Summer Is Here! Have You Updated Your Security Procedures?

By |2018-08-13T12:24:40-04:00August 13th, 2018|Infrastructure Security, Uncategorized|

Security is an everyday issue, and the measures you put in place at the beginning of the year are now stale and in need of a tune up. It’s time to bring those procedures into the shop! With so much new technology, and so many new risks, it’s important to continue updating your security measures every so often. Here is a checklist on how to re-invent your security measures this summer:

  1. Educate your staff/re-introduce your procedures

The employee is still the biggest weak link. You can have the greatest security measures on the planet but if your employee clicks the wrong link on their computer, you’ve still become infected. Cyber criminals are becoming smarter by impersonating higher level authorities in companies. For example, a criminal will impersonate your CEO and email finance, asking to wire money. It’s important to educate your staff on what the proper procedures are in your firm, and what security risks they may face day-to-day.

  1. Change your passwords

Every 90 days, you should be changing your password and it’s also important to have secure passwords. A brute force attack – an attack designed to discover a password through trying every single combination of letters/numbers/symbols – can now check 8 BILLION combinations per second. A password should NOT consist of words or phrases. A great way to choose a password and remember it is to pick your favourite line from a movie/book, take the first letter of each word, capitalize every 3rd letter, and then repeat. For example; “O Romeo, Romeo! Wherefore art thou Romeo?” = orRwaTroRrwAtr.

  1. Create a separate Wi-Fi network for IoT devices and guests

A huge new security risk is the emergence of the Internet of Things. Everyday appliances are now being connected to your wi-fi network, without proper security to prevent it from being hacked into. Many will think: “So what? If someone hacks into my fridge, what are they going to do? Turn up the heat?” It’s true that a hacker won’t be able to do much from the initial device, but from that device, it gives access to the whole network and every device connected to it. Through your fridge, a hacker can now access servers, computers, etc. Create a separate network that your non-essential devices can connect to, to separate the risk of a major data breach.

  1. Security scan on Wi-Fi network

It’s important to know what devices are connected to your network and manage the ones that pose a security risk. Many employees and guests connect their personal devices to the office network, so it’s important to do a security scan on your Wi-Fi network to see who is connected, and then disconnect the non-essentials and security risks.

  1. Bring in the experts!

Chances are, you don’t have time to be worrying about security measures all the time, and that’s okay. You need to bring in the security experts, the ones who will think about your security and make sure you’re protected for you. Contact a managed service provider who can help make you feel secure.

Feel free to Contact Us for more information.

Encryptions: The How & Why You Should Protect You & Your Data Everyday

By |2018-08-04T14:42:40-04:00August 4th, 2018|Hosting, Uncategorized, Website Security|

What is “Encryption”?

You’ve probably heard the term loosely thrown around by media and IT professionals, but what does it really mean? Simply put: It hides things [data] you don’t want other people to see, without authorization. For example: When making a purchase online, such as Amazon, or Walmart, the connection between your browser and their servers is encrypted via the use of an SSL certificate (the HTTPS, and the little green lock icon). This significantly helps prevent attackers from stealing your information while it’s being transmitted (although you must make sure that the website you’re browsing is the legitimate website!).

Or a local example, you use a password to log into your computer; similarly, if you lock a document with a password.

Obviously these are 2 different levels of, and even types of encryption, but it’s important to differentiate these different levels and to understand what steps you can, and should take to protecting yourself, and your data.

(more…)

E-Tech Ranked Among Top 501 Global Managed Service Providers (MSP) by Channel Futures

By |2024-01-23T15:20:34-05:00July 10th, 2018|About Us, Awards, Uncategorized|

On June 26th, 2018, E-Tech ranked among the world’s 501 most strategic and innovative managed service providers (MSP), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings.

The MSP 501 is the first, largest and most comprehensive ranking of managed service providers worldwide. This year, Channel Futures received a record number of submissions. Applications poured in from North America, Europe, Asia, South America and beyond.

Channel Futures is pleased to honor E-Tech.

“To be considered one of the world’s most strategic, forward-thinking and innovative managed service providers is truly an honour,” said Ian Evans, President & CEO of E-Tech. “E-Tech’s staff work hard and strive for greatness, and awards like these validate the passion and dedication our staff bring to the table. Among this list are companies like Sirius, Ensono, Konica and much more; being part of this list shows that E-Tech has a bright future.”

What Channel Futures had to say about E-Tech:

E-Tech has been providing system support and information technology consulting services to its clients since 1991. E-Tech is a wholly Canadian owned and operated corporation, attributing its strength and success to its close working relationship with each one of its clients – regardless of size. The services provided by E-Tech are designed specifically to help its clients succeed in today’s complex business environment. E-Tech helps Small Businesses and Not-For-Profits thrive by delivering Data Protection, Website Hosting Services, IT Support Solutions, iMIS Consulting, and Web Design Services. They align technology with their client’s goals, objectives and bottom lines. They leverage their expertise, customer relationships, and a diversified range of best-of-breed Cloud storage services to create custom solutions with tangible value. E-Tech’s not for profit client base ranges from professional membership to construction and infrastructure, regulatory bodies, real estate property, financial services, transit, public safety and health care services. E-Tech clients call upon their experienced technical staff to resolve complex configuration issues, design networks, troubleshoot technical difficulties, implement improved system performance, and perform system administration for clients’ business operations.

For the first time, Channel Futures will also name 10 special award winners, including MSP of the Year, CEO of the Year and one Lifetime Achievement Award for a career of excellence in the channel.

The MSP 501 winners and award recipients will be recognized at a special ceremony at Channel Partners Evolution, held this year October 9-12 in Philadelphia, as well as in the Fall issue of Channel Partners Magazine.

“This year’s applicant pool was the largest and most diverse in the history of the survey, and our winners represent the health and progressivity of the managed services market,” says Kris Blackmon, Channel Futures content director and editor of the MSP 501. “They’re growing their revenue, expanding their customer influence and exploring new technology that will propel them for years to come.”

The full MSP 501 report, available this fall, will leverage applicant responses, interviews and historical data to identify business and technology trends in the IT channel. Highlights will include:

  • Revenue growth and business models
  • Hiring trends and workforce dynamics
  • Business strategies
  • Service deliverables
  • Business tools and automation investments

The complete 2018 MSP 501 list is available at Channel Futures.

Feel free to Contact Us for more information.

Cyber Criminals Reign Over the Final Week of June: Hundreds of Millions of Consumers Data Left for Hackers

By |2018-07-09T12:13:20-04:00July 9th, 2018|Dark Web Monitoring, Uncategorized|

In the last week of June, three companies with enormous databases had their information seized: Adidas, a leading sports gear retailer, TicketMaster, a leading event ticket vendor, and Exactis, a data compiler.

First to get attacked was TicketMaster, who had 40,000 consumers’ data compromised on June 23, 2018. TicketMaster openly wrote about the data breach, claiming it to have affected less than 5% of its global customer base [1]. The breach affected only customers from the United Kingdom but spanned over several months from February to June 23, 2018. If a consumer bought anything on their website within those months, personal and/or payment information may have been accessed by an unknown third party. After reporting the breach, TicketMaster emailed all users they believe were affected, and offered a free 12-month identity monitoring service.

Adidas fell victim on June 26, 2018 by another unidentified third party. An Adidas spokesperson claimed that “a few million” consumers were affected [2]. Limited data was taken, including contact information, usernames and encrypted passwords. Adidas also claimed that there was no reason to believe that any credit card information was taken.

The least known but most surprising was Exactis. The data compiler and aggregator left around 340 million of consumers’ personal data open and accessible to anyone looking for it. Most disturbing is that the data was very specific in nature. Each record had information concerning personal attributes like phone numbers, email addresses, if you are a smoker, what size clothes you wear, etc [3]. The database was first discovered by Vinny Troia, the founder of a New York-based security company. Troia contacted Exactis, as well as the FBI when he discovered the disturbing collection. Exactis has not since given a statement concerning the leak, but the collection is no longer accessible. It’s unclear whether this database was used by cyber criminals, but Troia believes he cannot be the only person to stumble across such a huge collection.

Once more, businesses are reminded that data security is not an option, but an obligation. When a business has proper protection, it is also a deliverable sales pitch for new potential clients. Security can give a business that extra edge over the competition and could be the reason why it continues to grow.

Feel free to Contact Us for more information.

Title

Go to Top