Blog

Category Archives: Network Security

15 Best Practices to Implement Immediately to Help Prevent a Cyber Attack

  1. Update the security software on your network and every connected device. Keep it current by turning on automatic software updates. That goes for your operating system and web browsers too.
  2. Get proactive with your anti-virus software by confirming that it’s running on all devices, scheduling automatic daily scans, ensuring it’s updating regularly, and educating staff on how to run manual scans on new downloads.
  3. Make sure your network is protected with a firewall. This is one important way to keep the bad guys out. If you don’t have a firewall appliance, make sure you have a software-based one enabled on your computer.
  4. Enforce strong password policies, including using two-factor authentication on sensitive information, encouraging passphrases, forcing employees to change passwords periodically and not allowing them to reuse past passwords.
  5. Restrict where sensitive data can be stored. Don’t allow personally identifiable information (PII) to be copied to an external drive or saved in a location outside of your secure network.
  6. Assess how your telecommuters work. Are they using a home computer for work, and possibly transferring files via an unencrypted USB drive? Is their home wi-fi network secure? Consider setting up telecommuters with a secure work device and setting firm rules around the computer’s use.
  7. Back up data on a regular basis (every day, every hour, or real-time, depending upon the nature of your business). Backups should be stored on-site and off-site and periodically tested to ensure they work.
  8. Safely manage email; it’s the biggest source of security breaches! Tips include never opening attachments or clicking on links from an untrusted source; never sending confidential information over public email (use a secure encrypted service); only using an official business email address that is protected by a spam filter (not personal accounts); and being wary of email phishing and extortion scams.
  9. Wipe hard drives before disposing of old devices, including computers, tablets, printers, copiers, external hard drives, flash drives, and fax machines.
  10. Don’t neglect mobile devices. Download apps from trusted sources and allow them to update regularly. Implement strong authentication, such as fingerprint recognition or a strong passphrase. Configure app permissions immediately after downloading.
  11. Protect your social networks by limiting who has administrative access to your account, setting up strong authentication, and carefully configuring privacy settings.
  12. Be aware of what your third-party vendors are accessing.
  13. Create policies for using USB drives. Disable auto-run and scan the drive before opening files. Don’t allow personal USB drives to be plugged into a work computer. Don’t allow sensitive information to be stored on an unencrypted USB drive.
  14. Establish a guest wi-fi channel that restricts access to sensitive areas.
  15. Educate employees on what they can and cannot do on their work computers, and how they can help strengthen spam filters by reporting suspicious emails and events.

5 Steps to Take When Developing a Formal Cybersecurity Plan

  1. Identify your sensitive data. Determine what you need to protect, such as employee social security numbers and payroll information; customer data; credit card information; and company secrets (proprietary formulations, patents, etc.). Ensure you know every location where copies are stored.
  2. Protect it. Assess what needs to be done to properly protect everything you’ve identified.
  3. Create a detection and alert system. Set up systems that will alert you if an incident occurs, including the ability for employees to report problems as they occur.
  4. Develop a response plan. Ensure everyone knows their role in helping to contain an attack and assess the damage.
  5. Develop a recovery plan. Once business operations are restored, you’ll need to determine if anything was lost and if you have any legal obligations to alert customers, vendors, and board members.

If you need help with any of the above steps, contact an ACT specialist today to learn how our Comprehensive Security Assessments can protect your organization.


Why Do Hackers Want My Data?

Hackers Want Your Data

By: David R. Herman – Director, Technical Services

Hacking has become so commonplace that many people have begun disregarding the potentially disastrous consequences of it. Why do hackers hack, anyway? Why are we burdened with the inconvenience and expense of firewalls, anti-virus programs, content filters, and having to sort through pages of spam selling you the next super vitamin.

As in many other facets of life – follow the money! While it’s true there are some hacking groups that use hacking as a canvas for their social messaging, bragging rights, corporate espionage and other reasons, the vast majority of ‘professional’ hacking is for personal and financial enrichment.

This article aims to help you understand what a serious effort is being made to steal and make money using YOUR data. Now is the time to ensure you are putting enough resources toward protecting your data (as opposed to glazing over and rolling your eyes every time your IT professional starts warning you about ‘those vile hackers’).

So how do hackers make money from your data? By selling it, of course!
Here are some of the most common ways hackers are profiting from your data right now:

  • Ransomware. Hackers encrypt the data on your computer or network so you cannot access it, essentially holding it ransom. Then they offer to ‘sell it back to you’ for a fee. Once you pay, they usually give you the key needed to decrypt it.

    – Motive: Financial gain through the direct sale of data back to its owner.

  • Stolen Financial Data. Credit cards, social security numbers and other identifying information can be used for immediate identity theft exploits. Hackers collect this information and then sell it on the deep web to groups skilled at using it to perpetrate identity theft. It is its own business and it’s happening 24 hours a day, 7 days a week.

    – Motive: Financial gain via short-term identity theft.

  • Stolen Data. If you’ve been to a doctor in the past few years, you’re familiar with the term ‘HIPAA guidelines.’ For providers, HIPAA causes numerous headaches as it forces practices to create special procedures, train their staff, and even invest in specialized software. As a patient, HIPAA provides you with data privacy and security provisions meant to safeguard your medical information. As medicine moves toward electronic medical records, it opens the door to medical data fraud. When a hacker obtains your medical data they can submit fraudulent claims, resulting in insurance and Medicare fraud, costing the industry billions of dollars each year ($6.2 billion according to a recent IBM/Ponemon report). Furthermore, since medical records contain personal data that is biometric and never changes, skilled groups can re-use this data for future identity theft exploits long after the data is obtained.

    While the example above is specific to the healthcare industry, it’s important to note that any industry with sensitive data about its clients is at risk, including the accounting, legal and financial industries.

    – Motive: Financial gain via short-term and long-term identity theft and insurance fraud.

These are just three of the more popular exploits we see every day. Unfortunately, there are many more, and they are ever-evolving. So, the next time you see a bright red and yellow pop-up warning stating ‘Your computer is vulnerable,’ don’t ignore it. There are full-time hackers working hard to get at your data.

Want to stay ahead of the hackers and keep your data secure? Give us a call to assess your vulnerability and secure your data.


Ransomware Guide

Ransomware has become an epidemic in today’s IT world. It has locked down hospitals, universities, small businesses, and individuals all over the world. Ransomware is malware that infects your computer by locking access to your files until you pay a ransom – usually in Bitcoin. The malware typically gets on your computer through a malicious email or website. Hackers can also deliver it straight to your computer if it’s already been compromised.

Ransomware is replacing credit card theft as the number one scam for cyber criminals. Unfortunately, antivirus software alone is not enough to protect you from this threat. 

ACT recommends multiple layers of protection to defend against the latest risks. Here are some best practices to protect your network against ransomware:

  • Backups

    • If done correctly, backups are the only guaranteed defense against ransomware. This goes beyond a periodic copy of your data. Best practices include snapshot image-based backups that are captured multiple times per day and kept securely both onsite and offsite.
  • Antivirus/Anti-malware Software

    • This is technology 101. Everyone needs to be running antivirus software on all their appliances…yes I said all. Desktops, laptops, iPhones, Androids, Macs, etc. Nothing is off-limits these days.
  • Firewall with UTM

    • In the old days, firewalls were the doors that kept the bad guys out. The problem now is that end-users are clicking on malicious emails and websites unknowingly, opening the door and inviting them in. Many firewalls today contain unified thread management features (UTM) that provide a suite of protection against today’s threats.
  • Operating System Security Updates/Service Packs

    • When was the last time your servers or workstations were updated? Microsoft is regularly releasing updates, patches, and security fixes to keep their operating systems up-to-date against vulnerabilities.
  • Email Security Software

    • If you find yourself weeding through dozens of junk emails on a daily basis, then it’s time to upgrade what you are using for email security. Cloud based email security systems can stop threats before they ever make it to your company’s mail server. Spam, viruses, and malicious URLs are some of the easiest ways for ransomware to infect users.
  • Domain Name System (DNS) Intelligence

    • DNS is the starting point for internet connectivity across all devices. Providers are now using DNS to secure networks in ways beyond the standard security products out there. This gives clients another layer of security across all platforms in their organization by protecting them from malware, botnets, phishing, and others.
  • Security Policies

    • One quick and easy way to help reduce the risk of ransomware on your network is to limit employees’ access to the network. There are a number of ways to do this. For example, you can remove permissions to specific files and folders, lock down desktops, and remove administrator roles for standard users, just to name a few. Keep in mind that malware can only access what the infected employee has access to. Thus, limiting employee access minimizes the threats.
  • Education

    • Employees are the front line to most businesses. Any email they open, attachment they click, or website they browse could be compromising the business. Many ransomware attacks can be prevented through employee education and training. This can be as simple as creating handouts for employees to review periodically, or maybe an occasional lunch-and-learn session. Remember, know before you click!
  • Did I Mention Backups Backups Backups?

    • Backups are so important that it has made the list twice. And don’t forget, the only way to truly know if your backups are working is to run a periodic test. Don’t wait until your network is compromised to find out that your backup may have failed.

So ask yourself: Is your business safe? Sign-up for a FREE security consultation to see how well your network is protected.