MSP Facts: Common Managed Service Myths – Busted

Managed Service Providers (MSPs) are not stuff of legend like minotaurs and unicorns. Yet there are many common myths around managed services. These can cloud understanding of a MSP’s true value. Consider the facts to decide whether partnering with a third-party IT vendor is right for you.

 

Myth #1: MSPs don’t understand our business.

Not every MSP will understand your business, that’s correct. But not every MSP is the same. The right MSP examines your existing infrastructure and workflows. They’ll also meet with your people to understand their needs.

Hiring a MSP adds IT experts who can make specific technology recommendations. Meanwhile, your in-house IT team can focus on driving growth.

Myth #2: Outsourcing to a MSP is too costly.

Take a look at your IT budget today. Internal IT costs are typically high and often unpredictable. Managed services help you stay on top of your IT costs. Your business pays a simple, manageable monthly or quarterly fee. This makes IT operating expenses easier to budget.

MSPs also provide long-term cost savings by:

  • Reducing applications downtime
  • Cutting costs of IT infrastructure
  • Improving IT team productivity
  • Implementing greater security to avoid costly cyber attacks

Myth #3: Only enterprise-sized businesses can use MSPs.

One common misconception is that only big corporations hire outsourced managed service professionals. In fact, small- to medium-sized businesses can benefit more from working with a MSP. After all, large businesses tend to have a dedicated IT to secure data and maintain its systems. Smaller companies have more difficulty competing for IT talent.

Outsourcing gives any business access to skilled IT specialists. They are specialists in securing data, managing networks, and user access. You get top talent and best practices, without having to add employees to your roster.

“Recent market studies show that, when properly executed, managed services for IT can reduce in-house IT costs by upwards of 40 percent while simultaneously facilitating a 50 to 60 percent increase in IT efficiencies.” – Cisco

Myth #4: You lose control of your business.

Only if you hand it over to the MSP or don’t effectively manage your partnership with your provider. You should hire an MSP with an understanding of what level of control you want to retain. Lay out the relationship in a Service Level Agreement. This document should outline expectations, roles and responsibilities, and scope of services.

Before hiring a MSP, look at client testimonials. Have others found the MSP works with businesses to only do what needs done? Ask prospective MSPs how they will keep you up-to-date about the work they do. Also, identify someone on your team to actively manage that MSP relationship.

Myth #5: You only use an MSP for security backup.

Sure, backup and disaster recovery, are the primary service outsourced to MSPs. But that is not the only reason businesses turn to managed services. Other common managed services include archiving, networking, application management, and support services.

The MSP does the work your IT team finds tedious and your general employees care little about (but rely upon). Outsource monitoring and maintaining backend technology and routine, recurring tasks. You gain high quality, consistent IT support. And you improve the morale of your overworked, overextended IT team along the way.

Business today relies on its technology to be successful. Big or small, your business can benefit. Free up internal IT teams to focus on more value-adding initiatives. Take advantage of a CPI Networks’ expert help and powerful new technology.

Ready to outsource IT? Give us a call at (416) 645-2469, (905) 667-0441 or email us.   

Want to be notified when our next blog is posted, sign up here.

Protecting Your Customers and Your Business Too

Security and privacy are at the very top of our priorities when considering business IT. Major data leaks are in mainstream news on a near-daily basis and hundreds of thousands, if not millions, of customers are impacted every time they happen. Our number one goal is to make sure our businesses are kept out of danger.

Major institutions, such as multi-national banks and credit card companies, are expected to handle your data well. Unfortunately, less secured businesses require access to our data too.

Even just booking into a hotel often requires you to leave your name, address, date of birth, passport number, and credit card details. These few pieces of information are more than enough to steal your identity, start a line of credit, and access many of your vital services. You can often only hope your chosen hotel handles your information as well as your bank does.

Securing Your Business with Smarter Thinking

There is no way to change how your favorite hotel service operates, but you can affect your own business to improve its security for your customers.

You don’t need the manpower or funding of a major banking chain to handle data securely. With simple tweaks and powerful changes, you can minimize the chances of your business suffering a data breach big enough close your doors for good.

By stepping up IT security to meet modern threats, you can help to limit your liability, put customer’s minds at ease and give your firm a competitive advantage. Should hackers attack, the work you do today will limit the damage and help you to weather the storm.

Limit Your Data Collection

The single most important thing to consider when securing your business is how much data do you really need to hold anyway? Carefully consider the value of every piece of personal information you collect in any given transaction. Do you have a use for everything you ask for?

Emails, addresses, and contact numbers are useful for receipts and marketing, but additional data many firms collect is often useless and wasteful. Each piece of unnecessary data you hold represents additional value to hackers and thieves. While you may be unable to use your own stored data, hackers will find great value in gathering more personal information. This increases your liability without adding any extra value.

Consider Your Access Requirements

Think carefully about who has access to information within your business and precisely why they need to access it. Often security problems begin when employees have blanket privileges to access everything within the firm.

Access restrictions should be specific to the company structure. Low-level employees should be limited to only what is strictly required for their role. Managers, for example, are likely to need systems that their junior staff cannot access.

Physical access restrictions are critical too. Unattended computers and mobile devices should require a password or identity verification to log on.

Treating Data with Care

The way you treat your data in day-to-day business reflects the impact hackers or IT disaster will have on your business when it is lost. Do you know where your backups are, and when they were last tested? Firms often first know they are in trouble when they realize all their data is stored on a business laptop or device that could be easily lost or stolen. Some firms maintain backups on USB drives or shuttle a portable hard drive between home and work. As this was common in years past because of internet bandwidth and budget limitations, these solutions should have no place in a professional business environment today. Proper data care means regular, tested backups that are secure against fire, theft, or online hacks. Protecting your customers and your business is all about the smart application of IT knowledge in a cost-effective and efficient way.

We can help you to lock down your business to protect the most valuable assets your business owns, data. Call us at (416) 645-2469, (905) 667-0441 or email us

What is the Best Way to Backup?

“That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to backup? Here’s help.

Why You Need to Backup

  1. Business disruptions of any kind can be costly. The disaster might take one of several shapes:
  2. Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
  3. On-site (e.g. hardware/software failure, power outage, inability to access building)
  4. Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
  5. Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).

Regardless, the best backup solution can help reduce downtime and damage.

Plan B: Approaches to Backup

There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.

USB Thumb Drives – Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But, they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).

Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.

The cheap ones also tend to be slow, which can make backing up sluggish.

USB Hard Drives – Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.

Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.

Cloud Storage – Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.

Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.

Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.

OK, What’s the Best Answer?

Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:

  • Hardware failures (45% of total unplanned downtime)
  • Loss of power (35%)
  • Software failure (34%)
  • Data corruption (24%)
  • External security breaches (23%)
  • Accidental user error (20%).

We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.

Want to secure your data for the worst? Give us a call at (416) 645-2469, (905) 667-0441 or email us to set this up.

IT Problems Your Managed Service Provider Can Solve

Unlike quick-fix IT relationships, a managed service provider isn’t there just to solve short-term problems and leave. Your managed service provider is your IT’s mountain Sherpa, there to guide your business through the ever-changing technology landscape.

Like a mountain guide, your managed service provider gives you a detailed route that will help your business climb to new heights. The secret to a great business is avoiding the pitfalls, dead-ends, and traps inherent in bad IT.

Removing IT Worries

Technology in business presents both new solutions and new problems too. We are more efficient and more productive today than we’ve ever been before. On the other hand, we are also more vulnerable and more exposed to malware and hackers than in previous years too.

Major hacks of large firms are in the news almost daily, they affect millions of customers worldwide, and even large firms seem to struggle with the fallout incurred after a major breach. Our number one priority is ensuring that the customers, suppliers, and business partners of our businesses can rest at ease.

We remove your IT worries, secure your data, and keep your systems safe so you can focus solely on your business. Our methods let you return to the passion which makes your business great while sleeping soundly at night knowing your systems are in good hands.

Improve Stability

Slow computers and bad networks can be some of the most frustrating daily nuisances around. As a workplace obstacle it annoys employees, saps morale, and spoils even the best working environment.

The cause of these network niggles can be as varied as the networks themselves. In some cases, the router is overloaded, a switch may be poorly configured, or a device is misbehaving and spoiling the network. Poor IT reduces your effectiveness and efficiency in a number of ways. There is a tangible loss that comes from under-performing systems, often more than can be measured in slow downloads and long uploads.

Simple diagnostics and a little troubleshooting can get to the heart of the problem fast. For little cost and a short amount of time, longstanding IT issues holding up your business can be eliminated for good.

Reducing Costs

Every business and its IT needs are unique and challenging in different ways. We look closely at what your business requires and tailor our services to eliminate inefficiencies, stamp out problems, and ramp up your potential.

Whether you are paying too much for your internet plan, wasting data on unnecessary services, or not getting the most from expensive packages, we can give you the knowledge and control to get back on track.

Many of our businesses benefit from analysis which shows the rewards cloud services can bring in day-to-day work. For a huge number of companies, this has led to significant cost savings almost overnight. Eliminating power-hungry servers, reducing equipment maintenance, and lowering your data needs can add up to big improvements.

Maintaining a Watchful Eye

By learning your systems, monitoring hardware activity, and looking after your IT on an ongoing basis, we are able to establish regular parameters for what to expect and what problems look out for in your specific systems.

With a close eye, we can aim to prevent problems from occurring even before they happen. Rising temperatures, increases in noise, and frequently occurring errors combined with powerful diagnostic tools provide us with the data we need to determine when hardware is creeping towards the end of its service life.

Using regular maintenance, we can bring down service costs with smaller routine upgrades. These changes replace big budget blow-outs that occur when catastrophic failure happens across the system.

Maintaining your reputation for never losing data, always being available, and keeping a professional attitude is more than a happy side effect.

A managed service provider can boost your IT to new heights in more ways than you can imagine. Give us a call at (416) 645-2469, (905) 667-0441 or email us today to talk about the IT problems we can solve for you.

What Can An MSP Do to Kickstart Your Business

Business today relies on technology in a way which we have never seen before. It makes up the core of almost every firm currently in existence. Today going digital impacts small companies more than large ones; it can make new opportunities possible and accelerate your path to success.

The advantages of modern technology to small business is likely to be present already within your firm, but so too are the disadvantages. Faster transactions, quicker payment, accurate inventory, and improved customer outreach serve to boost our capabilities. While complex set-up, systems management, and ever-present security threats hold us back from our full potential.

Managed Service Providers (MSPs) can eliminate the drawbacks, sharpen up your systems, and allow your business to grow to its full capacity in the modern business landscape.

What An MSP Does For You – There are a staggering number of systems a modern business is expected to keep tabs on today. Accounting, inventory, and timekeeping; on top of customer-facing services such as maintaining a website, managing social media, and processing online orders. It’s simply impossible for every small business to keep up.

An MSP is an expert in the field, managing your IT services to give you the confidence your business is on the right track. If the core of your business relied on maintaining a fleet of vehicles, you would hire a mechanic to keep each one in top condition. Building your firm on modern technology should employ a similar strategy.

For your company, an MSP exists to keep your systems in their best shape to generate maximum mileage for your business.

Tailored to Exactly What You Need – The key to unlocking near unlimited growth in your own company is to find out precisely what you need to operate to capacity. An MSP can provide consulting services to your firm to find out how your business can improve. Simple tweaks and minor changes are often all it takes to create a more streamlined, more productive, working environment.

Almost always, the smallest changes in the right places make the most significant differences. Working with technology, rather than fighting against it, provides your firm with the competitive edge to put you in control.

Technology That Helps Without Getting in The Way – An MSP can both enhance and protect your business by providing backup and recovery services that will safeguard your data and services against any disaster.

The nature of IT failures means they can appear to happen at any time. Whether hit by a natural disaster, criminal break-in, or IT outage; a severe failure at the wrong time can cost customers, money, and reputation. A high quality, effective MSP works in the background to guarantee uptime, recover from adverse events, and increase security against threats.

Technology That Keeps You in Business – A huge number of businesses, both high-profile and small owner-operated firms, have suffered massive client losses as a result of missing deadlines, losing data, or exposing their customers to unnecessary threats. Clients are often left with little choice but to choose a firm that takes their data and privacy seriously.

One of the most significant benefits to managed services is regular, predictable support costs. Making regular and fixed payments to keep your IT in good shape protects against major and unexpected blow-outs in the monthly budget.

By monitoring systems, diagnosing issues, and maintaining technology, many of the problems that cause unexpected downtime and data loss can be avoided altogether. Preventing problems before they happen saves you money, but more importantly maintains your business reputation too.

An MSP Working For You – Increasing your potential, reducing your costs, and protecting your reputation are all great reasons to incorporate a managed service provider into your business. You can effectively add a whole new department to your business without adding unnecessary management overhead.

By eliminating IT distractions that take you away from your core business, you are free to pursue activities that make your company great. Take up an MSP and return to doing what you enjoy most, the part of the firm you are great at, the reason you got into your business in the first place.

Let us do the IT we are great at, so you can build and run the business you have always wanted. Give us a call at (416) 645-2469, (905) 667-0441 or email us to manage your IT services for you.

Has Your Email Been Hijacked?

A common complaint by many users in recent months has been spam emails appearing to come from their own accounts. Despite not knowing why, reports of friends, family, and contacts receiving spam email that appears to come from them has worried many people.

Some have had their accounts suspended or shut down by their service providers as a result. For many, this experience can be highly disruptive. It’s a problem that can cause many issues in both your professional and personal life.

The key to defense is learning how these attacks happen, and figuring out what you can do to protect yourself and your contacts against them.

Hackers Using Your Email Against You

Scammers that send out spam messages are continually looking for ways to make the process faster, cheaper, and more efficient. It’s the best way in which they can make more money every day by scamming unsuspecting victims for even more cash.

One of the most efficient ways they do this is by hijacking ready-made, trusted email accounts like your own. Hackers have several tools at their disposal to attempt to hijack your accounts.

Some of the principles which make email fast and easy to use means that details, such as those in the ‘from’ field, are easy to fake. A hacker might change the information supplied to make it appear as if the email comes from anyone.

There’s not much you can do to defend your email against such an attack. However, you can work to verify that an email, even one you expect to receive, does come from the person you believe it to. If your email provider flags up an incoming email as ‘suspicious’, or ‘untrustworthy’, it may well be.

Stolen Credentials

Hackers often buy large bundles of email addresses and passwords from the dark web. Leaked emails are often put up for sale following hacks of major companies and service providers.

The value of these details comes from passwords being unlikely to have been changed, the details attached to them are trusted, and often get hackers access to additional services too.

How To Detect an Email Intrusion

It can take a long time before you’re aware that malicious hackers are using your details. You might even be the last person in your contacts to know.

The first sign to look out for is a large number of unexpected emails in your inbox. These are likely to be replies to emails you never sent in the first place. Out of office, automatic responses, people complaining about spam, and people responding to the email as if it were genuine may all come to you first.

Keep a close eye on unexpected emails appearing suddenly in either your inbox or outbox. A hacker may be spear-phishing someone that you do business with or trust. By acting as you, using your address and details, they may be able to divert payments or confidential information to their accounts instead.

Protecting Yourself Against Hackers, Attackers, And Hijackers

Sometimes your computer might have been compromised to give hackers access to your services. Malicious software may have infected your machine to steal data and infect your contacts.

Take extra care to change your passwords if you believe your email has been accessed by hacker. Use a different, more secure password for your email than you do for every other service. Your email account is often the key to accessing many of the services you use most.

Run a virus scan and maintain security updates if you think your computer could have been infected. Have your machine and services looked at by a professional if you believe there is a risk your data is being used.

If you think your email could have been hijacked, or your details used elsewhere, give us a call at (416) 645-2469, (905) 667-0441 or email us to clean up today.

Is There A Safe Way to Use The Cloud?

Cloud technology has grown to new heights in recent years. Ten years ago ‘the cloud’ was jargon almost nobody was aware of, today it is a phrase used almost daily in offices worldwide. More and more businesses today are taking advantage of the huge benefits cloud services have to offer.

The sudden and widespread adoption of this new technology has raised questions too. Some want to fully understand what the cloud is before committing their vital company data to it. Most want to find out what the cloud can do for them. Everyone wants to know, is it safe?

What Is The Cloud?

The Cloud is an abstract name for an engineering principle that allows you to store, retrieve, and work on your data without worrying about the specifics of precisely where or how it is kept. Storing your data on the cloud essentially means saving it on a server without worrying about the fine details.

Your data may be stored on a single computer, or distributed across multiple servers all around the world. Most often it’s stored across one or more data centers as close as possible to your physical location.

From the perspective of the end user, the big idea behind the cloud is that where data is stored ultimately doesn’t matter to you. Your cloud server takes care of retrieving your data as quickly and efficiently as possible.

With cloud technology, you are free to forget about the specifics and worry only about the bigger picture.

Safety In The Cloud

Many people are concerned by the idea of their confidential data being distributed worldwide. Often, people imagine small unguarded computers being responsible for vital company information. In a cloud setting, almost nothing could be further from the truth.

The reality is more like many hundreds, or thousands, of computers stacked up multiple stories in height. Data centers make storing and securing data their entire business, meaning they employ high-level cybersecurity and back it up with top of the line physical security too.

Today, digital assets are treated with security previously used only for cash, or precious metals such as silver and gold. Walled compounds, security gates, guards, and CCTV protect physical servers from unwanted access. Redundant power supplies even protect services against unplanned outages.

A modern data center is many times more secure than an office server in your own building. The difference could be compared to storing your cash in a highly secured bank vault versus a lock box on your desk.

State of the art digital security encrypts data, secures transmission, and monitors services for intrusion too.

Cloud Convenience

Storing data in the cloud means having easy access and very regular backups. Staff across the entire firm can work on documents at the same time, save files, and transfer documents without worrying about redundant copies and saving over previous versions.

The cloud acts, for your firm, as the ultimate productivity and security tool. Many firms haven’t known they needed it until they started using it.

User Security

The most significant threat to your cloud security comes from the users. Creating a weak password or reusing an old one to access your cloud services, opens up your data to easy access by hackers.

Falling for a phishing scam, or accidentally installing malicious software on your computer gives attackers the single opportunity they need to strike.

Attacking a fortified, secure data center is almost impossible. Attacking a user with common attacks and weak passwords is comparatively simple. These issues can be guarded against and prevented with staff training, awareness, and simple security tools. A simple password manager can guard against a large number of the biggest threats to your firm.

Privacy

In Canada we have the Personal Information Protection and Electronic Documents Act (PIPEDA) this legislation requires Canadian Business to protect the information they collect, store. There is also a requirement that businesses must report and notify individuals when they have a security breach that creates a real risk of significant harm to the individuals.

In today’s modern tech environment, the cloud is not only safe, it’s very likely the safest, most reliable, and most secure way to store your critical data in CANADA.

We offer a variety of cloud services to help your business. Give us a now at call at (416) 645-2469, (905) 667-0441 or email us.

Remote IT Will Create Tech That Works for You

There are few things as frustrating as IT issues getting in the way of your work. Even the simplest of problems can break your flow, ruin your productivity, and waste your time. IT should be working to boost your day instead of slowing you down.

Tripping up on a computer glitch can happen at any moment. Working to fix one can take hours. You might try a few steps that have worked before, ask a colleague for help, or try a web search to see what turns up. All of these take time from you or your colleagues, and often make the original problem worse.

When you outsource your help desk, your IT problems become our IT problems. We take charge of righting the ship to keep your tech on the right track.

Setting Up Your Business for Success

Many businesses try a break/fix model to deal with IT issues. This means waiting for problems to happen before contacting IT to resolve them. Break/fix adds costs and downtime to every IT issue as they happen. To us, this makes it an unacceptable long-term solution for business.

The process of scheduling a mutually suitable time to visit, diagnosing the issue, and resolving every issue on a case-by-case basis is massively time-consuming. Both IT technicians and in-house staff waste productive hours dealing with, often trivial, problems.

We think that time could be better spent building your business instead.

Your Personal Help Desk

When you outsource your IT help desk, you get a custom service dedicated to resolving your issues fast. Technicians with the knowledge and experience of years in IT can work without creating new problems or making the original issue worse. In modern IT, knowledge and experience is the key to successful solutions.

Many of the issues we resolve on a day-to-day basis are problems we have seen many times before on many different systems. IT is our business, and we know it very well.

How Outsourced IT Works For You

Outsourcing your IT means simply submitting a ticket to have issues taken care of. Having your own help desk to rely on means having help available exactly when you need it. Waiting on a local firm, or nearby technician to become available should be a thing of the past.

Queueing for an ‘advisor’, waiting on hold, and spelling out your problem over and over again is no fun for anyone. There should be better ways your time can be spent. There are certainly many ways firms can benefit more from ours.

Submitting an electronic ticket to resolve your issue is an easy, one step, process. Detail the problem once, email the ticket, and you can return to your work. We’ll call you back to work on a solution when the timing best works for you.

Managing Problems Remotely

To resolve system issues, diagnose, update, or maintain systems, we often log in remotely and take ownership of the problem personally. We’ve found there is little advantage to wasting time asking staff to find menus, click on links, and tell us what they see. We get straight to the heart of the problem and fix it there and then.

Problems that tie up one or more machines for a long time can be scheduled for out-of-hours, holiday, or weekend fixes. Large, system-wide updates or upgrades can be done remotely when they won’t get in the way.

For staff, updates appear to happen without anyone around to see them. You would be forgiven for thinking the IT is fixing itself.

Our golden rule is to make sure IT works for you, not the other way round. If you are wasting staff hours on hold, arranging meetings just for your tech, or structuring your day around simple problem solving, your firm could be upgraded in a flash.

Call us at (416) 645-2469, (905) 667-0441 or email us or just submit a ticket and we’ll sort out the rest.

Don’t Fall Victim to Webcam Blackmail

Many users have reported recent scam messages from individuals claiming to have intercepted their username and password. These messages often state they have been watching your screen activity and webcam while you have been unaware.

Typically, attackers threaten to broadcast footage to your contacts, colleagues, or social media channels. Demanding payment in Bitcoin, malicious hackers blackmail their victims to keep confidential information private.

Where Have the Attacks Come From?

In many cases where hackers have claimed to have a victims’ password, this has turned out to be true.

In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their users. LinkedIn, Yahoo, and Myspace all suffered massive and devastating hacks. Some users of these services are still feeling the consequences today.

The details leaked from these sites, and others facing the same issues, are sold online for years after the initial breach. Hackers buy username and password combinations in the hopes of reusing them to access services, steal money, or blackmail their owners.

How to Respond

If you have been contacted by one of these hackers, it is a scary reality that they could have access to your credentials, data, and online services.

The only thing you can do in response to this type of email is to ignore it. This “we recorded you” email is a scam made much more believable because they probably do have one of your real passwords gained from a site hack.

That said, accounts that share the same password should be changed immediately. Security on additional services you use should be updated too.

Self Defense On the Web

When using online services, a unique password for every site is your number one defense. A good password manager makes this practical and straightforward too.

Using a different password for each site you use means that hackers can only gain access to one site at a time. A hack in one place should never compromise your other accounts by revealing the single password you use everywhere.

Often, people think that maintaining many passwords is hard work or even impossible to do. In truth, it’s almost always easier to keep tabs with a password manager than it is to use the system you have in place today.

A high quality and secure password manager such as LastPass, or 1Password, can keep track of all your logins efficiently and securely. They often offer the chance to improve your security by generating random and strong passwords that hackers will have a tougher time cracking.

Password management services offer a host of features that help you log in, remind you to refresh your security, and make your safety a number one priority. After using a manager for just a short time, you can be forgiven for wondering how you managed without it.

If you think you might have been hacked already, or want to prevent it from ever happening, give us a call to at (416) 645-2469, (905) 667-0441 or email us to update your security.

Don’t Get Hooked by Spear Phishing Attacks

Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used.

A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a phishing attack captures the login details you enter so an attacker may use them to enter the genuine service later.

By sending out tens of thousands of emails at a time, attackers can guarantee that even if only one half of one percent of people fall for it, there is a lot of profit to be made by draining accounts. Spear phishing is a more modern, more sophisticated, and far more dangerous form of the attack. It’s typically targeted at businesses and their staff.

A Convincing, Dangerous Attack

While a traditional phishing attack throws out a broad net in the hope of capturing as many credentials as possible, spear phishing is targeted and precise. The attack is aimed towards convincing a single business, department, or individual that a fraudulent email or website is genuine.

The attacker focuses on building a relationship and establishing trust with the target. By building trust and convincing the target that they are who they are pretending to be, the user is more likely to open attachments, follow links, or provide sensitive details.

Consider how many times you have followed a link or opened an attachment just because it has come from a contact you have trusted before.

A Trusted E-mail

The malicious email can appear to come from a vendor you deal with regularly. It may even look like an invoice you are expecting to receive. Often attackers can simply substitute the vendors’ banking details for their own, hoping the target will not notice the difference.

Such an attack is very difficult to detect. It takes a keen eye, strong working knowledge, and constant awareness to keep your company protected. Even a single small mistake by an unaware member of staff can compromise your business accounts.

Defending Your Business

The key to stopping a spear phishing attack is education. Learning attack techniques, and how to protect against them is the single biggest thing you can do to enhance business security.

Whenever you deal with a vendor in a business transaction, you should always consider important questions before proceeding. Are you expecting this email? Is the vendor attempting to rush you into a quick decision or transaction? Have you checked all the details are correct and as you expected? Sometimes a simple query to the vendor can protect you against worst-case scenarios.

In many cases, a phishing attack can be halted in its tracks with a strong IT security package. Web filtering prevents malicious emails and links from entering the network, shutting attacks down before any damage can be done.

Good Security Practice

As with many types of IT threat, good security practices help mitigate damage. Locking down security to ensure employees only access the systems they need helps to prevent damage spreading across the network.

Enforcing unique and strong passwords prevents leaked credentials from affecting systems related to the one that has been compromised. Getting employees set up with a password manager and good security policies can do the world of good to boost your security to the level it needs to be.

Give us a call at (416) 645-2469, (905) 667-0441 or email us to audit your security practices. It could be the difference that secures your firm against sophisticated spear phishing attacks.