Posted August 4, 2017 by Jeremy Wanamaker
Users must take responsibility to protect company networks
There is a new breed of malware that uses a sophisticated combination of phishing, brute-force password attacks, and spreader technology to infiltrate and compromise computer networks. The malware is called Emotet.
Posted February 21, 2017 by Ben Hicok
As you continue to map out your goals for 2017, it is important to not forget your information technology. Where do you start? The top 3 tech goals from CNS should be at the top of your to-do list.
Posted January 16, 2017 by Ben Hicok
Disasters come from anywhere: fires, storms, power outages, even cyber-attacks. No one can know where, when or how the next disaster will strike. You care about keeping your organization focused on the future, not picking up the pieces after a catastrophe, thus investing in planning and preparation is critical.
As a responsible business owner you equip your business with all necessary protections. Fire mitigation devices and generators are installed and maintained. You have insurance to replace damaged physical property. Your employees are trained on procedures should disaster strike.
Posted December 13, 2016 by Ben Hicok
2016 has been filled with news of cyberattacks and hacking. Clearly, at this point no one and no business is immune to the dangers of the hacker community. Given the onslaught of cybercrimes, what is a SMB owner to do? You have taken what you feel are the necessary steps to keep yourself safe. You have installed the latest firewalls. You have communicated to employees the importance of strong passwords. Sadly, even these steps cannot guarantee your systems’ safety. You could still be victim of a hackers!
Posted November 23, 2016 by Ben Hicok
As we move further and further into the technological age, it is becoming more and more apparent that it is neither desirable nor efficient for businesses to remain firmly planted to the ground. The time has come to move to the cloud! But with all the cloud based services out there what is a SMB owner to do? With CNS in your corner you can be sure that your migration to the cloud will be smooth.
Posted October 20, 2016 by Ben Hicok
As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity. But CIOs still must consider three different basic set ups/options before taking the plunge:
Posted August 11, 2016 by Ben Hicok
Angry customers, negative media coverage, frustrated employees, untold revenue lost, lingering anger from customers: that’s the status for Delta Airlines this week. Of course this is not news to anyone unless you have been living under a rock you have heard the numerous news reports detailing the Delta computer disaster. Whether caused by a minor power outage at Delta headquarters or an internal computer hiccup, the airline was forced to cancel over 500 flights. This caused a gridlock across America’s airports at the height of vacation season. You may not be running an international transportation corporation, but imagine what would happen to your clients if you had an unexpected IT failure. If you think something like this can’t happen to you; think again.
Posted August 3, 2016 by Ben Hicok
Most small business owners believe cyberattacks are the concern of large corporations, however nothing could be further from the truth. According to Verizon Data Breach Investigations Report, 71% of cyber attacks occur at businesses with less than 100 employees.
Unfortunately, many “SMBs suffer from ‘It can’t happen to us’ syndrome,” notes Robert Siciliano, security expert for McAfee. “They also typically don’t have the resources to secure their networks to the degree a large enterprise would. But the information on their networks – and access to their bank accounts – still makes them a big target.” Even though it turns out SMB’s have a larger target on their backs than they realize, two thirds of SMBs surveyed by Symantec say they’re not concerned about cybersecurity threats; and more than 80 percent have no formal cybersecurity plan.
Posted July 29, 2016 by Jeremy Wanamaker
The arrival of low-cost Gigabit Internet is going to be a game changer for small and midsized businesses. Cloud service adoption has been steadily gaining traction over the last few years, but the widespread availability of Gigabit Internet service will kick it into overdrive. Low quality Internet connections have hampered cloud service adoption because of poor user experience. Cloud-based email and browser-based SaaS run well over cable or DSL. However, real time and high-performance applications such as hosted phones and video conferencing often suffer from poor performance when run on a low-end connection.
Posted March 25, 2016 by Jeremy Wanamaker
Caution and Proper Use are Key
Ask anyone working in IT what the top concerns in the field are, and it’s likely most people will name IT Security near the top of the list. The increasing frequency of news-making data breaches at high profile corporations, combined with new types of attacks in business of every size, has forced security to the forefront of our thinking. Cryptolocker and other ransomware variants are so lucrative for cyber criminals that new variants are popping up daily. The anti-virus vendors can’t keep up.
Historically, those working in the IT department have purchased increasingly sophisticated firewalls and security software to mitigate the threat posed by malicious software. While technological solutions are an important aspect of an organization’s security posture, security researchers have realized that the most effective tool against hackers is proper user behavior.
What if I told you that there is one simple rule that, if followed, would prevent over 90% of data breaches and hacks at small and mid-marked organizations?