Centrend

Author name: admin

Review Your Cyber Security Plan in Four Simple Steps

Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at all. If you have a plan, was it well thought out and tested, or was it thrown together quickly to appease a customer’s request? Take It Seriously It’s time to seriously consider the question: How would your business perform if it is hit by a cyber attack right now?  What would you do? Who would you notify? How would you recover? Cybersecurity Threat Evolution Cyber threats are constantly evolving, making it necessary to continually ensure your cybersecurity defenses and responses are effective for your business right now. A slow or inadequate response can have a very negative impact on the bottom line, along with your reputation. Regular Cybersecurity Audits It’s not enough to have plans in place; they need to be audited regularly. When was the last time your team updated the business’s cybersecurity plans? Are the documents current, and do they still meet the needs of each department? Has network and server equipment changed since the plan was written? What about 3rd party tools and services? The Four-Step Plan Regular internal audits are a smart way to prepare for a more comprehensive external audit.  The brief internal audit I’m recommending below can ensure your cybersecurity plans are up to date and functioning as they should. Here are the four quick steps you can take right now: Step 1 – Review your plans Pull out your documents and give them a hard look. Consider whether your policies and procedures still make sense. Has any personnel changed, etc… Ensure every component of the plan has a clear purpose and that roles and responsibilities for executing the plan are clearly defined. Every aspect of your plan should clearly say who has to do what and by when in the case of a cyber-attack. Step 2 – Assess risks and exposure Have any new services been introduced that have changed where threats can originate? For example, is there new off-site data storage or new wireless access points that have come online? Have there been other infrastructure upgrades such as new server hardware, software, or cloud-based services? If you discover new risks or identify new components, make sure to update your plan to include them. Step 3 – Consider security standard Once you have reviewed and updated the plan, consider whether it meets applicable security standards. If you work with CUI data (confidential unclassified information) under NIST 800-171, for example, do you meet the requirements appropriate to your role?  Does your plan meet the requirements of your standards? How does the plan measure up to general industry best practices?  Step 4 – Test for Action Would employees be able to use the plan in the case of a security breach? Where might a breach be discovered, and who would discover it? Would that person or group know what to do? Does the plan define who they would contact and how long it would take to mitigate the breach and fully resolve the situation? If you’ve taken a look at these steps and are still unsure whether they would be effective, Centrend can help you with a professional external audit. Give us a call or submit our contact form for a free Q&A session to discuss your organization’s readiness for handling a cyber attack.

Review Your Cyber Security Plan in Four Simple Steps Read More »

Don’t Get Caught by a “Phisherman!”

https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to Email Phishing Anatomy 101! You cannot assume that an email you receive actually came from the sender it claims to be from. Phishers are very crafty and will do everything they can to appear familiar so that you will follow their call to action. The infographic below illustrates a very clever phishing email. “Keep Same Password” Now, what would happen if the recipient actually clicks the button? Now, what would happen if you clicked the button? You would be taken to a website that looks like an Outlook Web Access Portal and asked to do the following things: They tell you to confirm your current login name and password to “renew” it. Upon submitting your name and password, you are taken to a screen that asks for previously used passwords for verification purposes. This process is open-ended. The more time you spend time submitting passwords, the more data they collect to hack into other systems at your organization. You can do several things in your business to reduce the amount of these types of emails that actually make it through. Use a strong commercial-grade firewall with deep packet inspection. If you’re suspicious, don’t click the link. Instead, log in by going directly to the website yourself. Have strong endpoint security software on your workstations, so if you do click a link, you will get a warning like Centrend’s managed service clients get (see grap[hic at right) Centrend works hard to protect our customers from phishing by blocking many of these types of threats from ever entering your network or email folder, to begin with. Everyone gets fooled, especially if you are in a hurry. For times like this, we make sure there is local workstation security to safely check suspicious links. For example, clicking on the email below in one of our managed services environments will give the email recipient a second chance to reconsider by showing the following message: If you want to keep the phisherman from trolling your computer’s waters, give us a call or drop us a line.

Don’t Get Caught by a “Phisherman!” Read More »

How to Fix Common Zoom Meeting Problems

https://youtu.be/cc2rpvI-SH8 Technology Tips by Centrend Podcast: Episode 1 We’ve all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can’t visit in person. That’s why in this first episode of my video podcast, I’m going to show you how to diagnose and repair one of the most popular tools for online meetings: Zoom. In addition to going over troubleshooting and repair steps for your sound, video, and microphone problems, I’ll also show you how to change your name’s appearance in Zoom calls. You can watch by clicking the video or scroll down if you prefer to read and view the relevant screenshots. Troubleshooting Sound, Video, and Microphones in Zoom The scenario is I’m in a Zoom meeting, and the other participants tell me that they can’t see or hear me. Putting my mouse at the bottom of the window, I can see that my microphone is muted, and my video is off. I click the Microphone with the line through it, and now my Microphone is on. But when I click to start the camera, I get an error: To troubleshoot, click the small arrow pointing up next to the Video icon, and a menu will appear. Taking a closer look, I see that the selected camera is “Logi Capture,” and that is not my web camera!  The correct camera is HD Pro Webcam C920. Once I select the correct camera, I can click the icon, and my video starts! If your situation is that you don’t see a camera listed, check the physical connection cable between your camera and your computer. If you are on a laptop and your camera is built into your screen, you might need help troubleshooting hardware drivers. Call us or fill out our Quick Contact form to the right, and we’ll give you a hand with it. If you are having problems with not being able to start the microphone, or if it starts and they can’t hear you, click the small arrow pointing up next to the Microphone icon, and a menu will appear as shown in the picture below. From this menu, you can select the correct microphone and speaker that you are using. If you aren’t sure which to choose, the webcam is probably the correct choice for the microphone, and “Same as System” will probably work for your speaker selection. Note: If you are using a headset on your computer, your headset model should be selected for both microphone and speaker. Changing the Appearance of Your Name in ZoomSometimes the host of a meeting will ask participants to have the name appear a certain way. Usually, they request identifying information to appear with your video feed, such as your First Name – Company Name. In the scenario I’m going to cover, I had to quickly change my name to save myself some embarrassment. ???? I had been away on business and set up to do a Zoom call with my little girls back home.  I changed my name to their nickname for me, “Daddy Dragon.” The next day I hosted a Zoom call and waited for the other participants to join when I realized my name still said, “Daddy Dragon.” Rather than have to explain myself, I quickly went to work to change my name. Here’s how I did it. I clicked the icon at the bottom of the screen that says, Participants. This made a list of participants appear at the top right of the Zoom screen. I hovered over my name and selected More > Rename. Then a window pops up that lets me change my name. I hope my blog gives you the confidence to resolve video, sound, and microphone issues and manage your name’s appearance on conference calls. We publish Technology Tips by Centrend every other week, so please subscribe to our newsletter and blog for more great tips!

How to Fix Common Zoom Meeting Problems Read More »

What 6 things increase the longevity of your computer?

Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. ​ What can you do​ to keep your computer running strong like you?​ Extending the life of existing desktops and laptops to reduce your cost and lower your budget is critical in today’s economic climate. Families and companies alike are dealing with limited resources and need their computers to last more than a couple of years. The truth is a quality computer that is maintained will last several years – perhaps even a decade! So how do you make sure your PC investment lasts? The first factor is your buying strategy. Start with a quality computer build. If you buy the cheapest, bargain-basement computer off the shelf, you can’t expect it to last as long as a solid business-class or mid-range residential system. The reality is for a few dollars more you end up with hardware that will last six or more years. Assuming you started with a decent build to begin with, a PC tuneup will go a long way toward extending your computer’s speed and overall life. Here’s a list of things you should be doing at least quarterly to keep your computer running well: Proactively clean and defrag your computer Repair registry issues with your system Keep up to date with hardware drivers Your operating system should be updating regularly – make sure that it’s happening Maintain antivirus software (besides what the computer operating system comes with) Check for add-ons and other unwanted leeches that sap your computer’s resources Centrend can take care of all these things for your business with our automated tools. Give us a call! If you are a home user or solopreneur, visit our whizkidsupport.com site for affordable maintenance plans tailored to your individual needs.

What 6 things increase the longevity of your computer? Read More »

Is My Internet Service Provider’s Firewall Strong Enough?

When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP’s firewall sufficient? Let’s start with a simple description of what a firewall is and how it protects your network from intruders. The role of a firewall is to determine what data can come in, and what data will not be allowed. The pieces of data that arrive at your firewall are called packets. For a basic firewall, the rule is simple:  If somebody requested the packet, it is allowed into the network. If the packet was not requested, the firewall burns the packet. The graphic below shows a typical small business network. BASIC FIREWALL – LIKE FROM YOUR ISP When a packet approaches the firewall, It is analyzed to see if it should be let in. A basic firewall is only going to ask one question before deciding to let the packet of information into the network: Was the packet requested by someone inside the firewall? COMMERCIAL-GRADE FIREWALL When a packet approaches a commercial-grade firewall, it is scrutinized much more carefully and in BOTH directions – IN and OUT, When it decides to let the packet pass through, the decision is logged in a database. The activity log proves invaluable in chasing down and isolating data breaches. Here are some of the things a business-class firewall considers before letting a packet pass: Was the password Requested? Is the packet SAFE to let in or does the packet contain a virus, malware, or other malicious code? Is the destination internet address listed on any “blacklists” due to bad activity coming from there? Is traffic from the country of origin allowed? Does the corporate policy for content filtering allow access to the material that is on the destination website? The chart below shows examples of the types of traffic that are allowed or blocked by the different firewall options. The commercial-grade firewall is not only a strong defense against unsolicited traffic, but it also gives business control over what content is allowed on their network. Business-class firewalls are surprisingly affordable. If you would like help evaluating whether it’s right for your home or business, please give us or fill out the contact form below.

Is My Internet Service Provider’s Firewall Strong Enough? Read More »

Six Ways Scammers are taking advantage of COVID-19

Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share your sensitive information like passwords or credit card details. They pretend they are from an organization you know, such as FedEx, UPS, or even a government agency. 2. Fake Products: Keep your eye on e-commerce websites, social media accounts, and emails from people and stores claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. When you make purchases from these fake stores, criminals will keep your money, but you will never see the products you purchased. 3. Fake Charity: Individuals and companies, sometimes with real-sounding names, call or email to ask for donations for people and groups affected by the coronavirus. Some of their elaborate backstories sound extremely legitimate and emotional but completely fake. 4. Medical scams: People are getting calls and emails from people pretending to be hospital workers or medical professionals claiming they treated someone they know for the coronavirus and demand payment. 5. Malware. Think of these malicious applications as Trojan Horses. You download them to your computer or phone for some purpose, and behind the scenes, the program is stealing your personal information. Sometimes these record your logins to banking sites, email, Facebook, etc., and send the data back to the hackers. 6. Zoom Bombing. Lots of businesses, schools, and individuals are using Zoom to hold online meetings. To make it easier, meeting hosts often don’t require a password. Unfortunately, not having a password makes it all too easy for hackers to jump on your meeting and flood your virtual room with swear and porn. They can embed virus code in the image files or stealthily share a file with all the participants that have virus or malware code in it. Check our blog next week for details on how to keep hackers out of your Zoom meetings. The number one way to protect yourself from cybercrime is to use strong passwords on your computer, phone, and meetings and make sure your computer is tuned up and secure. If you ever feel concerned that your computer system is hacked or you just want a security checkup, please contact us at 774-241-8600 or submit the quick contact form on this page. We’re always here to help!

Six Ways Scammers are taking advantage of COVID-19 Read More »

How do you know if you have Spyware in your computer?

Sometimes, it’s obvious, right?  There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead!  Other times, the infection is much more subtle. Here are some things to watch out for… Signs that your computer is infected with a virus or malware Random pop-ups – if you are using your computer, especially the web browser and you are getting a lot of pop-up messages without clicking If you click a link in a web search but get an unexpected, less relevant result If in the bottom right, you are bombarded with notifications and solicitations If your browser has extra “toolbars” across the top or bottom that weren’t always there, or that you don’t see on other computers If you suddenly can’t open documents on your computer that you have always been able to open You are prompted for a password at a strange time. Such as when you are just working on a Word document or browsing a website that doesn’t require login Your virus scanning software is no longer running – malware or a virus may have shut it down If you have any of these problems, please call us for help! If you aren’t sure if you are infected, we are glad to offer a free consultation. Just fill out the Quick Contact form or call us at 774-241-8600.

How do you know if you have Spyware in your computer? Read More »

How to Clean and Disinfect Computer Equipment Without Destroying it

With the threat of coronavirus (COVID-19) all around us, we are all being more diligent about wiping down our work areas. One of the highest touch areas in your environment is your keyboard, mouse, and touch screens. If you’re a customer of Centrend, I already have the inside of your computer covered with strong antivirus software. So here’s how to keep your stuff clear of the other types of viruses. Important note: Off-the-shelf brands of “electronic wipes” are NOT disinfectants unless they specifically say so. At the left is an image of a common one that is NOT a disinfectant. It may wipe away the virus but if there is any left on the surface, it will stay alive. I recommend using Isopropyl alcohol. The CDC recommends the solution have at least 70% alcohol content. The one I use is pictured at right. Mine is 91% but as long as you are 70% it should be effective. So how to disinfect your equipment with these products? It will depend on the specific equipment so I’ll go through each category one by one. Screens & Phones Make sure the device is off. Always apply the solution to a cloth and don’t spray the equipment directly Use a MicroFiber to make sure dust and lint don’t collect on the screen. If the screen appears physically dirty, you may want to clean it with a paper towel or other soft cloth and save the microfiber for after. If your Microfiber cloth gets dirty, you can wash it with mild detergent and a soft-bristled brush like an old toothbrush. Dry the screen or wait till it is dry to turn it on again. Keyboard Unplug your keyboard from the computer or shut it off if it is wireless. Hold it upside down over a trash can and give it a few shakes. This will knock food crumbs and other particles out of the keyboard. You can use compressed air to help blow out crumbs. Just don’t hit it too hard with the air stream or you will blow keys off the keyboard! Apply the cleaning solution to the cloth. Never spray solutions directly onto the keyboard. To get in between the keys, you can use a cotton swab (Q-Tip) that you dip in the solution. Be sure there isn’t so much solution on the swab that it drips into the keyboard. Mouse or Touchpad Unplug your mouse from the computer or shut it off if it’s wireless. If your mouse has a scroll wheel, hold it upside down and spin it a few times to get any loose particles out of the inside. Apply the cleaning / disinfecting solution to a cloth and be sure it’s not too saturated. Your mouse has openings that you can’t let the liquid run into. Let the mouse dry before plugging it back in or turning it on again. I hope you’ve enjoyed my article and it helps you stay safe and healthy!

How to Clean and Disinfect Computer Equipment Without Destroying it Read More »

Working Remotely? Are you secure?

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.  Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.   Here are some of the things I see happening that create the riskiest scenarios: VPN Connections are being set up quickly by inexperienced personnel, and their encryption policies are weak.  Companies lack the knowledge to accurately monitor remote activity to identify and mitigate a data breach that originates from these new remote channels. When a VPN is not available, very insecure connections are being created to remote desktop servers, or directly to desktops. Remote desktop connections that are open to the outside world are vulnerable to all types of hacking. If systems have not been regularly patched and maintained, they are at risk of known vulnerabilities that hackers will exploit. Employees may be using their own computers to log in from home, and the individual’s computers lack adequate security protection.  The lack of sufficient security on the home computers allows an attack from the inside – through the VPN. An attack launched from within the trusted, secure tunnel is tough to identify and close the door on. Entry-level or free versions of software like Team Viewer, Logmein, or GoToMyPC are being used to provide remote control over office desktops. The limited versions of these software packages generally work well but offer limited or NO AUDITING capability. If your system is compromised, you will not know what the thieves stole or how long they had access to your business data. Centrend wants to help.  We are now offering free consultation AND free implementation of remote access solutions to businesses affected by COVID-19. Reach us at 508-347-9550 or submit the Quick Contact form below to get help.

Working Remotely? Are you secure? Read More »

Centrend COVID-19 Response

Centrend cares about our employees’ and our customer’s safety, and we’re doing our part to reduce the spread and flatten the curve. Read on to learn what we are doing to keep safe and keep our customers’ information systems running well. We are practicing social distancing and utilizing our extensive remote support and remote management tools to maximize efficiency and safety for our staff and our customers. We’ve limited our travel and on-site visits to only the essential times when we must be physically on-site. For the safety of our staff and our customers, projects requiring us to be hands-on at the customer’s location have been deferred until after the crisis is over, and the restrictions are lifted. Since Governor Baker’s announcement that only critical businesses would be allowed to operate, Centrend expanded our support hours and has been working tirelessly to implement secure remote access solutions for our customers.  We can help with secure, remote access, training on video conferencing tools, or support for your remote workers. You need your staff to work remotely and keep your business operating as best it can. We can help. Starting in Mid-April, Centrend will offer free consultation and free set up of remote access solutions tailored to your unique business environment. Stay tuned to our blog for more information. You can also give us a call at 774-241-8600 or submit the short form below. 

Centrend COVID-19 Response Read More »

Scroll to Top