Recent Blog Posts

Tip of the Week: Keeping Peeping Eyes Out of Your Webcam

Keep Your Software Up to Date To spy on you through your webcam, a cybercriminal (which is what that person would be) needs to have access to it. This can be as simple as simply hijacking an insecure program that has already been granted this desired access. Keeping your software up to date helps to eliminate the likelihood that the hacker will have that opportunity, from the programs and apps you have installed to the operating system itself. When working on a PC, navigating to Settings and to Update & Security will bring you to the option to schedule your Windows Update. Rather than being interrupted mid-workflow, you can Change active hours to have these updates implemented after hours. Maintain a Firewall When it comes to keeping unwanted guests out of your network, a firewall is one solution you certainly need to prioritize. Making sure it is up, activated, and effective is a relatively simple process. In Settings, once again under Update & Security, you should find Firewall & network protection in the left sidebar. The menu that opens when you click it will offer Windows Defender Firewall, one rudimentary way to stave off threats. This is a good enough solution for home users, but businesses will want to deploy an enterprise-level firewall that is designed to protect every facet of their network. Securing Your Wi-Fi It isn?t uncommon that attackers will target your network via the router, rather than the computer that uses it to connect to the Internet. If they can access this piece of your network infrastructure, there?s a considerable list of devices they?ll then be able to access. Better securing your router equates to better securing your entire network. The first step is to rename your wireless network to something that doesn?t tie back to your business and lock it down with a strong, complex password. You?ll need to remember it, of course, but using a passphrase with some added symbols and alphanumeric switching will help keep it memorable to you and bamboozling to cybercriminals. Cover Up Your Webcam If you?re really and truly worried that someone may be peeping at you through your webcam, the simplest way to prevent the possibility is to simply obscure their view. Covers are available to make it simple to ?deactivate? the camera when it is not needed, and in a pinch, a sticky note will do the job just fine. Privacy always needs to be prioritized, in the office, the home, and in the home office. For more tips, practices, and advice on keeping your data secured, make sure to check back on our blog every few days.

Cyberattack Discovery Time is Decreasing (But This Isn?t All Good News)

Let?s explore this trend, and what it implies for your cybersecurity. Understanding the Concept of Dwell Time Dwell time is the term for the duration that a cyberattack is present on the network before it is detected. According to figures compiled by Mandiant, their researchers have found that the median dwell time around the world is 24 days. This number continues a decade-long trend of shortening dwell durations, with 2011 seeing a median dwell time of 416 days. So, over the past ten years, the median dwell time has shrunk to about a fifth of what it once was. On the surface, this sounds great? and it makes sense, too. Organizations are investing more into their cybersecurity, so their policies are better and they are simply more able to detect threats. Therefore, cyberattacks aren?t spending nearly as much time on a network before the infiltrated business becomes aware of them, so the damage they can do should be limited? right? As much as we?d like to wrap this blog up right here and say ?Right, and here are some best practices to follow?? we can?t. The situation is just a bit more complicated, and those complications are important. The Shifting Threat Landscape Plays a Role Here?s the thing: as the dwell time that cyberattacks spend on a network undetected has shrunk, the methodology behind the attacks?more specifically, the type of attacks commonly being used?has shifted. Nowadays, ransomware plays a much larger part, increasing from 14 percent in 2019 to 25 percent in 2020. Ransomware (the malware that locks down a targeted system and demands payment to release it) has a much shorter dwell time than most other attacks. Taken as a group, other attack methods had a median dwell time of 45 days. Ransomware: just five. This difference is what contributed to the overall median dwell time of 24 days. So, these shorter dwell times can be attributed to ransomware intrusions progressing to full-scale attacks much more quickly. Ransomware Has Gotten Worse Unfortunately, a business? troubles don?t end there. In addition to these accelerating attacks, hackers have grown more aggressive. This has translated to higher ransom demands, as well as the unsettling development of so-called ?multifaceted extortion??where the attacker threatens to also publish the data they steal if payment isn?t made. Other Attacks Are Still Prevalent, Too Businesses still need to worry about other methods of attack as well. For instance, exploits (codes that take advantage of programming bugs or other vulnerabilities) have risen in popularity again as a way for an attacker to first get into a business? network. They?re now seen in 29 percent of intrusions, as compared to phishing attacks and their 23 percent prevalence. Other commonly used tools included misused tools meant to provide security teams with the resources needed to run their evaluations. These backdoors were found in 24 percent of incidents. Moreover, privately-developed malware?the kind that makes responding to a security incident more challenging?was seen in 78 percent of attacks. This Is All Concerning, So Your Business Needs to Prepare Accordingly How do you do that? Proactively, and keeping in mind that the modern threat landscape is just too diverse to be covered by a single, simple fix. The measures needed to respond to each are all very different. If you?re finding this to […]

The Pros and Cons Remote Work Has to the Environment

Let?s begin by looking at some of the positives to remote work, in terms of the environment. Environmental Benefits of Remote Work Diminished Fuel Demands and Emissions According to the Environmental Protection Agency, transportation is the largest source of greenhouse gas emissions, and that such emissions increased by a not-inconsequential 3.7 percent from 1990 to 2019. Furthermore, the U.S. Energy Information Administration reported that 2019 also saw 142.71 billion gallons of gas burned. If you?re reaching for a calculator, that?s an average of around 390.98 million gallons per day. Consider, for a moment, how much of a difference it would make if we could remove a large portion of that expenditure by adopting widespread remote work. If just 3.9 million people worked from home for half the time, the reduction in greenhouse gases would be akin to taking 600,000 cars off the road for a full year. Back in 2015, Xerox implemented a telework strategy, cutting 41,000 metric tons of emissions and saving 4.6 million gallons of gasoline. On a related note, a remote workforce also allows a business to decrease their use of energy in terms of climate control and lighting?which often (but not always) means that less energy is being used to control a large space as compared to a smaller one. We?ll dig into this further a little later. Cleaner Air On a related note, there are various benefits associated with fewer emissions that remote work can help to promote, reducing the level of air pollution a common thread between them. A study taken in London in the midst of the COVID-19 pandemic revealed that emissions reduced by 25 percent during the morning commute and by 34 percent in the evening. This is not nothing. Decreasing the amount of air pollution also decreases the amount of acid rain that occurs, makes algae blooms (sudden increases in algae in water systems that kill off the local biome) less likely, and helps to support our own health. Decreased Waste Did you know that the average American uses, on average, 680 pounds of paper each year, and that the world produces 300 million tons of plastic in the same span of time? Working from home, however, helps reduce these levels by encouraging the use of paperless solutions, while simultaneously creating an environment that relies less on single-use plastic products and more on sustainable methods. However, now that we?ve gone over the major environmental benefits, we?d be amiss if we didn?t address the problems that remote work introduces as well. Environmental Issues in Remote Work Energy Mismanagement Okay, so remember how we discussed how a remote workforce allows a business to use less energy to keep its workspace climate under control? Here?s the problem with this: research conducted in the United Kingdom reveals that?at least in the winter?the energy used to heat the office was less than the total it took to heat each remote worker?s home. As a result, working from home could in this way be counter-productive, environmentally speaking. That said, most people keep their homes fairly livable even while they are at work. Global Inconsistencies There?s a lot to dig into here, so let?s start by laying out the groundwork: different regions around the world produce and use their energy in very different ways, creating different environmental scenarios […]

Looking Into the Growth of Digital Services

The coronavirus outbreak enhanced the demand for services and increased the likelihood that smaller businesses would consider them. Over a year later, it seems that the innovation that experts predicted was going to happen over the course of the next three or four years, accelerated, and now businesses of all sizes are operating over the Internet.  Internet-Based Companies For quite some time there have been companies that operate solely over the Internet. Of course, retail companies come to mind when you think of ?Internet business?. Amazon, eBay, and the like have made billions of dollars without the use of any storefronts (ironically, however, now they have some). Besides these retail behemoths, many other businesses moved their way online in efforts to open new revenue streams and tap untapped markets.  Over the past several years we?ve begun to see a paradigm shift toward digital services happen pretty rapidly. Financial services were one of the first service providers to really embrace the benefits of providing online services, but they weren?t the only industry looking to make the whole new digital ecosystem work for them. The truth is, however, where money goes, everyone follows. The Growth of Digital Systems As mentioned above, the COVID-19 pandemic did the one thing that no other event could have done. It brought those companies who were reluctant to embrace the digital transformation into the fold; and many of those companies that came late to the party are extremely unprepared. While these companies scrambled to migrate their information systems and strategies over to ones that can be accessed online, other companies, who got out in front of this were well-positioned to succeed during these times. Even some companies who weren?t wholly prepared, but were able to transition to digital-only by already using cloud-based software and hardware, were able to flank slower-moving competitors.  Additionally, many smaller businesses that didn?t have the liquidity to hold up against the tide of decreased consumer demand, found themselves closing their doors. Unfortunately, this was the fate for over 100,000 U.S. small businesses in 2020. This major crisis was always going to have a marked impact on SMBs, but seeing so many businesses failing, and the entire economy in a major downturn, you can?t help but think that if it wasn?t for the Internet, the whole world economy would be in tatters.  The one thing that digital systems accomplish is that they can sustain mission-critical business processes while the workforce is in flux. Part of a business? strategy at this point is to cut redundant and unnecessary costs and the digital transformation of a business can help do that in ways that could save millions of jobs and tens of thousands of businesses. One could make the point that businesses that are looking to cut spending should still be pushing money toward IT because it?s the most cost-effective way to keep from compromising business health.  What Digital Systems are Being Used? With all that?s happening, one question that has to be answered is: ?what digital systems are being used by today?s businesses to keep from going belly up?? It?s not as easy as telling you which tools you need to use as it is to explain why certain tools can be useful. As we mentioned above, the digital tide was already turning before the […]

Tip of the Week: How to Share Documents in Google Drive

Document Sharing This is the foundation of any collaborative process: the capability to share a file and allow others to edit it. Google Drive provides you a few means of doing so: From My Drive, click one of your various documents to highlight it and click on the Share icon in the toolbar at the top-right of the page. Right-clicking the document and selecting Share will provide you with the option to do so. Google Drive?s assorted applications, like Docs, Slides, and Sheets, each feature a prominent Share button at the top of the page. Each of these options pulls up the same window: The Share with people and groups panel. Let?s examine the options that this panel provides. The ?Share with people and groups? Panel This panel allows you to select who can access your document, and what they can do with it afterward. As a result, it is simple to share with anyone from a single coworker to an entire department?all you need to do is type in the appropriate name or email address, add a quick message if needed, and determine the access you?re granting: Editor??Someone with editor-level access privileges can make whatever changes to a document that they see fit, as well as extend permissions to others to share the document in question. Commenter?A commenter has much more limited capabilities, as they are not able to directly change the content of a given document or share it out, but they can leave their feedback and suggestions for an editor to review and approve or deny. Viewer?A viewer can read through a document but can leave no feedback or send it along to others. You can also adjust these settings even more, taking away or adding capabilities as you need to (or even taking away permissions entirely). In the Share pane, click the field that specifies the user?s access and make the changes you need to. From there, you can set an expiration date to their access to match your needs. The Share pane also allows you to generate a link that allows your document to be shared that way. Under Get Link, you can select the option that gives anyone with the link the appropriate privileges, whether that be edit access or the ability to comment. This access can be removed whenever you need it to be. Determining Which Documents Have Been Shared Finally, Google Drive also simplifies the process of establishing which documents have had their access shared. A small icon will appear next to the filename that looks like two silhouettes, so long as you aren?t working in Grid view. Hopefully, you now have a better idea of the capabilities that Google Drive offers in terms of collaboration. There are plenty of other ways that your business? IT can help to facilitate teamwork, too, so give us a call at (603) 889-0800 to learn more today.