Is Your Data Safe Where It Lives?

By |2017-12-08T13:18:33-05:00December 8th, 2017|Uncategorized|

Technology paradigms come and go – and sometimes come back again. 

While data is spreading out among dozens of forms and formats throughout your business (PCs, servers, smartphones, tablets, the cloud), it’s also centralizing. Tablets and smartphones behave in the same way as the mainframe era’s “dumb” terminals when it comes to business applications. Sure, they enable data to empower business everywhere – but they act only as pure “client” front-ends to applications running on a server somewhere.

(more…)

Major Vulnerability Found for Wi-Fi Networks: What You Need To Know

By |2017-11-07T12:02:30-05:00November 7th, 2017|Infrastructure Security, Uncategorized|

Security researchers have discovered a major vulnerability in Wi-Fi Protected Access 2 (WPA2). WPA2 is a type of encryption used to secure the vast majority of Wi-Fi networks. A WPA2 network provides unique encryption keys for each wireless client that connects to it.

Think of encryption as a secret code that can only be deciphered if you have the “key,” and a vital technology that helps keep digital data away from intruders and identity thieves.

The vulnerability, dubbed “KRACKs” (Key Reinstallation AttaCKs), is actually a group of multiple vulnerabilities that when successfully exploited, could allow attackers to intercept and steal data transmitted across a Wi-Fi network. Digital personal information that is transmitted over the Internet or stored on your connected devices — such as your driver’s license number, Social Security number, credit card numbers, and more — could be vulnerable. All of this personal information can be used toward committing identity theft, such as accessing your bank or investment accounts without your knowledge.

In some instances, attackers could also have the ability to manipulate web pages, turning them into fake websites to collect your information or to install malware on your devices.

(more…)

VIDEO: Webinar Recording on Ransomware & Business Continuity [Oct 2017]

By |2024-01-23T15:39:32-05:00October 6th, 2017|Uncategorized, Webinars|

E-Tech & Datto put on a Business Continuity & Ransomware Webinar back on Thursday, October 5, 2017 and this is the Webinar Recording. In this recording you will find out:

  • Definition of Ransomware & its history
  • How ransomware infects small business
  • How to protect yourself & recover

In this Webinar, Datto also covered key statistics from their State of the Channel Ransomware Report, where they surveyed nearly 2,000 MSPs who serve small-to-mid-sized businesses (SMBs) around the globe about ransomware. They found in the report, businesses across the world are falling victim to ransomware. The finance, construction, and entertainment industries have all experienced some type of cybersecurity nightmare. Although the report found some industries are more vulnerable than others, it appears nobody is safe. Calculate your costs of downtime using E-Tech’s Recovery Time Calculator.

Feel free to Contact Us for more information.

Computer Security 101 Checklist

By |2017-10-05T16:33:14-04:00October 5th, 2017|IT Support, Uncategorized|

Since October is Cyber Security Awareness Month we have decided to put together a Computer Security 101 Checklist. Information Technology administrators know the value of computer security. Communicating that value to your end-users, however, can often prove to be a challenge.

Remember, every security best practice is a trade-off between convenience and safety. Users who don’t understand the stakes involved in computer security won’t often give up their convenience. Below are seven key aspects of computer security that all IT admins should teach their users:

Password Security Here’s an easy way to tell if someone is trying to steal information from you, or do damage to your technology: They ask for your password.

  • Never share your password with anyone, ever
  • Use a passphrase (a short sentence that’s easy to remember) instead of a password Combine your passphrase with two-factor authentication

Email Security It’s perfectly okay to open an email from someone you don’t know, and it’s perfectly safe to read it. But unless you’re really sure that the email is legitimate, don’t act on it. Don’t reply, don’t click, and don’t download. To do otherwise is to make yourself a target.

  • Never respond to an email from strangers
  • Don’t open any attachments that you haven’t scanned first
  • Don’t open any links you haven’t checked (hint, hover over the link to ensure it’s really going where it’s supposed to go)
  • Always backup your email

(more…)

Natural Disaster Survival Guide for Businesses

By |2017-09-12T18:27:54-04:00September 12th, 2017|Uncategorized|

In light of Hurricane Irma, a Category 5 storm that targeted the Caribbean Islands, Puerto Rico, and Florida last week, we have put together a few Business Continuity and Disaster Recovery tips for businesses to think about before the next natural disaster happens:

  • Create a phone tree for your organization and stay in touch.
  • Have a plan and contingencies.
    • What do you need to take from your office?
    • How will you support your customers, and from where?
  • Send out the storm plan to your employees, customers and partners. Include a communications schedule and stick to it.
    • Send an update to employees every few hours with what you know and don’t know.
    • Send updates to customers, partners and suppliers with updates that affect them regularly.
  • If your business cannot withstand a period of lengthy downtime, secure a facility further inland for you and your employees or ensure everyone is able to work remotely.
  • Hurricanes can put data centers out of commission. Make sure your business data, backups, applications, and server images are stored off-site.
    • Your IT professionals will be able to restore systems either virtually via the cloud or at the site where you’re resuming operations.
    • If time allows, test the backups of crucial servers before the storm hits.
It’s important to be as prepared as possible for the next natural disaster. It’s not a question of if it will happen, but when it will happen, as a disaster can strike at any time to any business.
Questions to Consider:
  • How much time can your business afford to be down?
  • How much data is your business willing to loose?
You can evaluate your recovery time and recovery point objectives using our Recovery Time Calculator.
To learn more about various types of natural disasters and what they can mean for your business, Download Our EBook, The Natural Disaster Survival Guide for Businesses. Most importantly, be safe!
Feel free to Contact Us for more information.
>

Title

Go to Top