How to work from the beach in Hawaii

It’s August. You’re on vacation. You need to finish up some details to close a last minute deal. You need to access that critical file because you’re the only that can handle. Or maybe you’re the person responsible for payroll and it just happens to fall on a day in the middle of your vacation. You’re out of luck, right? Not so fast! There are many different ways to remotely, and securely, access business resources outside the office.

Disney Aluni resort beach. Photo: Hawaii.com member Tina W.

The first rule of thumb is to ask your technology services provider what methods are available to you. They should be able to help you implement something that fits your needs, budget, and security concerns, if they haven’t already.

The next rule of thumb is that the ways to get to what you need are as varied as the types of resources you want to get to. It all depends on what you need to get to: files like documents or spreadsheets, or applications like QuickBooks. And each business is going to have different requirements, regulations, budgets, et cetera, that will determine what method or methods can be used. This brings the first rule of thumb back in to play: your technology services provider will know what methods fit your situation best.

To learn more about a simple way to get secure access to your files from anywhere, collaborate with your team, and even share documents securely with people outside your organization, download our free whitepaper: 8 Ways to Boost Employee Productivity.

Enjoy your vacation!

Cybersecurity Tips: The Basics

Growing in sophistication, phishing attempts appear trustworthy, but the goal is simple: steal valuable data. With infectious links spreading through any means— email, instant message, and even social media posts—phishing has become one of the most common security challenges facing businesses and consumers.

Many businesses are hit by these attacks simply because they fail to educate their staff about phishing schemes and other cyber threats. Others don’t use and maintain the right technology and managed IT services to prevent the attack in the first place.

Here are some tips to get started:

  1. None of us are immune. When you think of data breaches, you probably think of Sony, Target, or Anthem, but in reality, SMBs are often targeted by cyber criminals as well. In 2014, about 60 percent of all U.S. cyber attacks were aimed at SMBs, according to the Internet Security Threat Report.
  2. Protect yourself from social engineering and phishing attacks. For the most part, you can do this by using good judgement. For starters, don’t open emails from untrusted sources, and if you see an email that looks like it’s from a contact but seems suspicious, give them a call rather than responding via email.
  3. Set up an intrusion-prevention system and security software on all computers. We recommend a combination of antivirus software, firewalls, and spam filters.
  4. Travelers should take extra precautions to guard themselves from cyber threats and protect devices they take on the road. This includes backing up all files, removing sensitive documents and information from their devices, ensuring passwords are in use and that antivirus software is updated.

Download our full list of Cybersecurity Tips here.

Your data prefers to live in the cloud

You have team members working remotely, staff away at a conference, sales personnel out in the field – how will everyone get access to the most current version of every single file?

Some common misconceptions about data in the cloud:

  • Bring your own device – if employees, or some employees, only need access to company data, then you need to buy them a company computer to maintain control over proprietary data.
  • If an employee leaves I can just change the password for Onedrive, Google Drive, or Dropbox and they no longer have access to company data.
  • If my data is out of the office it is less secure, anyone can access it!
  • Expensive infrastructure is required to remotely access company data, such as a VPN.

How does CBTech Support’s Documents Everywhere solve these challenges?

Cloud file sync

Our proprietary product allows you the freedom to access all of your work documents everywhere you are from any device you use. Your team members will have access to all the data they need to perform their tasks, wherever they are, from any device with internet connectivity. Our Documents Everywhere product gives you the ability to:

  • Decide which employees have access to what data from what device.
  • Remove access to company data from personal devices when access is no longer needed, including remote wiping of company data from any device.
  • Provide access to company accounts instead of personal accounts such as OneDrive, Google Drive, or Dropbox.
  • Secure data using high encryption to protect data from unauthorized access.
  • Achieve this solution with convenient monthly billing.

Call us for more information or download our white paper “8 Ways to Boost Employee Productivity with Documents Everywhere“ here

Ransomware Strikes Again

As you may already know, on Friday May 12th there was a massive ransomware attack that at last count has affected over 150 countries and more than 350,000 computers. It is taking advantage of a security hole in Windows that Microsoft fixed in March.

Make sure your system has the latest updates installed, and that your anti-virus has the latest updates as well. Also, be vigilant when checking your emails as that has been the number one avenue for this attack.

Our clients didn’t need to worry about this attack because our services proactively install updates every weekend. In addition, our multiple security layers would block infections like this before they could do any damage.

Small Businesses at Risk

50% of all small businesses in the US have been hacked. That’s a scary statistic. Even more alarming is that a survey published by Manta in February shows that 87% of small business owners don’t think they’re at risk of a cybersecurity attack.

This information comes from a recent article published on CNBC’s website, which discusses a bill in Congress that would update the Cybersecurity Enhancement Act of 2014 to include small business guidelines for cybersecurity. The article is worth a read: http://www.cnbc.com/2017/04/05/congress-addresses-cyberwar-on-small-business-14-million-hacked.html.

What can business owners like you do to protect themselves?

The most common tools you need to have in order to prevent attacks are firewalls, anti-virus software, spam filters, and data-encryption tools.

The most overlooked step is to keep your software up to date. Take our quiz to see if you’re at risk: http://bit.ly/2pFA1Ak.

Basic Security Tips for Home

Our company focus is on business computers but we often get asked about home computers. It’s just as important to protect your home computers as it is to protect your business computers. Here are a few tips to help secure your home computers:

Use antivirus software – here is a good comparison of several different products in varying price ranges: http://www.pcmag.com/article2/0,2817,2372364,00.asp.

Add an additional layer of security to protect against malware, and help protect devices like tablets and phones – Cisco Umbrella protects networks by examining DNS traffic (basically the address book of the internet) and blocking anything attempting to get to a compromised destination. It’s a bit more complex to implement than installing antivirus software, but it has the additional benefit of offering content filtering (block websites based on category such as adult content, nudity, or gambling). https://www.opendns.com/home-internet-security/

Don’t open emails you don’t recognize – you’ve heard it at work, but the same applies at home: don’t open emails you’re not expecting, don’t click on links in emails (especially purporting to be from your financial institutions), and don’t open attachments you’re not expecting. Having a good antivirus program, and adding OpenDNS, will help protect you in the event you accidentally open something malicious but it’s better to avoid it in the first place.

Don’t illegally download software/music/videos – everyone likes watching the latest movies, having the latest music, getting software for free, but it comes at a steep price: your machine will most likely become part of a botnet, meaning it is controlled by someone else and can be used to carry out attacks on other internet-connected entities.

 

For more tips like these, sign up for our Timely Tech Tips: http://www.cbtech.support/timelytechtips.html

Cyber Security

We’ve attended multiple security webinars over the past several weeks. It is unbelievable how the numbers of attacks have increased over the past 6 months relating to malware/ransomware attempts, attacks, and their profits. We would like to share that the most common way the attacks are happening is via email. There are ~300 million hits of emails which are attacks, or attempted attacks, each day. These emails are in the form of “Help me with this info I need”, “Here’s an unpaid invoice”, and even in the form of an attached Word or Excel document. The take away from this is simply don’t open an email or attachment that you aren’t expecting. Reach out to the sender via phone or text to verify anything that seems odd.