Do you connect remotely to get some work done in the evenings, weekends or when on the road? For many, the answer is yes. Technology has provided us with so many ways to be productive anytime and anywhere.
WELCOME TO OUR BLOG
Modern technology has radically changed how we work and live. Almost everything we take for granted in our daily lives, from the copiers and multi-function printers in our office, to the refrigerators, light bulbs and locks on our doors, are evolving to have broader capabilities using the power of networks to make our lives generally better.
Phishing attacks are designed to exploit the ignorance of end users to get them to perform tasks they wouldn’t otherwise do. It’s the work of con-men.
Here’s one example: a secretary gets an e-mail from her boss – who is traveling – to send him scanned copies of all the W2s the company issued at the end of January. The message appears to come from her manager, including having what looks like his actual e-mail address when she looks at in Outlook.
Imagine a scenario where an office secretary unknowingly gave some of her law firm’s most private data to a gentleman dressed as a Comcast technician. He had bought a Comcast Cable polo shirt off eBay, dressed in khakis with a tool belt, and told the secretary he was there to audit their cable modem specifications and take pictures of the install for quality assurance. Well, that actually happened. It’s not far-fetched.
Routers and firewalls can be confusing. Anybody who wants to have a network with Internet connectivity will typically have at least one in place.
A router like the one you’d purchase at a big-box store is designed to serve the needs of home, not the needs of business. It’s designed to provide basic connectivity and share it with others. They tend to have limited configurations, and for most home users you really don’t need a sophisticated device.
If only it were as simple as going to a website, logging in if necessary, doing whatever business you have on the site, and then clicking the little close button.
Most websites these days have tracking cookies, microdots and other advertising and data-collection bots that sit on them. These little spies are now following you across your browser session and often taking information from you. Sometimes this is for tailor-made advertisements, but it can be also be used to mine other information from you.
Consider the following scenario: A company laptop is left on an airplane, and that laptop has sensitive data for which you are liable. If someone got their hands on that laptop, they could probably gain access to that sensitive information in a variety of ways. Or what if that’s the only copy of the data, and you need it? If it’s not centralized, you might as well consider it lost.
You’ve heard the advice countless times before: you must have antivirus software and a strong firewall.
However, in 2018, there is more to the security “basics” than just having strong technology.
As someone who has worked in the Managed Network Services space for over a decade, there are certain behaviors I notice when it comes to security planning. Every so often, a major security incident occurs that makes headlines, and the media cycle begins. Decision makers at organizations, who are typically business experts and not technology experts, often react with questions about what they are doing to fight this specific threat. Are they doing the right thing? What else could they be doing? How exposed are they?
So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via e-mail because the file is too big. What should you do?
The right thing to do is contact your IT department (us!) so we can assist by installing a secure file-sharing application that your entire organization can use if you don’t already have one.