ComTech Computer Services, Inc - Technology Services and Support - Temple, Texas

Protect Your Data, Protect Your Business

Robert Vander Meiden

Robert Vander Meiden

Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances.

This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information.

Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free.

Today’s SMB Needs a Robust Security Plan

Everyone in the office loves Eric. Sporting a different ironic t-shirt everyday, Eric is the one we call when technology spits in our face. Whether it’s a slow system, a bug that needs to be squashed, a website issue, or a crash that results in unexpected downtime and data loss, Eric is right there. Not only does he get to the bottom of any issue but he also rights the ship like he’s some sort of miracle-working captain who just happens to have a pretty wickedly funny Peter Griffin from Family Guy impersonation.

But business is growing and Eric is overworked. Eric has certain skills that you’d love to use to develop innovative applications and revenue-generating projects-- but he’s too busy running around fixing things that break. Or he’s performing the most mundane and routine tasks day-in-and-day-out just to keep things secure and running smoothly.

There has been a lot of hype about cloud computing transforming the way small-to-medium sized businesses do business. Proponents of the cloud say that cloud computing has leveled the playing field, allowing SMBs to finally compete with bigger companies despite their limited financial resources and staffing.
Still, many are apprehensive to make the jump. They’re hesitant to give up control and they fear the cloud will expose them to greater security risks. Moving to the cloud definitely requires a leap of faith, but a recent ComScore study, completed on behalf of Microsoft, suggests that those who are froggy enough to take the leap (sorry) have no regrets once they do.

In fact, more than half of those surveyed wish they had adopted it earlier and feel that the benefits far outweigh their initial worries.

What are those benefits?

Monday, 02 April 2018 00:00

5 Ways SMBs Can Save Money on Security

Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take.

  1. Prioritize – Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a network, or prevent access to certain applications, how disruptive would it be to daily business operations? What kind of potential threats or vulnerabilities pose the greatest risk to the company or your customers/clients? Focus on the most likely risks, not theoretical risks that “could happen.” Asking such questions gives you a clearer more complete perspective as to where to focus available security resources.
  2. Develop and Enforce Policies - Every SMB needs to implement a security policy to direct employees on appropriate and inappropriate workplace behaviors relative to network, systems, and data security. Merely drafting this document isn’t enough. Employees must be held accountable if they fail to adhere to policy. Such policies should be updated regularly to reflect new technology and cultural shifts. For example, a document written before social media took off, or before the BYOD (Bring-Your-Own-Device) movement, doesn’t necessarily apply today.
  3. Education - Ongoing end user training must be provided. Many security breaches happen because employees fail to recognize phishing schemes, open emails from unknown sources, create poor passwords that are seldom changed, and don’t take proper precautions when using public Wi-Fi connections on personal mobile devices also used for work.
  4. Take to the Cloud - Running applications and servers in-house is a costly endeavor. Leveraging the cloud today allows SMBs to cut costs while also strengthening their security. Cloud operators typically have built-in security features, alleviating SMBs of the burden of maintaining security themselves.

Today, not only can SMBs shift much of the burden of IT to the cloud, but they can also outsource much of their security by taking advantage of the remote monitoring, maintenance, and security tools provided by Managed Service Providers (MSPs).


Don’t Aim for Perfection – There is no such thing as perfect security. Striving for perfection is expensive and can prove to be more costly in the end. Improving protection and response would be a more ideal allocation of funds. It can take a hacker several months to figure out your systems and do real damage. Having the ability to quickly detect their presence, and mitigate any potential damage they may cause, is a more realistic and less expensive approach than thinking you can completely remove any probability whatsoever of a hacker breaching your system.

Whenever we as humans use the computer, or go to a website, we expect it to just work. We expect the computer is going to turn on and boot flawlessly, that the webpage is going to open without problems. We expect our files to always be right where we left them at all times. We believe that to be a dangerous comfort zone, just like anything else in this world, everything decays, everything ages. It’s not an ‘If this will happen’, it’s a when.

Tuesday, 13 March 2018 00:00

World Backup Day (March 31st) 2018

 March 31st has been set aside as World Backup Day

World Backup Day is a day for people to learn about the increasing role of data in our lives and the importance of regular backups.

 

Questions were raised last year about whether FBI agents were actively recruiting technicians at Best Buy’s Geek Squad to search for illegal content on customer devices. According to newly released documents, however, prior reports only scratched the surface: Best Buy’s ties with the FBI appear more complex than once surmised.

The existence of the Geek Squad informants was first revealed via the prosecution of a California doctor named Mark Rettenmaier. After Rettenmaier sent his computer to Geek Squad for repair in 2011, technicians working out of a massive Kentucky repair shop discovered thousands of images depicting child abuse on Rettenmaier’s device. Court filings later revealed that there were “eight FBI informants at Geek Squad City,” and a number had received $500 to $1,000 payments in exchange for acting as confidential sources.

It was unclear at the time how much Best Buy knew about the arrangement. However, documents recently acquired by the Electronic Frontier Foundation—which last year sued the Justice Department under the Freedom of Information Act after the FBI denied the group access to records—show that Best Buy has, at least at certain times, maintained a relationship with the feds, at one point hosting a meeting with the FBI’s Cyber Crimes Working Group at its Kentucky repair facility.

Outsourcing your IT services can lower your expenses and give you access to today’s most advanced technology. These are common reasons why businesses large and small choose outsourced IT providers. However, there are pros and cons of outsourcing. For instance, while you can definitely lower your costs, you also lose control of one area of business that can significantly affect your daily operations.

IT Service Provider

A recent study conducted by the Everest Group revealed that 48 percent of all business owners are unhappy with their current IT service provider.

In spite of the drawbacks, many of today’s small business owners see the value in outsourcing their IT infrastructure. However, the most discriminating business owners do quite a bit of research before selecting an IT service provider. This practice is highly recommended. It helps you avoid companies that don’t provide value-added services and are only in it for the money. Business owners need to know some very important things about their IT provider before ever signing a contract.

In spite of extensive research, business owners and managers still find themselves in relationships with IT service providers who simply aren’t doing their jobs. This can be a troubling area that fuels a great deal of frustration among business members.

Why Stay in a Bad Relationship?

Given that choosing a new provider is such a big deal, small business owners have been known to drag their feet when it comes to searching for a better IT provider. We all do that. We tend to think that a business relationship will improve if we just give it time. But eventually, that gnawing feeling in your stomach gets the best of you and you begin to ask your colleagues how they like their IT service provider.

After they spend ten minutes raving about their optimized infrastructure, you have to finally admit that it may be time to break up with your current IT service provider and look for greener pastures. It happens to all business owners and often it results in your company getting much stronger managed IT services for about the same money. Instead of dreading the process, why not dive in? What have you got to lose? Just be sure it’s time to take that leap.

Below, we go over seven effective ways you can tell whether you need to hire a new IT service provider:

One: Are They Proactive?

For an organization to be successful, critical goals of all team members involve a shared investment in its future. Is cybersecurity a shared priority?

Cyber Security Trainng

How invested is your team in the success of your company? How careful is your team when it comes to network protection and cybersecurity? How aware are team members of your security protocols and risks? Basic information assurance training is no longer effective as a means of self-awareness and protection, nor is it a reliable indicator of the level of awareness of your collective team.

  • What is information assurance? Processing, storage, and transmission of information (data) involve systems – and risks. Information assurance is the practice of protecting this data and these systems to ensure its security and to minimize risk.

It’s no longer enough to include a combination of letters and numbers in your passwords. Today’s sophisticated cybercriminals have an arsenal of tools that can crack a password in a matter of moments, and we need to be far more vigilant with our data.

What is the greatest threat to every organization in the world? It’s no longer the threat of someone picking a lock or breaking a glass window to get inside an office building; the only assets to gain are low-end computers that burglars can’t re-sell quickly. To say cybercrime is on the rise is the proverbial understatement of the year. Cybercrime tools and services are being marketed on the Internet – and there’s little we can (successfully) do to stop it at the grassroots level.

Cybersecurity facts you might not already know, that are affecting you right now and what you need to know to protect yourself and your business.

Cyber Security

With the benefits of the Internet came negatives as well, like one of those group bundles that you have to buy together. In order to protect yourself from the negatives of the Internet, you need to know the cost of cybercrime, and how it can impact your business. These are 5 startling statistics about cybersecurity in 2018 and what they mean for companies of all sizes

Cybercrime will inflate to $6 trillion

Cybercrime will cost us $6 trillion annually within the next three years, which is twice what we paid in 2015. The Wall Street Journal estimated that the cost of cybercrime in the U.S. in 2015 was $100 billion. With cybercrime growing at this rate it is essential to ensure that your cybersecurity is rapidly progressing as well. This is more than the amount of money we spend combating all illegal drugs combined, which is a whopping $44 billion, just this year. In 2017 WannaCry ransomware worm held companies, large and small, to more than $100,000 in ransoms.

Cybersecurity costs are similarly inflating

Page 1 of 45