When it comes to data breaches, in particular, cybercrime is at an all-time high. According to the statistics, over 21% of all files are not protected in any way. Also, 41% of organizations have over 1,000 unprotected and sensitive files such as credit card numbers, health records, SSNs, etc. What's more, 7 out of 10 organizations have said that their security risk has increased significantly since 2017, with ransomware growing by as much as 350% annually, and IoT-oriented attacks by 600%.

The healthcare industry has seen the most significant number of ransomware attacks, which are believed to quadruple by 2020. The financial service industry, on the other hand, suffers the highest costs related to cybercrime, with an average of $18.3 million in losses per company.

Based on all of these figures presented here, plus many others like them that exist, it would only stand to reason that businesses should invest as much as they can in their security. Training staff members to recognize and avoid security threats is one of the most effective ways of achieving a desired level of protection. It is for this reason why we've compiled a list of five tools and resources to help you prepare for the road ahead.

Udemy

Udemy is a training portal designed to help organizations and individuals learn about cybersecurity. It provides classes on several other fields such as development, design, marketing, etc., but also in terms of IT security. Many courses are free, while others cost somewhere around $15.

Cybrary

Another resource in terms of cybersecurity training is Cybrary. As a freemium service, Cybrary provides numerous classes for employees and job seekers, particularly CISSP, CCNA, CompTIA A+, and CompTIA Security+, among other such entry-level security certifications. There are also paid courses to be had on the platform, providing further knowledge in the field of cybersecurity. Also, Cybrary offers per-seat basis enterprise subscriptions, making it more cost-effective for organizations with hundreds of employees to learn junior-level cybersecurity roles.

BrightTALK Webinar Stream

With BrightTALK’s comprehensive stream of cybersecurity webinars, you will have access to thousands of IT security related videos. These are continually updated and are particularly useful for professionals looking to further their cybersecurity careers. BrightTALK also provides options for non-English speakers.

Information Assurance Support Environment (IASE)

IASE is a web portal, part of the US Department of Defense. It offers over 30 free online cyber security courses, mostly in the form of web-based training. And even though the portal focuses on the Department of Defense users, the topics can still be used as generalized cybersecurity training for both beginners and professionals.

Security Now Podcast

Security Now is a weekly podcast available in both video and audio formats. The podcast is hosted by Steve Gibson and Leo Laporte, the TWiT Netcast Network founder and who also invented the first anti-spyware program. The show runs for about two hours and focuses on helping the audience increase their personal security with topics such as firewalls, password security, and VPNs.

Takeaway

These resources will hopefully help you increase your organizational security and help your staff members become more knowledgeable about the issue. For more information, contact us directly.

is-your-network-fast

As the internet is becoming a dominating force around the world and computer networks are growing in size and complexity, data integrity is also an ever-growing concern that organizations need to consider. Network security is a critical aspect for businesses, no matter the size.

And while no network is entirely immune to cyber-attacks, a stable and efficient security system is critical in protecting client data. It is especially true for organizations operating in the healthcare and financial sectors but also applies to other industries as well. Good network security will help protect businesses from data theft, sabotage, ransomware, spyware, malware, etc.

So, how can you tell if your network is secure and what can you do to improve the situation?

Cybersecurity Training

Arguably, one of the most vulnerable parts of any network is the users that operate on it - namely you and your employees. The overwhelming number of cyber-attacks that manage to pass through the nets do not involve any fancy coding but are the result of successful phishing.

Phishing is nothing more than the fraudulent attempt by hackers to obtain sensitive information (passwords, usernames, financial or medical information, etc.) by posing as credible and trustworthy entities via electronic forms of communication. These can take the form of official-looking emails, pop-ups, text messages, lookalike websites, etc.

The best way to counteract this problem is via a comprehensive training program that educates staff members on how to recognize and avoid these phishing tactics, in the first place. Also keep in mind that a whopping 41% of such attacks originate from third-parties such as contractors, vendors, suppliers, etc.

Passwords

The importance of passwords in network security cannot be overstated. Nevertheless, many users see them as a nuisance and regularly use the same password across different systems. Not only that, but the same password is sometimes used for personal use. It further increases the risk of it being discovered, rendering your security protocols useless.

It means that, if hackers manage to get their hands on one password, your whole network may be compromised. Always keep different usernames and passwords for laptops and servers, as well.

The Updates Arms Race 

An antivirus will help protect your data from being infected once a virus or malicious software has made it into your network. Firewalls, on the other hand, will keep these from entering, in the first place. Always keep these systems and your servers updated as hackers will always upgrade their malware to bypass protective software.

Scripting Your Login Process

One measure of detecting the onset of a network infection is by keeping track of when users log in or off their work accounts. Unfortunately, this is only a somewhat reliable procedure. A better one is to script in your login process. The idea behind this procedure is the same, but it's much more efficient.

The Default Remote Desktop Protocol (RDP) Port

If you are using Windows, the chances are that you're also using the default Remote Desktop Protocol port. Cybercriminals will take advantage of this and will employ a multitude of tools to hack their way and scan for exposed endpoints. The easiest solution here is to change that RDP port to something unused.

Conclusion

Having a secure network may seem like a daunting challenge, but it is necessary to keep your business and your data safe from cybercriminals. These steps presented here will help you minimize that risk. If you need any help, however, Managed Solution is at your service. Contact us to find out how we can assist you.

With more unpredictable and extreme weather events as a direct result of climate change; the need for a comprehensive disaster recovery plan (DRP) cannot be overstated. Be it earthquakes, flash floods, tornado outbreaks, hurricanes, arctic blasts, severe droughts, or widespread wildfires; they can all lead to days-long power blackouts, blocks in the supply chain, significant infrastructure repairs, and months-long insurance battles.

Specially created to minimize damages in case of such unpredictable scenarios, disaster recovery plans will help ensure the long-term operability of a business. Such disasters are not a common occurrence, but when they do happen, corporations, big and small, can and will fall by the wayside. One in four companies struck by a natural disaster will never reopen its doors - and the main reason being that they don't have a comprehensive DRP put in place.

And like a seasoned wilderness trekker who's always prepared for things to turn south at a moment's notice, so should you have a contingency plan put in place for the unexpected. Below is a comprehensive checklist of a disaster recovery plan.

Risk Assessment

The first step is to assess and identify and assess all possible threats as well as their likelihood of impacting your business. You can do this by using a risk matrix. It allows you to classify your risk factors and establish priorities. Once you've analyzed the potential risks, it's time to create a business impact analysis (BIA). It helps you predict the consequences of disruption and gathers data needed to develop various recovery strategies.

Inventory

Your DRP should include a complete list of all hardware, software, IT infrastructure, and all other assets. Your disaster recovery plan needs to identify how you will reproduce your inventory after a disaster, as well as ensure a smaller list of mission-critical equipment. Every piece of hardware and software needs to have the vendor's technical support contact information so that you can get back up running quickly.

Assign Responsibilities

In case of emergencies, decisions need to be made on the spot, so your DRP needs to spell out who is in charge of what as well as how they should approach the issues. So, you will need to know who will manage the relocation, who will monitor sales and cash flow, who is in charge of secure systems and grants authorization to others, etc. You need to identify all the tasks in every department that will restore your operations as soon as possible and assign someone to them.

Data Recovery

Data is generally a company's most valuable asset. That said, it's also the most vulnerable to disasters and is a major component that will affect an organization's downtime. It's for this reason why you need to have a reliable data backup solution that will safeguard that information in the event of a disaster.

The Backup Office

Having a backup brick and mortar office available on-hand is not always an option and, in some cases, it's unnecessary. Nevertheless, you need to analyze what options are available to you if your office will not be usable. In some cases, employees could work remotely, or you could make use of a virtual office. But if these are not viable options for you, like for instance, if you have a medical practice, you need to have an up-to-date checklist of available real estate that you can relocate to immediately.

Communications

In the event of a natural disaster, common communication methods such as phones, emails, etc., may be unavailable. You need to figure out how your staff members can communicate with each other in this scenario, as well as to know who is in charge of what responsibilities.

Testing and Improving 

Having a disaster recovery plan is one thing, but making sure that it works as it should, is another. It is why you should regularly test it out and improve on the parts that don't work as they should.

If you are unsure where to begin with your DPR, Managed Solution is here to help. You can call us today 800-208-3617 to talk through your current plan, or you can fill out our FREE, no-obligation assessment of your current backup solution.

backup-and-disaster-relief-faq

No company owner is looking forward to a business disaster, but these do happen now and again. What's more, they come in various shapes and sizes, and it's not always easy to anticipate them. For this reason alone is why company owners need to be prepared and take the necessary steps so they can give themselves the chance to rebound as fast as possible.

However, companies need to have a business continuity plan. Statistics indicate that over 25% of businesses that are forced to close down because of a disaster, never reopen. Given this number, one would be forgiven for thinking that most companies would have a plan B put in place.

But the sad reality of the matter is that the majority don't.

The most common excuse given is that people don't think that a big enough disaster would ever happen to them so that they'll be forced to close down, in the first place.

Other excuses and misconceptions owners have about business continuity plans include things like the idea that such plans waste too much time and money to formulate. Others believe that their business has no inherent risks, their company is too small to need a plan, or that they can deal with the problem when it happens. There are also some that think a data backup is the same as a business continuity plan, or that their Internet technology could withstand anything that can be thrown at it.

What Is the Purpose of a Business Continuity Plan?

Such a plan will outline all the necessary steps a company needs to take to operate in the event of a disaster, security breach, an abrupt change in the market, or any other such scenarios that will disrupt the day-to-day processes.

When a comprehensive plan is in place, business leaders will have the opportunity to review any weaknesses or potential threats that their organization is facing. As a consequence, even the process of creating such a plan has its benefits as it can highlight any current risks which you can fix before they turn into a crisis.

Putting together a business continuity plan often involves the assessment of staff and leadership members, available resources, as well as the strategies that the company employs. These, in turn, will help you in dealing with issues such as employee development, labor disputes, patent lawsuits, real estate selection, distribution bottlenecks, or intellectual property security, among others.

What Most Successful Business Continuity Plans Contain?

The more comprehensive plans go beyond disaster recovery and also focus on any risks that may emerge from within the organization, itself. So, for instance, if a company decides to use cloud computing as a means of safeguarding their data from natural disasters, they should also consider what to do if someone from the inside, say, a disgruntled employee, would leak sensitive information. It is a particularly important aspect, especially for those in healthcare or financial industries where data privacy is of the utmost importance.

Successful continuity plans regularly make use of outsourced services regarding technology, space, and workforce in the event of a natural disaster or internal process failure. Outside experts can be a great and cost-effective resource in a crisis by ensuring continuity based on sound strategy.

To that end, Managed Solution is at your service by helping you assess your current situation and help safeguard your business in the future.

backup-and-disaster-relief-faq

Being compliant with all the industry rules and regulations will help your financial or healthcare organization stay on top of the situation and reduce the risk of sales losses, legal fees, and fines, brand reputation and more. It is for this reason why compliance management should be a top priority for all IT executives.

It will grant better internal control, allowing you to determine which employees will have access to company data and what they can do with it. Similarly, it will tell them who they can share that data with internally or externally.

Also, by maintaining compliance, you will also be taking the necessary security measures to protect yourself, your organization, and your clients from security breaches. But when it comes to the healthcare and finance industries, and being compliant with all the rules and regulations, it can be somewhat of a daunting challenge.

Things like the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act, the Payment Card Industry Data Security Standard (PCI DSS), as well as the General Data Protection Regulation (GDPR), and the future California Consumer Privacy Act (CCPA), just to name several, organizations need some best practices to keep them in line with everything. Here are several examples.

Involve Colleagues and Employees in the Process

Any compliance program, regardless of its thoroughness, will not be effective unless staff members are fully aware of the regulations and the impact they have on your organization. You should make it a company-wide effort to identify any gaps within the program as well as how they should be addressed.

Auditing and Monitoring

To have a successful compliance program, you need to perform internal monitoring and verification regularly. These are essential in identifying and correcting any errors that may exist or will occur. An audit may be performed once per year to look at the overall effectiveness of your compliance program. Monitoring the program, on the other hand, should be performed more frequently, such as weekly or monthly to confirm that everything is working as it should.

Automating Key Tasks and Processes

Wherever possible, tasks and processes need to be automated. Automation is a driving force across all industries as IT teams are striving to bring more agility, quality, and speed to, otherwise, manual tasks. When it comes to regulation compliance, automation will be able to accelerate this delivery significantly.

Microsoft Connected Health Platform (CHP)

The Microsoft Connected Health Platform (CHP) is a tool that provides a host of best practices and guidelines for organizations in the healthcare industry to provide many efficient, flexible, scalable and secure e-health solutions for patient engagement. Based on the principles of the Connected Health Framework (CHF), Microsoft CHP will provide many offerings for optimizing health information and communication technology.

It includes deployment guidance, prescriptive architecture, design, as well as solution accelerators. Tailored specifically for the health environment and Microsoft infrastructure models and tools, the CHP will be able to deliver and manage on-premises or cloud solutions, as part of your compliance management program.

Takeaway

Complying with all the rules and regulations is not something that should be taken lightly. Nevertheless, it's not something that cannot be achieved. Together with Managed Solution, you can make it happen.

Our Shadow IT Assessment allows you to uncover applications and tools installed on your network, and ultimately allows you to discover which of these were intentional versus accidental and authorized versus unauthorized. Our tools allow us to determine if these tools and applications are compliant and take the right next steps based on our findings. Learn more about our assessment.

When it comes to their security, organizations do not always give it the full necessary consideration. And when they do, it’s usually after their security system has already been breached leading to more problems, lost business, and numerous other issues down the line. Security breaches can sometimes happen because an employee forgot to adhere to the company's policies or even because the company forgot to set the right policies, in the first place.

It's details like these and many others that can put an organization at risk. It is for this reason why a security risk assessment is necessary. Many are under the impression that such a procedure is overkill. But with today's many technological advancements, there is no such thing as being too safe, particularly when it comes to the digital environment.

All experts agree that with Artificial Intelligence (AI) and Machine Learning (ML) cyber security solutions, also come advanced cyber criminals. It is an arms race that makes it all that much more difficult to detect, track, or mitigate breaches and hacks whenever they happen. While these technologies can help streamline processes and increase security, they can also raise the threat of cybercrime.

Some industries, like those in healthcare, have a legal obligation to perform such assessments Health Insurance Portability and Accountability Act (HIPAA). Besides, there are also other PCI-DSS requirements and federal requirements that certain businesses need to endure.

How Does a Security Risk Assessment Work?

Such an evaluation should be a central component of every company's security plan. A security risk assessment could identify potential threats and vulnerabilities in your system, predict the impact of these threats, as well as provide you with threat recovery options if they were to happen.

Financial and healthcare organizations need to take extra precautions, as they are generally in charge of safeguarding their customers' sensitive information. But besides helping keep this data safe, security risk assessments also have some added benefits.

 

Improves Communications - A security risk assessment will help improve the way an organization communicates internally. The main reason for this is that numerous stakeholders, departments, and employees will need to come together and provide their input to improve the effectiveness of the overall evaluation. By extension, this will increase organizational visibility and improve communication.

Better Awareness - A significant benefit of a security risk assessment is that it can help educate your employees about the threats they can encounter and which can impact their role. It will help teach them about the importance of cybersecurity as well as how to incorporate some best practices in their day-to-day operations. It's important to remember that among the most prominent security vulnerabilities of any system is the end-users that utilize it daily.

Reduce Long-Term Costs and Mitigate Future Risks - Identifying future threats and risks will not only spare your company from the hassle of having to deal with them in the future but they will also save money and resources. By mitigating these threats, your company will be better prepared for the worst or even prevent them from happening in the first place.

The IT department is the one responsible for undertaking this task since they are the one with the knowledge and know-how on how to deliver it. Organizations that do not have an in-house IT team should consider outsourcing it to someone who can provide the service.

Do, however, keep in mind that a security risk assessment shouldn't be a one-time thing. As cybercrime is continually evolving, organizations need to make sure that their risk assessment is up-to-date on all developments and that it maintains compliance with all regulations. If you need any help with your security risk assessment, Managed Solution is at your service. Contact us today for more information!

When it comes to all things cyber, this past year was an interesting one for cybersecurity trends. From a security perspective, there were many security breaches, with the most recent one being the data breach of the Marriott Hotel group. Some of the major themes were also the blurring of lines between cyber and physical security, industry consolidation, and new AI cybersecurity tools. Public and regulatory awareness of data privacy as a critical concern and issue was raised due to seemingly unceasing scandals related to consumer privacy.

Cybersecurity experts will continue to address these topics, and some trends will dominate the cybersecurity sector in 2019.

Cybersecurity and Physical Security Will Continue to Merge

In the world of IoT (Internet of Things), everything is connected. With so many connected devices, the division between cyber and physical security is getting more and more blurred, as well as between the CEOs, CIOs, and CTOs. Concerning sophistication, physical security is a lot behind cybersecurity. However, organizations are working to unite the two together. The range of threats across both areas is becoming more extensive, so we should expect more crossover to happen during 2019.

Increased Implementation of AI

The human element can detect and react to a cyber breach, but not as fast as a machine could. With the growing range and number of threats, it’s clear that leveraging the power of AI is necessary. Some major companies have announced their AI-based security solutions in 2018, such as Alphabet’s Chronicle and Palo Alto Networks’ Magnifier. The AI-based security analytics that enterprises have deployed since 2017 aren’t pure-play solutions. What AI adds to these existing technologies is analytical strength. All in all, AI will continue to grow in the cybersecurity segment as it will in general (at the corporate level).

More Challenging Breaches

When the defense gets better and stronger, cybercriminals keep finding new and more devious ways to use malicious code. For example, experts discovered another variant of ransomware that turns victims into attackers. By offering a pyramid scheme-style discount, the victim passes on the malware link to two or more people. When they install it and pay, the first victim has their files decrypted for free.

Increase in Regionalization

There will be more cybersecurity regionalization, and Brexit prompts that increase. Today, foreign governments are suspicious of each other’s cybersecurity solutions, especially after recent scandals of China’s HTC and Huawei, and Russia’s Kaspersky Lab. That’s why we might expect more regional cybersecurity solutions and companies appear around the globe. In the U.S., there are clusters of security firm activity that focus on building robust cybersecurity innovation centers.

Biometric Identification

Passwords are a vulnerability, which is an issue that cybersecurity innovators are aiming to replace with biometrics. The iPhone X has Face ID for facial recognition, while MasterCard announced that all their users would be able to identify themselves with biometrics by April 2019.

More Consolidation

There has been a lot of consolidation within the cybersecurity industry. Splunk acquired Phantom Cyber, AT&T bought AlienVault, and BlackBerry bought Cylance. According to ESG research, about 53% of companies with more than 1,000 employees “currently have three or more different endpoint security products deployed across its network.” As this leaves a lot of waste, the number of solution providers will decrease in the following year as large companies will continue to add startup tech to their portfolios to create a broader product family offering.

Digital transformation and innovative solutions in the cybersecurity industry is helping organizations in keeping their networks safe. However, cybercriminals are getting smarter and more dangerous. That’s why every enterprise needs to stay on top of the current trends and know the future predictions regarding cybersecurity. They should understand how digital transformation remakes their business, as well as what threats are introduced by new platforms, technologies, and partners to gain more control and be able to detect and respond to threats fasters.

Reach out to Managed Solution to find out how we can help you improve your IT security and prevent a data breach.

 

The purpose of the California Consumer Privacy Act of 2018 is to force changes onto enterprises that deal in personal data. The Act was passed by the California state legislature and was signed by its governor in June 2018. The bill grants consumers the right to request a business to disclose specific pieces and categories of personal information that they collect about them, the types of information sources, and the business purposes for collecting or selling the information. The bill becomes active on January 1st, 2020.

States and countries are taking consumer rights and personal data privacy more seriously.

Who is Liable for Compliance with the Consumer Privacy Act of 2018?

If your business meets these thresholds, then it is liable for compliance:

  • Annually receives for business’ commercial purposes, buys, shares or sells for commercial purposes, in combination or alone, the personal information of 50,000 consumers, devices, or households.
  • Derives 50% or more of its annual revenues from selling personal information of their consumers.
  • Has annual gross revenues larger than $25 million.

Here are some details of the Consumer Privacy Act of 2018, both from the business and consumer standpoint.

The Business Standpoint

  • The Consumer Privacy Act applies to any business that collects consumer’s personal information. It includes both large corporations (with brick-and-mortar and online stores) and smaller companies that meet the above thresholds. Even if a business doesn’t fit the monetary limit (i.e., small business with a modestly popular app or website), the Act may be applied.
  • For a business to comply with this new legislation, it will need to implement new infrastructure to handle their consumer request. Also, it will need to alter their website to comply with the bill. It will increase the cost of doing business for some companies.
  • Can a business charge differently based on consumers choosing to exercise their rights? There’s some confusion about that. A part of the bill says that businesses cannot charge different prices if a consumer exercised their right, but nothing seems to prevent a company from doing that. We’ll have to wait to see what will unfold over time.
  • An enterprise can offer consumers an incentive for collecting, selling and deleting personal information. To achieve this, consumers would have to provide their consent (which they can revoke at any time.)

The Consumer’s Standpoint

  • A consumer has the Right of Access – they can request a business that collects personal information to disclose the specific pieces and categories of personal information that the company has collected.
  • Also, a consumer can exercise the Right of Deletion. They can request the business to delete any personal information it has collected.
  • A consumer has the right to know to whom their personal information was sold. Businesses are obligated to release information about how and to whom they disclosed or sold the consumer’s personal information.
  • The consumer gains more control over how their personal information is collected, sold, or used.

Businesses need to be prepared, as the California Consumer Privacy Act of 2018 is coming into compliance in about a year. The majority of companies will be affected by these changes in conducting business in California (and other states will inevitably follow.) Businesses can’t afford to delay their response both to the GDPR and the 2018 Consumer Privacy Act.

Contact Managed Solutions to get help in preparing for the California Consumer Privacy Act of 2018 compliance.

Contact us Today!

Chat with an expert about your business’s technology needs.