Need Assistance? Call us at (512) 814-8044, or submit a ticket

5 Often Overlooked Security Measures For Mobile Devices

Hacker running away from a mobile device with a locked screen.

Threats to the business use of mobile devices are real and exist across all elements of the mobile ecosystem. According to the Department of Homeland Security (DHS), due to “the enhanced capabilities that mobile devices provide, the ubiquity and diversity of mobile applications, and the typical use of the devices outside the traditional network boundaries requires a security approach that differs substantially from the protections developed for desktop workstations.” (more…)

Share

Comments Off on 5 Often Overlooked Security Measures For Mobile Devices

Data Encryption Tools For The Mobile Business Executive

Infographic depicting various devices using data encryption.

Data encryption is not one of the security options most companies think of providing for their senior executives who use, and travel, with laptops, netbooks and tablets so they can stay productive even when on the road. This is even more true of corporate executives who sometimes demand anytime, anywhere access to data residing on corporate servers.

While the big corporations can afford to spend millions of dollars on data protection hardware and software., the same cannot be said of executives in small and medium-sized organizations, especially when it comes to loss of personal information, including credit card data, patient records or other financial information, stored by the company.

Data breaches happen and information is lost every day due to small mistakes that could have been avoided by using data encryption technologies. For small businesses, these data loss events can be devastating. (more…)

Share

0 Comments

Why Your Small Business Or Organization Needs An Email Policy

Mail envelope containing a documenton on a computer screen.

Email is an important and necessary part of your business or organization. It provides an economical and instant means of communicating with staff, customers, and vendors – that’s both simple to use and enables increased efficiency. An email policy is required to protect this necessary business tool.

An email policy is a legal document that details your organization’s definition of acceptable use for the company email system. It should indicate who emails can be received from or sent to, as well as outline what constitutes appropriate content for work emails.

In addition, having an email policy will:

  • Protect the Organization from Liabilities:

When all employees read and sign an email policy, it proves they are aware and agree to the information contained in that policy. Should an email be sent that is not considered appropriate content according to the email policy, the employee, not the organization, would bear the brunt of liability for any damages or suits brought as a result of their sending an inappropriate email. (more…)

Share

Comments Off on Why Your Small Business Or Organization Needs An Email Policy

Commercial Printers Need Patch Management for Better Productivity

Regular patch management is crucial for the security of the computer network of your business.

Patch Management by Tech PrognosisWhether it is from Microsoft, Adobe, Quark, Océ, Kodak, Xerox, or for SmartBoard, PitStop, Quite Imposing etc., patches are released by software vendors usually to address security issues or to provide bug fixes. Occasionally they enhance or add new features.

Because software security vulnerabilities are the most common ways through which malware can penetrate your computer network, patch management is a good security blanket. While antivirus solutions are great for detecting and removing malware once it is detected on your system, security patches are aimed at closing the doors that malware can use to reach to your system.

Since 2005, there have been over eleven million records breached, according to Privacy Rights Clearinghouse. And those are just from the publicly disclosed data breaches. The large majority of security vulnerabilities that led to those data breaches could have been fixed by applying the latest patches provided by software vendors. But as we know, commercial printers have unique environments with sometimes ridiculously outdated hardware and software – Novell 3.1 anyone? How about that DocuTech 1.0 with software that can only be fixed by that guy in California?

Then you have Canon, Xerox, and Océ with their servers and workstations that no one knows what they are doing other than we “just send files to them”. And you can’t update them either, or something will break. We still have a couple of those stuck on Windows XP, or Windows 7.

If you need more proof about the critical nature of patch management, according to ServiceNow, as noted in this article, a survey of nearly 3,000 cybersecurity professionals around the globe found that “almost half of organizations suffered a data breach in the last two years. Of these, the majority said that they had been breached because of a vulnerability—for which a patch was already available.” (more…)

Share

Comments Off on Commercial Printers Need Patch Management for Better Productivity

Know Your Computer Network Before Hiring An IT Service Provider

Image of Computer Network Assessment ScanningDo You Know Your Computer Network? The often overlooked and sometimes taken for granted software and hardware that make things happen daily for your business or organization. The computers and laptops, servers and switches, firewalls, the power strip etc. How much of your computer network environment do you actually know?

First of all, it is a fact that the cost of doing business has made it a tough going for many small organizations. Therefore, as CEOs of small businesses and Executive Directors of nonprofit organizations are contemplating how to keep customers, employees and donors happy, a lot of offers are bound to be presented, all promising to save cost and provide I.T. nirvana.

For that reason, before you throw the doors open for service providers to come to your environment and start mucking around, it may be a good time to backup for a minute and take time to ask yourself these few questions:

Do you know what you have, in terms of computer network infrastructure?

  • Do you know your hardware and software?
    If the answer is no, maybe or not sure, start the documentation process now. You should know your network devices, operating systems and software programs.
  • Do you know the difference between a home router and an enterprise router?
    If you are using consumer brands like D-Link, Netgear, or Linksys routers to connect your commuter network devices, the answer is probably “No”.
    While such routers are great to connect home networks to the Internet, they are probably not the best option for most midsize businesses. Almost all of these types of routers do not have capabilities for enterprise grade management. Furthermore, they lack troubleshooting features, and for that reason, they have weak performance capabilities, reliability options, and above all, lack the protocols and modules required for most company networks.

(more…)

Share

Comments Off on Know Your Computer Network Before Hiring An IT Service Provider

How Businesses Can Protect Their Wireless Access Points

Image of Wireless Access Points And Devices

The current high rate of mobile users warrants that wireless access users, especially business users, should know how to protect their wireless access points.

First of all, regular business travelers, high-tech adventurers, or those who just love traveling are increasingly vulnerable to unique cyber security threats. This is even more dire in the case of business travelers because they often carry sensitive data that may be personal or business related.

And most noteworthy, this sensitive data reside on a variety of devices from laptops, tablets, and smartphones to other smart devices such as wearables and home appliances.

A recent survey of financial districts found a high percentage of Wi-Fi clients actively probing for “Free Public WiFi”, and cyber criminals create fake wireless access points (SSIDs), hoping that unsuspecting users will log into one of these.

Fraudulent SSIDs Can Lead To Wireless Access Points Attack

It can be tough to convince users — especially those challenged by shrinking travel budgets — to avoid the temptation and draw of free wireless Internet access. When employers can’t or won’t pay for unlimited wireless Internet, employees get creative. Why should they waste thankless hours waiting for planes and trains when they could be using Free Public WiFi to catch up on mail, download iTunes, or watch a little Slingbox? (more…)

Share

Comments Off on How Businesses Can Protect Their Wireless Access Points
Close Menu
Share
Share