Tag Archives: cybersecurity

The Importance of Security in Telecommunications

Numerous platforms are available today for business telecommunications, enabling businesses to seamlessly interact with customers. With data constantly transferred from servers to devices, data security remains a crucial concern. Read on to learn about communicating and collaborating while keeping data secure.

 

Security in Telecommunications

 

Various platforms are available for business telecommunications, with varying security protocols. One of the most important, if not the most important, is data encryption. For some platforms, this can be activated manually, though it’s even better for encryption to be by default. Without encryption, as well as other defenses like firewalls and virus scanning, in place, your data remains at risk and hence your reputation.

 

Threats to Guard Against

 

The same threats that can attack your network can also impact telecommunications tools. Distributed Denial of Service attacks can bombard your system, including telecommunications, with fake traffic and slow the system down or even bring it to a halt, impacting uptime. A bad actor can “eavesdrop” by gaining access to a data path and reading employee conversations. Another threat, ID spoofing, involves an attacker identifying and then using the IP address of a network or attached device to pretend to be a legitimate participant. Add to this viruses and worms that can replicate malicious code with or without a host, and the threat landscape is widened. 

 

Protecting Your Business Telecommunications

 

Thankfully, numerous mechanisms can protect your telecommunications from attack. One key defense is encryption, and another is authentication. Transport Layer Security (TLS) provides both as a protocol that defends telecommunications from attack by authenticating all parties and encrypting the data passing between them. Authentication via certificates can prevent spoofing, for instance, by depriving bad actors of information used to pretend to be a legitimate party. Other mechanisms include firewalls and Intrusion Detection Systems.   

 

Employing Best Practices is Important

 

Not only are tools important, but training workers in best practices can keep telecommunications safe. Recognition of phishing emails and other security threats via awareness training is necessary for workers to help stop attacks on telecommunications platforms. 

 

Use of telecommunications platforms involves data transmission and storage, and protection of the data is crucial. For additional guidance, contact your trusted technology advisor today.

What you need to know about 5G

Fifth Generation (5G) networks can expand data capacity, bandwidth and boost reliability. Read on to learn more about how the expansion of 5G networks can enhance your business telecommunications and improve user experience, and the role cybersecurity plays.

 

The Evolution of 5G Technology

 

Since its release in 2019, the use (and use cases) of fifth generation (5G) cellular networking has experienced remarkable growth and continues to grow. The market has expanded by trillions of dollars, and 5G has applications across numerous industries. At this time, it has superseded all previous generations, from the first in the 1980s powering analog voice communications to the fourth which ushered in mobile broadband. 

 

And how does 5G surpass previous generations? It offers an increase in internet connection speed, along with increased bandwidth (it can function on low, medium and high bands). It has an even greater capacity for data, and offers low latency so data can travel at even higher speeds. Telecommunications applications will function more quickly and reliably. Video conferencing and telephone calls run smoothly, delighting both workers and customers. Files can be shared quickly, helping you serve customers more efficiently, giving you a competitive edge.

 

Private 5G – A More Secure Choice

 

Another trend to watch is the use of private 5G networks. Though similar to public 5G, private 5G offers a personalized experience that fits your company’s needs. For example, access can be limited to a single entity (your company) and you can control the network and protect your data. Since 5G is cloud-native, the provider handles the infrastructure and saves you capital expense. You can deploy and control your own data, an advantage in this age of increasing cybersecurity risks.

 

Considering Cybersecurity

 

With its capabilities, 5G can present cybersecurity challenges. Along with the potential of 5G, your company needs a plan for handling security challenges. First, the increased capacity for data means considering how to store that data. Second, more data is moving from place to place. Third, with more devices connected, the threat surface increases. Vulnerabilities might be introduced by components of previous generations, and these could threaten data security. Future concerns might be present that are as yet unknown. As always, your company needs to thoughtfully consider 5G and what telecommunications use cases fit with business goals. 

 

The latest generation of wireless technology offers both potential and challenges. For further information and guidance, contact your trusted technology advisor today.

Building a Culture of Cybersecurity

Cybersecurity, more than just being about tools, is about people. People can, on the one hand, be a weak link in your company’s cybersecurity chain. On the other hand, if they understand the importance of cybersecurity to your organization, as well as what it means for them personally, they can be an asset. Read on to learn more about making cybersecurity a business decision as well as part of your company culture,

 

The Why of Cybersecurity

 

The need for cybersecurity seems clear, doesn’t it? Cyberattacks are growing in frequency and complexity, with threats like ransomware and the phishing emails that can introduce ransomware into your system. Add to this the possibility of security incidents that can threaten your company’s bottom line and reputation. Compliance with data protection regulations like CMMC and HIPAA needs to be part of your cybersecurity plan, too, in order to keep from having to pay fines and from losing trust. These reasons may seem abstract to the average employee; if your company has best practices, and workers are following these practices, they may not understand clearly why they are doing so. 

 

Establishing a Culture of Cybersecurity

 

If executives and managers understand the importance of cybersecurity (the “why”) they can set the tone for the entire company. Knowing that the entire company values cybersecurity and understands what it takes to make it part of the culture can motivate everyone to participate. Showing every employee that it benefits them may be the key to winning hearts and minds. What is it your employees want? For example, some may want to be efficient and not worry about downtime. Others may especially want the peace of mind of knowing their own employee data is secure. Once everyone is clear about the “why”, your company can move on to specifics of tools and training. 

 

The Role of Tools

 

Once everyone understands the overarching reasons for cybersecurity, your company can then decide which tools to use. Managed detection and response (MDR) and extended detection and response (XDR). Extended detection and response is a more comprehensive, efficient way to protect your network, since it integrates detection, investigation and response capabilities over a wide range of domains–endpoints, cloud applications and workloads, and data stores. Automation enabled by artificial intelligence (AI) can gather information from many different sources, and even stop a cyber attack in its tracks. What’s more, these tools can be a part of your compliance picture should you decide to purchase cybersecurity insurance.

 

Do You Need Cyber Insurance?

 

Do you? Perhaps so. Cyber insurers’ requirements, while strict, can correspond with protections a company may already have in place. For instance, insurance companies assume you’ve already assessed risks and have an incident response plan to address them. Doing so suggests a proactive stance, as does instituting common-sense precautions like multi-factor authentication for everyone in the organization, including for privileged accounts. Depending on needs, cyber insurance may be a good fit for your company.

 

The cybersecurity puzzle can be complex, but having a plan can help you with compliance, incident response and cyber insurance requirements. For additional assistance, contact your trusted technology advisor today.

Become Aware and Prepared During Cybersecurity Awareness Month

There’s never a bad time to examine your company’s cybersecurity posture, and even improve your strategy. Threats abound, including security incidents resulting from weak passwords, phishing attacks, and the lack of strong authentication. Read on to learn how you can assess and improve your preparedness for security incidents–it’s not if, but when.

 

Preparedness Starts with Awareness 

October is Cybersecurity Awareness Month. Starting in 2024 the Cybersecurity and Infrastructure Security Agency’s (CISA) theme is “Secure Your World.” Cybersecurity Awareness month is a time for understanding the threats that face all businesses, and perhaps especially small to medium-sized companies. The good news is, you can learn more about what threats affect your network, applications and data, and how to protect your business.

 

Protect Your Business from Common Threats 

 

Common threats include phishing as well as the ransome ware that can infect your network and steal your data. If your data isn’t stolen, it can be encrypted away from you via a ransomware attack. Security incidents can occur as a result of weak authentication of account access (weak passwords and lack of multi-factor authentication). Mishandled operating system updates can lead to not having the latest security updates and bug fixes. 

 

Phishing threats are growing in frequency and sophistication, and can come in through emails designed to trick recipients into giving up security credentials, which can then be used to gain access to a company’s network and data. Phishing attempts, along with variants like “smishing” (attacks via text messaging) and “vishing” (attacks by phone and voicemail) rely on fear and a sense of urgency to trick the recipient into action. Such attacks may include malicious links. Knowing how to recognize and deal with a possible phishing attack includes knowing how to report the email before deleting it, and knowing not to click links. If in doubt about the sender’s address, the recipient can point their mouse arrow at the URL to determine if the address is legitimate. 

 

Weak authentication can also put your company’s network at risk. Security incidents can occur when a password is guessed and the attacker penetrates the network. Examining your company’s password best practices and making sure workers know the practices, can help defend against intrusion. By creating strong passwords (e.g. twelve characters, with a variety of numbers, letters and special characters) individual workers can protect the company’s network. A password management system can help generate and store passwords, and only the password to that system needs to be remembered.

 

Multi-factor authentication (MFA) adds an extra layer of protection. To verify identity, a one-time code or even biometric like fingerprint recognition can determine that the request to access your network is legitimate. Even if a bad actor guesses and uses a password, they can’t access the network. 

 

Keep Current on Operating System Updates

 

On the company level, updating operating systems and applications can help protect your network and data. Operating system updates often include bug fixes and updated security features. Managed updates keeps them happening on schedule and compatible with your network environment. 

 

With its “secure your world” theme, CISA’s cybersecurity awareness campaign can be a template for your company’s efforts to prepare for possible attack. For further assistance, contact your trusted technology advisor today.

Protecting Your Business from an Evolving Threat Landscape

Whether man-made or natural, threats to the security of your company’s network are on the rise. Not only do effects of climate change (such as wildfires and floods) pose threats to businesses, but cyberattacks including ransomware via phishing emails, jeopardize your network and data. Read on to learn more about threats and how to overcome them.

 

Common Risks For Businesses

 

Risk management professionals have their hands full! Natural disasters like floods or wildfires can damage, even destroy, security operations data centers, homes and businesses, and infrastructure like power lines. Even a winter storm can keep workers from accessing work systems, and break the connection between a technical problem and its solution. At the very least, natural disasters can result in costly downtime.  According to a CSO Online article, the number of climate change-related incidents with damage exceeding $1 billion dollars had occurred by October 2023. 

 

As if the consequences of natural disasters aren’t serious enough, bad actors are seeking access to business networks to steal data, infect the networks with malware, or both. These cybercriminals might also use a natural disaster to take advantage of a company’s vulnerability. Data breaches are also very much in the news. According to a 2021 cybersecurity threat trends report, phishing emails are responsible for roughly 90% of data breaches. These data breaches come from unsuspecting recipients giving up confidential information when they are tricked into doing so.  

 

Phishing schemes are becoming more sophisticated, too. Another threat is escalating cyberattacks using the same artificial intelligence tools your business might be using to automate processes and make work more efficient. If your company is using the tools, so are the bad actors. Cyber criminals can create more sophisticated phishing schemes, drafting emails lacking the usual spelling and grammatical errors in social engineering messages. Not only that, criminals can create videos (“deep fakes”) that mimic the voice and/or image of someone the recipient knows. 

 

How You Can Protect Your Business

 

It’s said that the question is not if your business is attacked, but when. You may know what your business is up against, but how do you protect yourself? You need a plan. A good place to start is taking inventory of technological assets, including data. Taking a risk management approach by assessing the most likely threats first helps prioritize your response. Partnering with a provider for Managed Detection and Response (MDR) and mobile device management can protect your network and its connected devices.

 

Tools for Protecting Your Network 

 

Two solutions for protecting your network include managed detection and response and mobile device management. Managed detection and response is a cybersecurity service that proactively protects organizations from cyber threats with a combination of technology and human expertise. The provider serves as a partner, taking on time-consuming tasks and using human expertise to hunt down and destroy threats. The end result is the preservation of your company’s reputation and brand. Mobile device management provides visibility across multiple devices and applications, protecting the devices with security features, in accordance with company policies.

 

Threats are escalating, including malware that takes advantage of unprotected devices as well as sophisticated phishing schemes involving artificial intelligence. For advice on shielding your company’s network, contact your trusted technology advisor today. 

 

Guarding Your Network Against Ransomware

Hybrid workforce is here to stay, and some businesses are entirely remote. With the benefits remote employees bring, it also introduces dangers like unprotected network access and greater exposure to ransomware. Over the last several years, ransomware has increased and can have disastrous consequences to businesses of all sizes. Read on to learn more about the ransomware landscape and how to protect your company from attacks that steal data.

 

Ransomware’s Prevalence and Danger

 

Ransomware, a type of malware that introduces malicious code that can encrypt your data and make it unusable for your company, is nothing new. Even with some progress by law-enforcement groups in taking down some of the infrastructure, it is still prevalent. It can cause data breaches, downtime from inaccessible data, and financial consequences from lost revenue. If your data is stolen or leaked, not only do you not have access to it, but it can damage your company’s reputation because customers no longer trust you to protect confidential information. According to a 2023 report by Verizon regarding data breaches, ransomware affected 66% of organizations; 24% of data breaches occurred as a result of ransomware infection. Aside from lost data, your network could also become a hub, spreading ransomware to others such as customers or vendors. 

 

How Ransomware Enters Networks and How to Keep it Out

 

Points of entry are various, though the primary source is social engineering (phishing) emails. Many attacks come by way of an email containing a link which, when clicked on, downloads malicious software. Malicious actors use urgent calls to action and appeals to fear to get unsuspecting users to give up confidential information. Not that phishing emails are the only way for ransomware to enter. Ransomware can also get in through attacks on vendors, workers using unsecured Wi-Fi, or even an application update.

 

How, then, can you protect against it? Like preventing any cyberattacks, the solution can include tools, policies and people. Tools like network monitoring and updated patches can help detect and block ransomware. Firewalls can also analyze activity between your network and other points and block ransomware. Policies can include having separate computers for business and personal use, as in the case of remote workers. Training workers to recognize a phishing email and report it, and refraining from clicking any links needs to be a regular practice. 

 

With technological innovation comes risk. To learn how to minimize your risk of being a ransomware victim, contact your trusted technology advisor today.

Lessons from a Global Technology Outage

As we saw two weeks ago, our entire world is dependent on technology. The global technology outage precipitated by a faulty software update rollout by Crowdstrike illustrates how a small problem can have enormous repercussions. The recovery will likely be difficult and expensive for many companies but especially for small to medium-size businesses. Read on to learn about how a technology advisor can help your company mitigate damage from and even prevent technical issues

 

The Outage and its Impact

 

On July 19, 2024, a global technology outage resulted from a faulty software update from technology firm CrowdStrike upended operations across multiple industries. Flights were canceled and delayed, medical care interrupted, and businesses large and small were unable to operate. Large businesses will have a difficult time recovering, but what about small to medium-size businesses with less technical support? Smaller businesses dealt with missed deadlines, possible loss of customers and the inability to pay workers. What lessons can companies learn from what happened? 

 

How a Technology Advisor Helps

 

Although some incidents are out of a company’s control, they still need to be prepared for the consequences of technology problems. A technology advisor is an expert in their field who advises, guides and supports businesses needing help with technology-related decisions. These decisions can include strategic ones, such as how to implement automation and develop a framework for cybersecurity. Or the advisor can assist in planning and navigating software updates to smooth the rollout process. Training and support of workers to give them the knowledge and skills to effectively and safely use technology tools.  

 

The software update responsible for the outage was believed to have not undergone rigorous testing–including for compatibility with common software systems. Technology advisors can help a company develop a framework for rigorous testing of updates to prevent problems that can spread to stakeholders; this includes cybersecurity issues. 

 

What Your Company Can Do

 

Of course, a technology advisor doesn’t do all the work. A collaborative approach in your company, where the IT department works with other business units, contributes to the knowledge of all. For example, while some departments may be enthusiastic about automation of processes, another can provide needed caution–no technology is infallible.  A  technology advisor can help  the company plan an automation strategy. Not to mention, the advisor can remind the company of the need for human oversight of automation.

 

July’s global technology outage has shown us all how digital transformation can introduce risks. Small to medium-size businesses may need a technology advisor to help them with a plan to mitigate these risks. For further assistance, contact your trusted technology advisor today.

Password Best Practices Keep Your Business Secure

According to an article in the HIPAA Journal, May 2nd was “National Password Day.” You didn’t know there was such a day? National Password Day was declared in 2013 to bring awareness of both the importance of passwords in keeping personal and company data safe, but also about  password risks and best practices to mitigate those risks. Read on to learn about the state of thinking about passwords, and how to better manage login credentials.

 

A Brief History of Passwords

 

Even with biometric methods of identification, and single sign-on technology, passwords are still relevant as the most common way to secure personal and business accounts. Passwords were first developed in the 1960s at the Massachusetts Institute of Technology (MIT) to guard accounts against unauthorized access. Incidentally, the first password breach occurred there, too.  More recently, a survey of 2400 respondents in the U.S. and other countries revealed some sobering statistics about password practices.

 

Common Password Practices

 

Using the same password for multiple accounts was a common practice, with 84% of respondents admitting to using the same password for multiple accounts. If a hacker can steal the password to just one account, they can easily gain access to others.

 

54% of respondents relied on memory for passwords, and because of this the passwords can be too short and weak.

 

36% incorporated personal information (family names or birthdays, for example) in passwords to make remembering easier. 

 

33% used only a password, rather than two- or multi-factor authentication, to access their accounts. 

 

Moreover, even when changing passwords, users didn’t change them sufficiently. Instead, they only changed a few characters, with the idea of keeping them easy to remember.  All of these practices can facilitate the theft of passwords by social engineering (email “phishing” or text-message “SMiShing”) attacks, or even brute force attacks. How can thinking on passwords be changed?

 

Best Practices for Password Management

 

First, the article suggests thinking not in terms of passwords but passphrases, multi-character combinations of upper- and lower-case letters, numbers and symbols, that are more difficult to guess. Also, the article suggests using password management systems where the list of passphrases is itself protected by a passphrase of at least fourteen characters. Companies can develop clear, enforceable policies for password management, which might then influence how workers handle passwords outside of work, too. 

 

Passwords are still necessary to secure business and personal accounts, and thus need to be unique and strong. For help developing your company’s password policy, contact your trusted technology advisor today.

Cybersecurity Challenges for Small to Medium-Sized Businesses

Cybersecurity, ever a topic for businesses of all sizes, poses special challenges for small to medium-size businesses. Not only can they be special targets for bad actors, but they also deal with tight budgets and at times a lack of understanding of what cybersecurity means. Read on to learn how a small business can meet cybersecurity challenges and build strong defenses.

 

A number of cybersecurity issues are challenging for smaller businesses, according to a CompTIA article. First, just getting started with a cybersecurity plan can seem like a huge task. And what does cybersecurity mean for your business? What mission-critical data and applications need protection? Once your company has decided on your goals, how will you reach them? 

 

Another issue is spending. Often, a small organization’s cybersecurity budget is tight, and the business cannot spend very much on an IT team, or the training to upskill current workers. How much will a third-party solution cost? These and other costs can seem daunting. 

 

Knowledge and understanding of the threat landscape is another challenge. Small or medium-size businesses might think that, being small, they are “under the radar” of cybercriminals. However, they are likely to be the victims of a cyberattack. According to the FBI, small businesses comprised the majority of victims in 2021. Even if the bad actors don’t specifically target a small company, they may use the small company to target larger businesses. Often, the criminals are looking to steal data – credit card and bank account information, customer data, even proprietary business information–from anyone they can. 

 

One of the challenges is complacency; small companies may think they don’t need to learn new skills. On the contrary, they need to adapt to an ever-changing threat landscape. Cyber attacks are becoming more frequent and more sophisticated, with  attackers banding together. Previously, hackers may have worked on their own, trying to execute brute force attacks or use bots to take down a website with a distributed denial of service (DDoS) attack.   

 

Cybersecurity Help for Small Businesses

 

So, what’s the solution? The good news is, though cybercriminals are banding together, small to medium-sized companies can do the same. Technology service providers  can help small businesses access threat intelligence and learn from organizations that have been attacked and have recovered. And with help from the Cybersecurity Infrastructure Security Agency (CISA) and its various resources, businesses can get information and start acting on that information to develop their cybersecurity plan. What’s more, a company might seek out third-party partners that can help supply the IT talent to improve their cybersecurity posture.

 

Cybersecurity, especially for smaller businesses, can seem like a huge challenge. However, help is out there. To learn more about developing a security plan, contact your trusted technology advisor today. 

Protect Passwords to Safeguard Personally Identifiable Information

Businesses large and small deal every day with personally identifiable information from customers, employees and additional stakeholders. How do they protect it? While passwords alone are not considered personally identifiable information, they help keep it safe. Read on to learn more about how to manage passwords and keep data safe

 

The Role of Passwords in Safeguarding PII

 

Personally identifiable information (PII) is defined as data that can be linked with or traced to an individual. Such PII includes names, date of birth, address, Social Security numbers and other specific information about a person. Some of it is n-sensitive, part of public records or easily found online. Sensitive PII can include biometrics (used as part of multi-factor authentication, employment and financial records, and bank account credentials. Every business owner handles a great deal of personally identifiable information in the course of doing business. How can they protect it?

 

Passwords authenticate a user’s access to websites (including company websites) that hold personally identifiable, often sensitive, data on employees, customers and more. Employees properly trained in password management can be helpful in safeguarding a company’s data. One key practice, along with developing strong passwords, is refraining from sharing these passwords with others. 

 

Keeping Passwords Private Benefits Your Business

 

The reasons for keeping passwords secret may seem obvious–no one else can get into your accounts, or change your data, or leave it in danger of falling into the wrong hands. If your workers keep their passwords secret, they prevent sensitive information from being leaked to those who can misuse it. Individual workers (and your business as a whole) avoid penalties associated with regulatory non-compliance. By keeping passwords confidential, they avoid being held responsible for misuse. What’s more, with a strong password, they can always access the resources they need to succeed in their work. Even companies with strong controls and policies need to train their workers in password maintenance, making the practices part of the organization’s culture.

 

While passwords may or may not fall under the category of personally identifiable information, they definitely serve to protect it. For help in developing your company’s password policy, contact your trusted technology advisor today.