wants. In this case, they’ll usually set the infected bot computers to overwhelm a target web server, like an e-commerce store. Sometimes it’s done as revenge, but more often it’s blackmail. The ‘Botmaster’ says “pay me thousands of dollars or I’ll crash your site during the biggest shopping day of the year.”

Account stealing: Subscription accounts like Netflix and Hulu are often hijacked, leaving you to pay the bill for someone else’s entertainment. But sometimes, virus creators go one step further with online gaming accounts. All those digital items that you fought so hard for (special clothing, weapons etc.) can carry real world value and be stolen from your account and sold on a black market. Yes, that’s cheating!

Give us a call at 570-779-4018 to make sure your computer is secure and protected.

Should I Upgrade or Buy a New Computer?

Well, it depends – mostly on who you’re asking! A department store salesman will always recommend a new one, but when you get down to the nitty gritty with a trained technician, you’ll often discover you have more (and cheaper) options than you thought.

Start by taking stock of what you’ve got. Sometimes an upgrade simply isn’t worth the trouble and it’s painfully obvious. For example, if your car is 30 years old, demands a constant supply of special fuel and you can see the road whizzing by thanks to the ‘custom’ holes in the floor…it’s time to replace the rust-bucket! However, if your car is decently modern and in reasonably good condition but happens to stall at stop signs, a few quick fixes can be just what the mechanic ordered.

If your computer does need to be replaced, chances are you already know this. But if you’re not sure and some days it could go either way, this will help. We’ve put together a walkthrough of the most common upgrades and the impact they’ll have:

Video card upgrade: It might not be your computer that’s getting old. Instead, games are getting more and more demanding. The days of stick-figure animations are gone and lifelike 3D is the new normal. With that improved experience comes a huge strain on your computer’s resources. If you have a gamer in the house, you can often super-power your computer with a single component – a new video card. For hardcore gamers, it’s actually a necessity, as some new games refuse to install if the video requirements aren’t met. Love smooth animations and responsive gameplay? We know all the best games out now (and in the works) and can match you with the right video card.

Hard drive upgrade: New hard drives are a popular option, both in size and speed. Running out of space is less of a problem now, but speed is a major concern. You’ve no doubt sat there twiddling your thumbs and urging a file to hurry up and copy. Many upgrades are to an SSD (Solid State Drive) that has zero moving parts and can find/transfer data in a flash. They even make booting up lightning fast! And you’ll have the choice of keeping your old drive for general storage, complete with all your existing data.

Memory/RAM upgrade: Some cheaper computers are underpowered from day 1. In truth, most of the ones in the department store could use at least an extra 4GB of oomph! Sometimes though, even a great computer falls behind as new applications come out and need more resources. Adding extra memory can revive your existing computer and set it up for a couple more years of happiness.

Where to draw the line: There are other upgrades such as the CPU, which is basically the brains of the computer; and the motherboard that all the parts plug into…but once you’re in that territory, it really is time to go for a full replacement. You’ll save money by getting a computer that meets your needs and can grow with you.

Is your computer letting you down? Give us a call at 570-779-4018 to help you with upgrading or selecting a new computer