At IT Protectorate, our clients’ security comes first. Security researchers have now successfully weaponized BlueKeep (CVE-2019-0708), a name for a vulnerability Microsoft Remote Desktop. We expect hackers to start launching attacks on this vulnerability soon, if they haven’t already.
Do I need more Security Measures in place?
Yes and no. Most businesses (even home users) think they are too small to be noticed. However, hackers do not discriminate. On one hand, they may target a large business with the goal of a large payout in mind. On the other, they may target thousands, even millions of PCs across the internet in an effort to use them as part of their attack vector.
So, what are some recommendations?
First and foremost, IT Protectorate recommends protecting your connection to the internet with a Next-Generation firewall. A firewall will scan and block malicious traffic before it gets to your network (or leaves it!). These are not the firewalls that you can buy at Target or Walmart, mind you.
Second, protect your servers and workstations with Antivirus. We make sure our clients under Maintenance Programs are covered with managed AV, which we monitor for alerts and keep updated.
Third, consider cyber-security awareness training. IT Protectorate offers programs purposefully designed to trick your users into giving their credentials away to would-be hackers. Once identified, training programs are provided to give end users knowledge of key indicators which help them identify malicious emails, as well as general recommended practices to avoid data breaches, loss of funds due to falsified emails requesting payments and/or banking transfers.
Finally, know your data.
Do you offer more advanced security systems?
Security software and services is a huge focus after the last several years have seen the hacking of millions of cyber-citizens’ personal and business data breached and sold on the dark web. Contact us today and we’ll assess your network and provide recommendations according to your budget. A technology road-map is helpful as it allows you to plan and budget for your technology as well as recognize the value it provides your business and its’ customers.
Shameless plug: Here are some ideas and topics you may have come across that we offer or can simply answer questions about.
Managed IT Services is a maintenance program which bundles services such as IT Support, Network Security, Systems Administration, Cloud Services Management, and Data Security. We tend to group backup and general data protection, data loss prevention, and data security under our Data Security service—5 years ago we would have referred to this as data mobility, but now data is growing and moving around our planet so quickly that we struggle to remember what cloud storage service a document is stored in.
Right, right…but what does that mean? Well, let’s start at a high level and make our way down until we can see our spot on the beach—you know, the one with a lounge chair and your favorite drink.
Today, your IT support may be like a Prairie Dog; popping its head up when something needs to be fixed or a virus or some other malware needs to be removed (dare we say a ransom paid or backup data restored, with incident response procedures to ensure the data is viable). The goal of Managed Services is for that Prairie Dog to be constantly vigilant and equipped with the tools and expertise to drive off predators or play the role of medic when called for. Okay; tactical Prairie Dog, got it.
Instead of being reactive, Managed Services is the constant oversight of your IT services by an external organization. It is monitoring, maintenance, and self-repair of networks, hardware, servers, and software to keep your business’s data protected and available to allow your team to deliver outstanding customer service, deliver product on time, build the right product the first time, you name it.
Usually, one or more employees find themselves “pitching in” for the IT role. While this is helpful in the moment, it takes away focus from their primary role and technology is always an afterthought. When things get really complicated, a call goes out to another resource or consultant to bring your service back online. You can open QuickBooks again? Great, until the next time an outage occurs. Be prepared for a 3 to 4-hour staff meeting until the IT guy is available and makes the corrections to get the services running again.
What if your servers, workstations, network, and business applications were monitored 24×7? Taking a more proactive approach ensures the technology you rely on has improved up-time. Beyond monitoring, IT Protectorate reviews trends and automates processes designed to keep your systems running smoothly.
With our focus on your technology operations, IT Protectorate can provide insight to your strategic planning. Keeping track of your assets, cloud services subscriptions, software licensing, and device configurations can be a daunting task. We’re able to keep track of this data in our specialized systems and provide you with summary reports that will help plan the future of your business.
A proactive approach will prevent IT problems before they occur, ensuring your technology is as reliable as the service you provide your customers. Allow us the opportunity to assess your network and work with you to establish a reliable IT maintenance program for your business.
Elroy is the man behind the scenes; writing posts, checking status of servers, managing networks and endpoints, and enjoying coffee in his favorite spots in Lakeland and Winter Haven, FL.