Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report by cybersecurity firm Barracuda Networks debunks this myth. Their report analyzed millions of emails across thousands of organizations. It found that small companies have a lot to worry about when it comes to their IT security. Employees at small companies saw 350% more social engineering attacks than those at larger ones.
Why Are Smaller Companies Targeted More?
Reach out today to schedule a free technology consultation. We offer affordable options for small companies. Working from home wasn’t novel when the pandemic hit, yet COVID-19 forced businesses globally to give remote work a real try. Two years later, employees have a new view of modern work. Many expect to work from home, at least part-time. If you’re “commuting” daily within your home, you’ll want to consider these easy upgrades for your home office. First, an uninterruptible power supply (UPS) can save you a lot of stress. Although common in the business environment, homeowners may not have thought about one. A UPS allows your computer to keep running in the event of a power outage. Think of the UPS as a backup battery giving you a short window of energy to protect your data. They can also regulate voltage in the event of a power surge.
With a UPS, size typically matters: the bigger the battery, the more power it will store. So, consider what technology you’ll want to keep up and running and for how long. Size can also matter with your computer monitor. Working on a laptop can be convenient, but the screen will be smaller. Setting up your home office with a wide monitor can lead to productivity gains. This is especially true for people who like to keep all their files and folders up on their desktops. You can also reduce the time spent scrolling through open windows with a second monitor. That extra monitor may also save you from printing documents and cluttering your desktop with paper. Improving work quality in the home officeThe business environment is going digital. Do the same with a document scanner that handles many pages at once. Flatbed scanners can provide quality scans, but speed and quantity may matter more. Plus, once your documents are scanned, you’ll be able to search for information using keywords. Instead of poring over pages of text, you can go pour yourself another cup of coffee. If you’re stuck at your desk once the workday starts, invest in a standing desk. There are many options that allow you to easily convert the desk from sitting to standing and back again. This can help your energy levels and reduce stress on your body from sitting in the same position all day. Speaking of reducing physical stress, an ergonomic keyboard is another good investment. Plus, you may want to get yourself a better office chair. Back when your home office was a seldom-used space, sitting at an old dining room chair wasn’t a big deal. Now, though, you’ll want to do your body the kindness of getting a comfortable, supportive chair. One more simple upgrade to consider: noise-cancelling headphones make it easier to focus on your work while dogs bark. You'll also avoid volunteering for extra work without realizing that was what your boss was saying while you were shushing a child. Need help deciding on the right technology for your home office, or want to be sure you set it up correctly and securely? Our IT experts are here to help. Contact us today at 262-515-9499 One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While older technology may still run fine on your systems that doesn’t mean that it’s okay to use. One of the biggest dangers of using outdated technology is that it can lead to a security breach. Outdated software and hardware no longer receive vital security updates. Updates often patch newly found and exploited system vulnerabilities. No security patches means a device is a sitting duck for a cybersecurity breach. Approximately 1 in 3 data breaches are due to unpatched system vulnerabilities.
Another problem with using discontinued technology is that it can leave you behind. Your business can end up looking like you’re in the stone ages to your customers, and they can lose faith and trust. Important reasons to keep your technology updated to a supported version are:
Older systems are clunky and get in the way of employee productivity. If you keep these older systems in use, it can lead to the loss of good team members due to frustration. 49% of surveyed workers say they would consider leaving their jobs due to poor technology. Following is a list of outdated technology tools that you should replace as soon as possible. Are any of these still in use on your home computer or within your business? The Most Common Offenders Internet Explorer Many moons ago, Internet Explorer (IE) used to be the number one browser in the world. But, over time, Google Chrome and other browsers edged it out. Including its replacement, Microsoft Edge. Microsoft began phasing out IE with the introduction of Microsoft Edge in 2015. In recent years, fewer applications have been supporting use in IE. The browser loses all support beginning on June 15, 2022. Adobe Flash Millions of websites used Adobe Flash in the early 2000s. But other tools can now do the animations and other neat things Flash could do. This made the tool obsolete, and Adobe ended it. The Adobe Flash Player lost all support, including security updates, as of January 1, 2021. Do you still have this lingering on any of your computers? If so, you should uninstall the browser plugin and any Flash software. Windows 7 and Earlier Windows 7 was a very popular operating system, but it’s now gone the way of the dinosaur. Replacements, Windows 10 and Windows 11 are now in widespread use. The Windows 7 OS lost support on January 14, 2020. While it may still technically run, it’s very vulnerable to hacks. Microsoft Windows OS is also a high-value target for hackers. So, you can be sure they are out there looking for systems still running this obsolete version of Windows. MacOS 10.14 Mojave and Earlier Because of the cost of iMacs and MacBooks, people tend to hang onto them as long as possible. Once these devices get to a certain point, updates no longer work. This leaves the hardware stuck on an older and non-supported macOS version. If you are running macOS 10.14 Mojave or earlier, then your OS is no longer supported by Apple, and you need to upgrade. Oracle 18c Database If your business uses Oracle databases, then you may want to check your current version. If you are running the Oracle 18C Database, then you are vulnerable. Breaches can easily happen due to unpatched system vulnerabilities. The Oracle 18C Database lost all support in June of 2021. If you have upgraded, then you’ll want to keep an eye out for another upcoming end-of-support date. Both Oracle 19C and 21C will lose premiere support in April of 2024. Microsoft SQL Server 2014 Another popular database tool is Microsoft’s SQL. If you are using SQL Server 2014, then mainstream support has already ended. And in July of 2024, all support, including security updates will stop. This gives you a little more time to upgrade before you’re in danger of not getting security patches. But it is better to upgrade sooner rather than later. This leaves plenty of time for testing and verification of the upgrade. Get Help Upgrading Your Technology & Reducing Risk Upgrades can be scary, especially if everything has been running great. You may be afraid that a migration or upgrade will cause issues. We can help you upgrade your technology smoothly and do thorough testing afterward. Schedule a Tech Force Review today. Call 262-515-9499 Article used with permission from The Technology Press. The number of internet-connected devices in homes has been growing. It's increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT devices. IoT stands for Internet of Things. It means any other type of “smart device” that connects online. IoT devices in a home can be everything from your streaming stick to your smart refrigerator. Smart baby monitors and Alexa voice assistants are also IoT.
There's also been another change that has happened over the last couple of years. It has been the increase in remote and hybrid work. The pandemic caused a major shift in where we work, turning the standard office paradigm on its head. Now, working remotely has become the norm for many companies around the world. This has put increased scrutiny on the security of all those IoT devices. They are now sharing a Wi-Fi network with business data and devices. Here are two alarming statistics that illustrate the issue with IoT security:
Hackers Can Use IoT Devices to Access Your Computer and More Smart devices are a risk to any other device on a network. They are typically easier to breach. So, hackers will use them as a gateway into more sensitive devices. A criminal may not care about the shopping list stored in your smart refrigerator. But they’ll breach that IoT device to see what other devices are on the same network. The hacker can then use sharing and permissions that are often present on home networks. Through these, they gain access to your work computer or mobile device. These devices hold important data, and access to personal details. Why are IoT devices less secure than computers and smartphones? Here are a few reasons:
Secure Your Network By Utilizing "Guest" Wi-Fi Just about all modern routers will have the ability to set up a second Wi-Fi network, called a “guest network.” This shows up when you connect to Wi-Fi as a separate Wi-Fi that a device can use to get online. By putting all your IoT devices on a separate network you improve security. You cut that bridge that hackers use to go from an IoT device to another device on the same network. Such as those that hold sensitive information (computers and mobile devices). In fact, when you separate those two (IoT devices and sensitive-info devices) a hacker can't see all. If they breach one of your smart devices, they can't tell you have a PC or smartphone. This is because they’re on the other network. This is an important layer of security to use. Whether you’re a remote worker or use your computer for home budgeting and banking, it can help. All PCs and smartphones usually contain access to online banking or personal information. As you add any new devices to your home network, make sure to connect them to the appropriate network. This keeps the layer of security effective. One more tip: When naming your Wi-Fi networks, don’t use descriptive names. This includes things like “IoT network” or your name, address, or router model name. It’s best to use names that won’t give the hackers valuable information they can use in attacks. With so many remote workers, hackers have begun targeting home networks. They know they can contain sensitive business as well as personal data. Don’t leave yourself open to a breach! Call us to schedule a home internet security review today. 262-515-9499 Patience is often a virtue and being budget-conscious is also a plus in business. Yet taking a “wait and see” approach with business tech is a top IT mistake. There is a lot of uncertainty in the current economy. You may be looking to save money to give your business more budget leeway. But if you don’t make ongoing investments in your IT, your business could suffer.
You might skip software upgrades, but that can put your business at risk from cyber bad actors, who look to exploit weaknesses when people don't upgrade their systems. Deciding to put off replacing older devices or legacy hardware, you may be thinking, "What’s one more year?" It can make a big difference, actually. Your systems may have vulnerabilities that cyberattackers will leverage. Your hardware may not be able to keep up with your business during its busy times, and your people could be working on devices that are no longer supported by the manufacturer. If something does go wrong, you’re on your own. Trying to get by with less when it comes to business technology can hurt your business. We’re not saying you have to throw all sorts of money at every new technology out there, of course; it’s about fitting the right technology to your specific business needs. Business tech: Better now than later Businesses today are undergoing digital transformation. Across industries, people see the advantages of IT. The right technology enhances the quality of work and boosts productivity. You have the tools needed to support faster processing and wider information distribution. Thinking only short-term about technology, as in “it’s working fine for now,” could hurt you in the long run, however, and by not looking after your tech and keeping it current, you could be missing out on:
Moving forward with an MSP There is an inevitability to investment in business tech. You know you’re going to need it. But taking the wait-and-see approach simply puts you at risk of a cyberattack or other productivity drains. Keeping your IT current and investing in this essential area can benefit employee engagement, customer satisfaction, and your business's bottom line. Not sure what technology to focus on while working within your budget? Our IT experts can help. We’ll get to know your systems and your unique needs. Then, we'll make suggestions about the smartest investment areas for your business. Contact us today at 262-515-9499! Hi, Important that we meet discuss speerfishing attacks over business comunicatons. We need to make plan about this IMMEDIATELY. Please click on the link [uurl.callender.com] to make an appointment with IT for quick tutorial. Regards, IT There are several things wrong with this email, and hopefully, you noticed them. All are red flags you can look for to avoid fake meeting requests or calendar-invite scams.
Business Email Communication (BEC) scams are not new. For example:
In 2020, BEC attacks were the most lucrative scam. The US estimated cybercriminals made over $1.8 billion with this approach. Beyond money, falling victim to a BEC attack also costs your business time and reputation. Here’s what to look for and how to protect against BEC scammers. How BEC Scams Work With many more people working from home and meeting virtually, there’s been an uptick in BEC spearfishing attacks. On Gmail, the bad actor needs only your email address to send an invite that adds to your calendar by default. Then, you might click on what appears to be a meeting link, which actually takes you to a malware site. Zoom has also become an attack vector. You get an invite to a meeting that asks you to login into Microsoft Outlook. You’ve done it so many times before, except this is a fake login page, and it’s set up to steal your access credentials. How to Protect Against BEC Scams Educate your users. As with any other type of email scam, users need to learn to be careful about the links they click. Some indicators to look for, which you can see in our opening example, include:
Email addresses, links, and domain name inconsistencies are more bad signs. Plus, be wary if something seems too good to be true (a free laptop?) or is an unusual request (transfer $1 million from the CEO’s account). Google Calendar users can go into General settings, then Event settings, and switch off “Automatically add invitations.” Instead, select “No, only show invitations to which I have responded.” Also, under Events from Gmail, you can stop calendar events auto-generating based on your inbox. Keep in mind, though, that you’ll also be blocking legitimate events. In these days of the hybrid workforce, we’re used to clicking on links from Zoom, Google Docs, and Microsoft Office as part of our daily workflow. The cyber bad guys know this and are taking advantage of it. Unsubscribing from email lists, keeping your email private, and reporting spam to IT can all help. Your business might also benefit from working with a managed service provider to use a third-party spam filter. Our experts can also review your cybersecurity posture and identify areas to improve your defenses. Contact us today at 262-515-9499 The importance of information technology in meeting business objectives continues to grow. Regrettably, the shortfall in professionals who can manage business tech is also growing. Learn what the IT skills gap means for you. Technology helps businesses meet strategic priorities. This includes:
In CompTIA’s research into the “State of the IT Skills Gap,” the skills disparity is widening. And it’s doing so at a worrying rate. Nearly half of CompTIA’s respondents said the skills gap had grown in scope/depth over the past two years. That's 46%, indicating significant or moderate growth in their businesses. That may not even capture the problem accurately. Only 44% of CompTIA’s respondents felt they had the know-how to identify and assess IT skills gaps on their own. IT Skills Gap IssuesThe IT skills gap affects strategy and also impacts staff productivity and customer service/customer engagement. The shortfall in IT savvy individuals also impacts security, particularly:
Plus, the IT skills gap can slow the adoption of emerging technology. This sees businesses struggling to upgrade existing hardware and software. They aren't able to use artificial intelligence, automation, or the Internet of Things. The shortage also hurts data integration, management, and analytics. Software or app development can also suffer. How to Address the GapThere are many ways businesses can improve the IT workforce pipeline. Providing on-the-job experience through internships or apprenticeships may work, as might encouraging IT employees to pursue new certifications and credentials. Investing in tech talent is another way to promote your business objectives. Without the right IT support, you could end up buying the wrong technology or struggle to deploy it. Instead of adding agility and efficiency, you’ll slow things down and may compromise security, too. With the IT environment constantly evolving, it’s difficult for businesses to keep up. Many firms can’t keep up with the rising compensation requirements, keeping internal IT trained is expensive, too. Then, if IT talent leaves, they take their business infrastructure knowledge with them. The solution? Partnering with a managed service provider (MSP). With an MSP you gain experts that always stay on top of the latest events and are always trained up. Yet you don’t have to pay for their conferences and ongoing training. You typically pay a consistent set fee for the services you need. Our experts can help update your infrastructure, deploy new systems, and secure IT. Contact us today at 262-515-9499 Unfortunately, these days online security breaches occur far too often. That’s why it’s never been more important to ensure all your accounts are as protected as possible. Yes, strong passwords are critical, but you should also enable two-factor authentication on your accounts whenever possible.
What is two-factor authentication? Two-factor authentication (also known as multi-factor authentication or 2FA) requires you to confirm ownership of two separate variables generally your password and a unique code sent via email or text to complete sensitive actions on your accounts. Sound familiar? You're probably already using this with your bank, most financial institutes require it when you log in on a new computer or device. However, some accounts don't require two-factor authentication - for those that don't but offer it, you should enable it in the settings or security sections. It is available on most online services like Gmail, Apple, and Amazon. Adding this extra step adds another layer of security and can protect your sensitive personal information. Contact us if you have any questions or need assistance with implementing two-factor authentication for your office devices and apps. Business downtime is costly. Research abounds on just how much it can set a business back. Some small businesses can't even rebound from the expenses associated with downtime. This article outlines the many expenses a business can encounter as a result of downtime. What do we mean by downtime? There are many reasons a business might experience IT downtime. Say, the Wi-Fi goes down or there’s a simple power outage. Either could lead to a small-scale, short-term downtime.
Worse, you could be the victim of a cyberattack that sees criminals encrypting your data. A data breach or malware infection could force you to take systems offline to solve the problem. Severe weather events such as tornadoes or hurricanes can also cause downtime. Or maybe the building suffers a gas leak or a fire, and your business isn't immediately able to get back on-site. If you don't have cloud-based access to your applications, you could suffer downtime. Every minute you are without your business technology can add up. Let's consider the various costs you could encounter. Loss of business revenue If your people can't access business systems or network applications, productivity drops. Your sales team can't close deals, or your product development team can’t access schematics. Perhaps someone in client development can’t get to their pitch presentation. Remediation costs Fixing your business technology after downtime takes extra work, which means added resource costs. You may have to pay overtime to the IT team working round the clock to get you back up and running, or there could be places you need to catch up when you had to spend time doing things manually. This disrupts efficiency and costs money. Customer dissatisfaction How often do you hear someone apologize for their computer running slowly? When you call a customer service line it's a familiar frustration. Imagine telling someone instead, “our systems are down, and we are unable to help you right now.” You will be compounding customer aggravation. They don't want to wait for your downtime to end to resolve their issue. If there's a data breach, customers will worry about personal data or compromise of proprietary information. Legal and compliance fees Your business could run afoul of compliance or face legal action. For instance, if you are in the health services industry and are breached, you could be hit with hefty fines for jeopardizing personally identifiable information. Brand reputation Say your payment processor goes down, and you’re not able to take any orders. Some customers will get impatient and order from a competing website. They may end up switching to that company permanently. There's also a misconception that any press is good press. But you do not want your business to make headlines for having fallen victim to a cyberattack. Employee engagement Every business owner recognizes the importance of retaining motivated and skilled staff. Employees frustrated by downtime may start looking elsewhere. Morale and your business culture could decline. Turnover could rise. You'll need to invest time recruiting, training, and retaining fresh new hires. Key takeaway Don't think business downtime can't happen to you. When it comes to technology, threats are ever-evolving. Keep current with updates and software upgrades, and be vigilant about fresh threats. Partner with an MSP to develop backup plans. An IT vendor can help move systems to the cloud to ensure mobile access. MSPs can also be proactive. They perform preventative maintenance and help cut your cybersecurity risk. We can't promise downtime won't happen, but we can make sure you are resilient and able to bounce back more quickly should problems arise. Contact us today at 262-515-9499. Working for a small business, you can be asked to wear many hats. Even if one of your many roles is not IT, you may need to speak up about your business technology or cybersecurity. It’s easy to think cybersecurity is someone else’s responsibility, but IT may not be getting the attention it deserves, and that could be damaging to the business, your career, and your identity.
A data breach can destroy a business. Cybersecurity Ventures estimates that 60% of small businesses close within six months of a breach. It’s easy to calculate why. In Ponemon’s annual Cost of Data Breach report, the average cost was $161 per record. That adds up. If you’re at a business that can’t recover, you could be out looking for work again. Of course, you care about your customers. You don’t want their personally identifiable information (PII) getting out to criminals. But their information isn’t the only thing at risk. Your employer has a lot of PII about you, too. They’ll have your name, address, salary amount, and bank account details. Plus, they may have health information related to your benefits. They probably also have copies of your government identification. It's not only about protection If your business tech is out of date, you’re at greater risk of cyber vulnerability. But improving IT isn’t only about protecting data and preventing downtime. Having the right technology to suit your business can also help you be more productive. Speaking up about IT could see the business improve, grow, and gain resiliency. Working with a good MSP can help both you and your business:
A slow system is painful to use. Having to wait even a few minutes for a computer adds up over a 40-hour work week. Worrying about the security of your data doesn’t help your focus at work either. You don’t have to be an IT expert to understand that there is room for improvement with your technology. Connect us with your employer to schedule a free consultation for your business needs! Contact us at 262-515-9499 to start the conversation. |
Tech Force BlogWe provide you with important, practical tips and insight for your technology and networks for both home and business. Archives
March 2023
Categories
All
|