This week has been a doozy, as the old saying goes. From a disturbing Twitter hack to a serious vulnerability with Microsoft's DNS Server to nation-state hacking against organizations engaged in finding a vaccine for COVID-19, there's been a flurry of malicious activity. If you are still questioning whether or not your organization is at risk, my advice is to assume that you are. To not could be catastrophic. In the case of the Twitter hack, an employee was the victim of a targeted phishing attack that got them to divulge credentials allowing the hacker into backend administrative systems. Once in, the hacker sent out tweets under the accounts of several public figures. The tweets in question involved a cryptocurrency scheme.
The vulnerability in Microsoft's DNS role on Windows Server could allow a hacker to take control of systems and then attack other connected systems from there. This issue was so serious that it generated an emergency alert from the Cybersecurity & Infrastructure Security Agency (CISA) to immediately patch impacted systems.
All three of these incidents represent different ways that cybersecurity threats impact us all. It's imperative that you continually reevaluate your cybersecurity posture. Talk with your IT department or partner and be sure you are doing everything that you can to help protect your business. We are available to help, call 714-660-1811.
First and foremost, what is a DDoS attack? DDoS stands for Distributed Denial of Service. Simply stated, this type of attack floods a given service with massive amounts of traffic from distributed sources making the service unavailable and the source difficult to pin down. As an example, if a hacker or hacker group wants to make a given web site unavailable, they can flood that site with so many requests that the site can't keep up. As a result, the site becomes unavailable to people who are legitimately trying to use it.
Here's Jeff Olejnik's interview featured in Channel Executive May 2019 magazine. https://www.channelexecutivemag.com/doc/partner-pricing-0001 --- The ASCII Group is a vibrant reseller community of independent MSPs, VARs, and other solution providers. Formed in 1984, ASCII has more than 70 programs that provide turnkey cost-cutting strategies, innovative business building programs, and extensive peer interaction. ASCII members enjoy benefits such as marketing support; educational information; group purchasing power; increased leverage in the marketplace; and multiple networking opportunities. These programs enable ASCII members to increase revenue, lower operating costs, and grow service opportunities. ASCII is the oldest and largest group of independent information technology (IT) solution providers, integrators and value added resellers (VARs) in the world. Learn more at www.ascii.com.
Our clients on our managed services have never seen a message like this screen shot below, however we received a call from a prospect in trouble. Ransomware will lock your computer and encrypt ALL of your files. Why? They want you to pay a ransom to decrypt your files. I'm sure you've heard on the news hospitals and numerous small/medium businesses have simply PAID the ransom just to keep operating. Most you do not hear about because of the bad PR this can cause for businesses. Here's a few tips if you happen to be a victim of ransomware or cryptoware virus infection. Quickest thing to do is unplug your network cable from the computer or wall, do this immediately so the virus can not infect the rest of your network, computers, servers, etc. Call us, we can assist in clean up, restoration, and best practice proactive maintenance to avoid these business crippling situations.
A big part of our small/medium business security services including blocking malicious code from entering client desktop computers. One of our vendors for this type of service includes logs of what applications your employees are using. This is great for 90 day reviews as it categorizes apps and websites into productive and non-productive. This provider did further research with all of their users and discovered that there are ten million unique apps and websites accessed by their users. May not be a surprise that Outlook is the top app used, followed by Excel, adobe CS and Skype. view the complete report here https://activtrak.com/blog/popular-saas-products/ Need help configuring any small business applications, or if you would like a content filtering and productivity reports for employees at your small business, contact us at 714-660-1811
Ever want to show someone something on your computer as you were talking and you either end up moving the monitor, or they move to stand beside you? Wouldn't it be easier to display the spreadsheet, photo, website, or video on a TV mounted to the wall. Recently we wired up a TV at a clients site to do just that. In this particular case the client has security cameras also hooked up to the TV, and can easily switch inputs to have his computer broadcast his Windows desktop. In full High Definition. There are wireless solutions for this type of application such as AirTame, however we chose to used a wired HDMI connection. Ease of use, just like 2 monitors on your desk and very reliable. If you'd like something like this at your office or conference room please contact us. 714-660-1811
If you have your wifi router stuck in the telephone closet far away from where you need coverage, or if you added a big box store wireless network extender, both are likely problematic. Upgrade your wifi with a business grade wifi access point. We install the units in the area you need them the most, they look like a ceiling mounted smoke detector. If you need additional coverage additional access points can be installed, however in most offices 1 unit covers around 3K sq. ft of open space. These units are faster, provider long range coverage and are much more secure then consumer grade wifi access points. Our favorite feature is the ability to create multiple wifi SSID's. Example being you can have 1 for internal "smart" devices, another for employee access and another for "guest" access. With guest access we remove the ability to reach other devices on your network for security reasons. For the employee access, the password can be updated/changed where there is staffing changes, while leaving the internal (smart or IoT) devices unchanged. The performance is top notch, especially if you are consistently rebooting your D-Link wifi unit from Staples. Don't open your business network to the flaws of consumer grade wifi equipment.
Small business cyber defense protection As long as businesses continue to operate and make money, cybercriminals will look for ways to break in, exploit weaknesses, and steal your company information. To defeat them, you need to think like a cybercriminal to find the angles they could use to exploit your computer systems.
- Stolen Devices. The Fix: Encrypt all devices and use an asset-tracking tool to keep an inventory
- Poor user awareness. The fix is have us provide user awareness training. see more of our services here http://www.newport-solutions.com/computer-security-employee-education/
- Out of date anti virus. Almost 400,000 new malware strains are created daily! This is why managed anti-virus is necessary. http://www.newport-solutions.com/why-off-the-shelf-consumer-grade-anti-virus-is-slowing-you-down/
- Unpatched (updated) software. Out-of-date software can be susceptible to automated attacks. Only 25% of Microsoft Windows users run the latest, fully patched version. Our managed desktop provides patch management.
- Malicious websites. Drive-by downloads or phishing websites to steal credentials. 195,000 unique domains were used for phishing attacks in 2016. Deploy our web content filtering solution for your business to keep users off malicious websites.
- Lack of Monitoring. Attacks often go unnoticed. Use a strong monitoring system to detect unauthorized access. Don’t be taken advantage of by cyber-criminals. Let Newport Solutions cyber-defense and risk management systems protect you from costly ransomware attacks.If you are looking for help with these services we can assist:IT Support Virus Removal Data Backup Services WiFi Setup Network cabling installation small business cyber defense protection VoIP for small businessesIT SUPPORT orange county ca If you are looking for the best IT support company in Orange County, CA including Newport Beach, Costa Mesa, Fountain Valley, Orange, Anaheim, Brea, Irvine, Tustin, Santa Ana consider Newport Solutions, Inc. your fastest choice. Affordable IT support for your SMB (small/medium business). Ask about our data backup solutions. Contact us at 714-660-1811
Most businesses, like yours, run on email. From internal communications to customer service. Unfortunately, this makes email an effective tool for cyber criminals. Here are some facts on why email security matters. Email is popular for Hackers - 66% of malware is delivered via email. SMB (Small/Medium Businesses) are targets too! 50% of small and medium businesses have experienced at least one cyber breach. SMB's pay a high price. $879k was the average value lost during a cyber breach. Attacks happen to everyone. 85% of organizations have been victims of a phishing attack. Don’t be taken advantage of by cyber-criminals. Let Newport Solutions cyber-defense and risk management systems protect you from costly ransomware attacks. If you are looking for help with these services we can assist: IT Support Virus Removal Data Backup Services WiFi Setup Network cabling installation VoIP for small businessesIT SUPPORT orange county ca If you are looking for the best IT support company in Orange County, CA including Newport Beach, Costa Mesa, Fountain Valley, Orange, Anaheim, Brea, Irvine, Tustin, Santa Ana consider Newport Solutions, Inc. your fastest choice. Affordable IT support for your SMB (small/medium business). Ask about our data backup solutions. Contact us at 714-660-1811