Centrend

Cybersecurity

Review Your Cyber Security Plan in Four Simple Steps

Increasing Threats Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it’s no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack? If you are like most small/medium businesses, you don’t have a written plan at all. If you have a plan, was it well thought out and tested, or was it thrown together quickly to appease a customer’s request? Take It Seriously It’s time to seriously consider the question: How would your business perform if it is hit by a cyber attack right now?  What would you do? Who would you notify? How would you recover? Cybersecurity Threat Evolution Cyber threats are constantly evolving, making it necessary to continually ensure your cybersecurity defenses and responses are effective for your business right now. A slow or inadequate response can have a very negative impact on the bottom line, along with your reputation. Regular Cybersecurity Audits It’s not enough to have plans in place; they need to be audited regularly. When was the last time your team updated the business’s cybersecurity plans? Are the documents current, and do they still meet the needs of each department? Has network and server equipment changed since the plan was written? What about 3rd party tools and services? The Four-Step Plan Regular internal audits are a smart way to prepare for a more comprehensive external audit.  The brief internal audit I’m recommending below can ensure your cybersecurity plans are up to date and functioning as they should. Here are the four quick steps you can take right now: Step 1 – Review your plans Pull out your documents and give them a hard look. Consider whether your policies and procedures still make sense. Has any personnel changed, etc… Ensure every component of the plan has a clear purpose and that roles and responsibilities for executing the plan are clearly defined. Every aspect of your plan should clearly say who has to do what and by when in the case of a cyber-attack. Step 2 – Assess risks and exposure Have any new services been introduced that have changed where threats can originate? For example, is there new off-site data storage or new wireless access points that have come online? Have there been other infrastructure upgrades such as new server hardware, software, or cloud-based services? If you discover new risks or identify new components, make sure to update your plan to include them. Step 3 – Consider security standard Once you have reviewed and updated the plan, consider whether it meets applicable security standards. If you work with CUI data (confidential unclassified information) under NIST 800-171, for example, do you meet the requirements appropriate to your role?  Does your plan meet the requirements of your standards? How does the plan measure up to general industry best practices?  Step 4 – Test for Action Would employees be able to use the plan in the case of a security breach? Where might a breach be discovered, and who would discover it? Would that person or group know what to do? Does the plan define who they would contact and how long it would take to mitigate the breach and fully resolve the situation? If you’ve taken a look at these steps and are still unsure whether they would be effective, Centrend can help you with a professional external audit. Give us a call or submit our contact form for a free Q&A session to discuss your organization’s readiness for handling a cyber attack.

Review Your Cyber Security Plan in Four Simple Steps Read More »

Don’t Get Caught by a “Phisherman!”

https://youtu.be/FtdD_mQsTRg Technology Tips by Centrend Podcast: Episode 2 “Phishing” is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for. Welcome to Email Phishing Anatomy 101! You cannot assume that an email you receive actually came from the sender it claims to be from. Phishers are very crafty and will do everything they can to appear familiar so that you will follow their call to action. The infographic below illustrates a very clever phishing email. “Keep Same Password” Now, what would happen if the recipient actually clicks the button? Now, what would happen if you clicked the button? You would be taken to a website that looks like an Outlook Web Access Portal and asked to do the following things: They tell you to confirm your current login name and password to “renew” it. Upon submitting your name and password, you are taken to a screen that asks for previously used passwords for verification purposes. This process is open-ended. The more time you spend time submitting passwords, the more data they collect to hack into other systems at your organization. You can do several things in your business to reduce the amount of these types of emails that actually make it through. Use a strong commercial-grade firewall with deep packet inspection. If you’re suspicious, don’t click the link. Instead, log in by going directly to the website yourself. Have strong endpoint security software on your workstations, so if you do click a link, you will get a warning like Centrend’s managed service clients get (see grap[hic at right) Centrend works hard to protect our customers from phishing by blocking many of these types of threats from ever entering your network or email folder, to begin with. Everyone gets fooled, especially if you are in a hurry. For times like this, we make sure there is local workstation security to safely check suspicious links. For example, clicking on the email below in one of our managed services environments will give the email recipient a second chance to reconsider by showing the following message: If you want to keep the phisherman from trolling your computer’s waters, give us a call or drop us a line.

Don’t Get Caught by a “Phisherman!” Read More »

Is My Internet Service Provider’s Firewall Strong Enough?

When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP’s firewall sufficient? Let’s start with a simple description of what a firewall is and how it protects your network from intruders. The role of a firewall is to determine what data can come in, and what data will not be allowed. The pieces of data that arrive at your firewall are called packets. For a basic firewall, the rule is simple:  If somebody requested the packet, it is allowed into the network. If the packet was not requested, the firewall burns the packet. The graphic below shows a typical small business network. BASIC FIREWALL – LIKE FROM YOUR ISP When a packet approaches the firewall, It is analyzed to see if it should be let in. A basic firewall is only going to ask one question before deciding to let the packet of information into the network: Was the packet requested by someone inside the firewall? COMMERCIAL-GRADE FIREWALL When a packet approaches a commercial-grade firewall, it is scrutinized much more carefully and in BOTH directions – IN and OUT, When it decides to let the packet pass through, the decision is logged in a database. The activity log proves invaluable in chasing down and isolating data breaches. Here are some of the things a business-class firewall considers before letting a packet pass: Was the password Requested? Is the packet SAFE to let in or does the packet contain a virus, malware, or other malicious code? Is the destination internet address listed on any “blacklists” due to bad activity coming from there? Is traffic from the country of origin allowed? Does the corporate policy for content filtering allow access to the material that is on the destination website? The chart below shows examples of the types of traffic that are allowed or blocked by the different firewall options. The commercial-grade firewall is not only a strong defense against unsolicited traffic, but it also gives business control over what content is allowed on their network. Business-class firewalls are surprisingly affordable. If you would like help evaluating whether it’s right for your home or business, please give us or fill out the contact form below.

Is My Internet Service Provider’s Firewall Strong Enough? Read More »

Six Ways Scammers are taking advantage of COVID-19

Cyber Criminals are taking advantage of the COVID-19 pandemic in some of the worse ways. Read on to learn how to avoid their evil scams… 1. Phishing: Phishing (pronounced fishing) occurs when criminals send fake mail, email, or phone calls pretending they are legit. They try to convince you to share your sensitive information like passwords or credit card details. They pretend they are from an organization you know, such as FedEx, UPS, or even a government agency. 2. Fake Products: Keep your eye on e-commerce websites, social media accounts, and emails from people and stores claiming to sell medical supplies currently in high demand. Supplies might include things like hand sanitizer, toilet paper, and surgical masks. When you make purchases from these fake stores, criminals will keep your money, but you will never see the products you purchased. 3. Fake Charity: Individuals and companies, sometimes with real-sounding names, call or email to ask for donations for people and groups affected by the coronavirus. Some of their elaborate backstories sound extremely legitimate and emotional but completely fake. 4. Medical scams: People are getting calls and emails from people pretending to be hospital workers or medical professionals claiming they treated someone they know for the coronavirus and demand payment. 5. Malware. Think of these malicious applications as Trojan Horses. You download them to your computer or phone for some purpose, and behind the scenes, the program is stealing your personal information. Sometimes these record your logins to banking sites, email, Facebook, etc., and send the data back to the hackers. 6. Zoom Bombing. Lots of businesses, schools, and individuals are using Zoom to hold online meetings. To make it easier, meeting hosts often don’t require a password. Unfortunately, not having a password makes it all too easy for hackers to jump on your meeting and flood your virtual room with swear and porn. They can embed virus code in the image files or stealthily share a file with all the participants that have virus or malware code in it. Check our blog next week for details on how to keep hackers out of your Zoom meetings. The number one way to protect yourself from cybercrime is to use strong passwords on your computer, phone, and meetings and make sure your computer is tuned up and secure. If you ever feel concerned that your computer system is hacked or you just want a security checkup, please contact us at 774-241-8600 or submit the quick contact form on this page. We’re always here to help!

Six Ways Scammers are taking advantage of COVID-19 Read More »

How do you know if you have Spyware in your computer?

Sometimes, it’s obvious, right?  There is a big obnoxious warning that pops up and tells you that you are infected and you need to call for support! Don’t call the number presented because that’s a scam. Call us instead!  Other times, the infection is much more subtle. Here are some things to watch out for… Signs that your computer is infected with a virus or malware Random pop-ups – if you are using your computer, especially the web browser and you are getting a lot of pop-up messages without clicking If you click a link in a web search but get an unexpected, less relevant result If in the bottom right, you are bombarded with notifications and solicitations If your browser has extra “toolbars” across the top or bottom that weren’t always there, or that you don’t see on other computers If you suddenly can’t open documents on your computer that you have always been able to open You are prompted for a password at a strange time. Such as when you are just working on a Word document or browsing a website that doesn’t require login Your virus scanning software is no longer running – malware or a virus may have shut it down If you have any of these problems, please call us for help! If you aren’t sure if you are infected, we are glad to offer a free consultation. Just fill out the Quick Contact form or call us at 774-241-8600.

How do you know if you have Spyware in your computer? Read More »

Working Remotely? Are you secure?

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.  Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers. Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.   Here are some of the things I see happening that create the riskiest scenarios: VPN Connections are being set up quickly by inexperienced personnel, and their encryption policies are weak.  Companies lack the knowledge to accurately monitor remote activity to identify and mitigate a data breach that originates from these new remote channels. When a VPN is not available, very insecure connections are being created to remote desktop servers, or directly to desktops. Remote desktop connections that are open to the outside world are vulnerable to all types of hacking. If systems have not been regularly patched and maintained, they are at risk of known vulnerabilities that hackers will exploit. Employees may be using their own computers to log in from home, and the individual’s computers lack adequate security protection.  The lack of sufficient security on the home computers allows an attack from the inside – through the VPN. An attack launched from within the trusted, secure tunnel is tough to identify and close the door on. Entry-level or free versions of software like Team Viewer, Logmein, or GoToMyPC are being used to provide remote control over office desktops. The limited versions of these software packages generally work well but offer limited or NO AUDITING capability. If your system is compromised, you will not know what the thieves stole or how long they had access to your business data. Centrend wants to help.  We are now offering free consultation AND free implementation of remote access solutions to businesses affected by COVID-19. Reach us at 508-347-9550 or submit the Quick Contact form below to get help.

Working Remotely? Are you secure? Read More »

7 Reasons Why You Should Replace Traditional Keys with card keys.

Card keys are fast replacing traditional keys in small businesses. Here are 7 reasons why it might make sense for your small business! Regular keys are bulky, clunky, and slowly going away. Have you been car shopping lately? You will be hard-pressed to find a new automobile that has a traditional door lock or ignition system. Instead, you will unlock the doors with the press of a button on a “fob.” Once in the car, you’ll press a button on the dash to start the vehicle. The card key technology, once reserved only for high-security facilities and fancy hotels, has become much more affordable for small businesses to adopt.  Besides looking professional and high-tech, there are some practical business reasons why card key technology is a great option. If a key gets lost, it’s no big deal.Think of the security concerns that arise when a key is lost or stolen. What expenses might be incurred to change the locks, etc.? With a card access control system, your company can deny access to the card with a couple of clicks of the mouse. The employee that lost their key is assigned a new card key, and no security risk has been incurred. Internal doors can be protected.Access control systems are well suited to protecting secure internal locations such as executive offices or Human Resources file rooms. For example, the janitor and the president can enter the building with their card, but only the president’s key card will open his private office. You’ll Have a History of Building Access.Whenever an employee scans their card, the system records their name, the current date and time, and the door location. If you have internal doors that are secured with key cards, their movement into these secure locations will also be documented. Optionally you can require card key scans to leave the building.It’s possible to require employees to scan when leaving the building. This helps complete the trail of an employee’s movement in, around, and ultimately out of the building. You could pull up a list of anyone that is currently in the building, or anyone that was accessing a particular area at a  specific date and time.  Automation options are nearly endless.A commonly assigned automation is to have the system unlock the doors during business hours, and then lock up automatically at closing time. Electronic access control systems have capabilities far beyond this, however. You can do things like adjusting the room temperature, turning on and off the lights, or triggering a video camera system to start recording activity. Systems are easy to administer.Whether using traditional keys or card keys, you will need to keep track of who has what key and what doors the various keys open. You will have to have a locksmith service provider rekey the locks anytime you have a breach such as a lost key, to keep the facility secure. Electronic access control systems make it infinitely easier to administer. You might use groups to assign access to outside doors and limit entry to only certain times of the day. Simple backups protect your cards and their owners.Centrend’s role in these systems includes installing the software on your computer or server and then making sure that the entire system is backed up. If there is a computer crash, we can have your access control system back up and running in less than 30 minutes. While the computer is “down,” the locks will continue to function correctly. You would be unable to make changes until the computer application is restored. Centrend, Inc. works closely with an excellent resource for installing access control systems. Please contact me if you need help determining if a card key system is right for you. We can help you plan the system and connect you with a local professional to perform the installation.

7 Reasons Why You Should Replace Traditional Keys with card keys. Read More »

Should my office be Wi-Fi only?

WiFi has come a long way in terms of speed and reliability. But there is still nothing like those irritating wires that are much faster and more reliable than interference-prone WiFi. Here are some guidelines for when you can go WiFi only and why you might not want to ditch all the wires just yet. This is a simple decision, and if you “Google” the topic, you will find lots of detailed, complicated articles arguing in one direction or the other. It comes down to this: the only place for WiFi is when you need portability and mobility. If your office has a lot of workers moving around and working in different areas of your space, it could make sense to let them be WiFi only. Otherwise, hard wire them and you will have a faster, simpler, and much more reliable network. You have to consider the physical capabilities of your computers and laptops. Are they capable of WiFi? Desktops sold today won’t include WiFi connectivity without specifically adding that capability. Many modern ultra-portable laptops, such as my Microsoft Surface Pro 6, have WiFi but don’t even have an ethernet port. If you order new equipment, make sure you know if it needs to have WiFi based on how and where it will be used. Need help to decide? Give us a call, and we’ll talk it through with you.

Should my office be Wi-Fi only? Read More »

Should you back up your cloud data?

So you’ve put your data in the cloud. Should you back it up? The short answer is Yes!  This article explains why I think it’s essential.  We put data in the cloud for different reasons. Sometimes it is the primary access point for our data, and it’s in the cloud for easy access from anywhere in the world. Or we might put the data in the cloud because, with today’s high standards for cloud security, it’s the safest place to manage confidential data. The cloud might be used as a backup of data that resides on our local computers or file servers. Your reasons for putting data in the cloud may vary, but here are the top reasons you should be backing it up yourself:  While the provider may have features that let you restore or roll back files and folders to a previous point, these processes can take a long time, and the copies of files may not go back as far as you need them to. Consider a file that is accessed quarterly, and you don’t notice that in setting up the file for the next quarter, you accidentally overwrote last quarter’s good data.  If your cloud provider only keeps copies for 30 days, your last quarter’s data is lost! A backup is only as good as the last test proves it to be. Many folks don’t find out their backup system doesn’t work until they need to restore something. By then it’s too late. Cloud providers may not be clear about what is backed up, how often, or how long and cumbersome it can be to restore the data when you need to. If your cloud provider experiences a failure, your data will be inaccessible. While it’s unlikely to be a permanent, catastrophic failure, the provider may be down for a long time. What will it cost you or your business to lose access to the data for a couple of days or more? With your local copy, you can restore the file quickly. If your Internet Connection fails for an extended period, you will want to restore your backup locally to get back up and running. You’ll be glad you had a local copy to fall back on!   Cloud data is not impervious to crypto-locker-type viruses. Especially true when you have a drive mapped to the data source. If a folder or group of files is encrypted and this compromise goes undetected for some time, your only recourse will be to restore a local backup. Having a local backup is inexpensive insurance and makes good sense. The ability to restore a backup locally provides your business with a great contingency plan to keep you up and running should the cloud provider go down for any reason.

Should you back up your cloud data? Read More »

How to Keep Passwords Safe in Email

No doubt, the most secure way to give someone a password or other confidential information is in person or over a private phone call. There are times, however, when you want to send a password or a bank account number via email simply because of the convenience. This article explores how to send secure information safely. Most people find email encryption software to be expensive and complicated to work with. Ephemeral messaging may be the answer. When something is ephemeral, it is considered “temporary” or “only lasting a short time.” A great early example of ephemeral messaging is from the James Bond movies. James Bond would often receive a tape about his secret mission. Upon hearing the message, the final thing it would warn 007 is that the message will self-destruct. SnapChat is a very commonly used application that is a modern example of ephemeral messaging. SnapChat lets users of its phone application send pictures or text that disappear either after a short time or after being viewed. While it’s popular among teenagers and some adults, it’s not practical for business use. The solution I recommend for business is called Shush.  It’s an online service provided free by Articulate, makers of e-learning course authoring tools. You can try Shush out for yourself at this link: https://shush.articulate.com/. You will be pleasantly surprised to find that the service is completely anonymous and does not require a login for either the sender or receiver! You go to the site and enter (or copy/paste) the information you want to encrypt into the presented window: After you enter the content, you then choose how long you want the message to live. You obtain the link by clicking the share button.  Click the Copy button and paste the link into an email message to send to your contact. Once the duration expires, the link will no longer work, and your message can no longer be retrieved. Depending on the duration you set, the message will be viewable to anyone that has the link. The default and most secure solution is “When it’s first viewed.” Upon the first view is an excellent choice for messages that you know will be read promptly as they only last for a maximum of 12 hours. Messages sent this way can only be viewed one time, and then they are gone forever. Messages that are set for a specific duration such as a day or a week can be seen again and again by anyone with the link. Thank you for reading. This blog post will now self-destruct!

How to Keep Passwords Safe in Email Read More »

Scroll to Top