No one likes hacked accounts. Am I right? A hacked account can result in financial loss, identity theft, or just a whole lot of wasted time. None of which is fun. But unfortunately, you don’t have too much control over what is or is not hacked when it comes to third party data breaches. All you have control over is the aftermath. So, if you happen to find yourself on the receiving end of a data breach, here is what you should remember.
managed network services
On April 29th, one of the largest fuel pipelines in the U.S, Colonial Pipeline Co. was hacked, which led to major shortages in fuel across the East Coast. New information came out this weekend regarding what may have led to the weak spot in Colonial Pipelines system resulting in the attack on their network. Apparently, an old account was not decommissioned correctly and still had access to the network by virtual private network (VPN).
Contribution by Nathan Hock, vCIO with Usherwood Technology
IT equipment is complicated topic for most. For this reason, we worked with our skilled team to provide you with answers to the most common questions asked regarding backup and disaster recovery. We hope this knowledge helps to make you feel more confident with your decision making when it comes to making a decision.
When it comes to managed IT, it is important to know that your network is in the right hands. Having a partner that is both reliable and trustworthy to manage your business’s IT can lead to growth and an enhanced workflow and productivity for your business. The riskier side of this is that if your IT is managed by a partner who is not diligent and following best practices, this can have a very negative impact on your business.
When it comes to external threats, there is a lot to know. An external threat is when someone from outside the company uses malicious software or hacking as a way to take advantage of system vulnerabilities. As a managed service provider, we get a lot of questions from our clients on external threats, so we decided to use our experience and knowledge to help educate users on the most common forms of external threats, ransomware and phishing. The first step to combating external threats, is understanding them.
What are insider threats?
Internal threats occur when users, who have authorized access to an organizations internal information, data centers, and computer systems, abuse this privilege. With great intellectual power comes great responsibility. Insiders who misuse their access privileges have the ability to commit fraud, intellectual property theft, data leaks, or release of trade secrets. The misuse or abuse of sensitive data can be a massive risk for companies.
What is the break-fix model?
When you need IT help, there are two basic options to consider, break-fix or managed services. These two options are very different, therefore when choosing which IT service type, you would like to go with, it is important to know what can be expected with each method.
Content contributed by Michael Brown, Senior Solutions Architect; Dan Smith, Director of Engineering Services; Stewart Walts, vCIO; Nathan Hock, vCIO
What is a Network Assessment?
It was me. I am writing from the perspective of an intern who fell for a phishing scam, even though I had gone through copious amounts of cybersecurity training and was not totally unfamiliar with the subject. I will be sharing my thoughts and experiences on the timely issue in the hope that it will help deter you from making the same mistake.