Cyber Security – It’s Not A Choice Anymore … It’s Necessary!

Malicious attacks have spiked throughout the years and cyber security has been discussed in so many ways.
Throughout the pandemic and employees working from home, companies have been targeted and attacked with many different methods.
Hackers don’t take a day off, so we’re here to help you stay protected.

Malicious Attacks – How Often Do They Happen?


According to Embroker, in 2021 cyber attacks happen every 11 seconds. That has increased through time, but it will continue to rise through time. It was said that in  2020, 155.8 million individuals were affected by data exposures …

Impact and Severity of Cyber Attacks

Cyber attacks can impact businesses and organizations in many ways – from minor disruptions to financial losses. Every consequence leads has some form of cost. Malicious attacks can impact your business weeks, if not months later.

Your business may suffer in these areas:
Financial losses
Loss of productivity
Reputation damage
Legal liability
Business continuity problems

Costs of Cybercrime

According to the FBI, the cost of cybercrime in the US was $3.5 billion in 2019, as stated by Colbalt. The cost could be much higher if it remains unnoticed. In 2020, the average business cost of a cyberattack is $3.86 million and it takes over 200 days to detect the breach (IBM). Statistics show that cyberattacks projected to hit $6 trillion in annual loss in 2021, which has doubled since 2015. (Cybersecurity Ventures).
Cybercrimes can cost enough to shut down small businesses if it remains unnoticeable or the malicious attacks are not safely resolved.  The average ransom demand is over $100,000, which continues to grow over time. Over a third of all companies attacked with a ransomware attack, end up paying that price, resulting, on average, in a 16-day downtime for the attacked firm. The percentage and increase of cost continues to rise through the years as hackers continue to learn and grow.

How To Prevent Malicious Attacks

Here at PCS, we help you with all your cyber security needs. With Managed Endpoint Protection/Next Generation Antivirus, Advanced E-mail Security/Phishing Training, and Multi-factor Authentication, it would be a challenge for malicious attacks to happen.

For more information or to make sure your company is protected, contact PCS!

Data Loss – What Is It and What Can You Do To Stop It

Data Loss
What exactly is it?
How can you avoid it?
We’re here to go over everything you need to know about preventing data loss to help keep your information safe!

What Is Data Loss?

Data loss is exactly what you think it is. Whether your information/back-ups are accidentally or maliciously deleted from your system, important data is lost. This might happen when a malicious internal user gains inappropriate administrator privileges, or when an external party seeking to do damage to your company’s reputation hacks into your system. It could be thanks to poorly configured backup jobs or other settings. In addition to these human causes, hardware failure or theft can also account for data loss.

What Can You Do To Protect Your Data?

iland is a cloud service provider of secure and compliant hosting for Backup as a Service (BaaS).  iland’s Insider Protection, guards you against straightforward deletion of all backups and even more sophisticated attacks. The service will assure that a copy of your backup is always available!

Internal or External Threat Protection

Insider Protection enables you to recover a full backup of deleted data! Instead of deleting your backup files, hackers may choose to corrupt or encrypt your backups. This would replace any recovery points you may have causing you to instead use damaged backups. With Insider Protection you will have access to backups that the attackers did not, giving you the confidence you need during a disaster recovery event.

How It Works and How To Recover

With iland Insider Protection, backup files that were deleted maliciously or accidentally are kept in an air-gapped directory. This directory will only be accessible to iland technicians! Backup files that were deleted will remain in this isolated folder for seven days and can be saved to be transferred back to you once you are ready to restore data. Your files will not go away until after seven days of isolated storage.

If you fall victim to a breach like a ransomware infection, the data protected by iland would be untouchable and could be trusted to restore critical data after an attack, easing your mind and reducing your downtime.

 

Contact your PCS Account Representative today
to add this increased security to your current iland cloud storage!

Data Breach – How Can It Happen And Ways To Avoid It!

It seems like recently, we have been hearing a lot more about how businesses have experienced data breaches.  But how did the hackers get into their systems?
We’re here to tell you different ways that hackers can get into your companies information and how to prevent it!

1. Weak and Stolen Credentials (Passwords)

Weak passwords are the easiest way for malicious attacks to happen to your company. They allow hackers to ease their way into your system faster than you could imagine. Having strong and secure passwords that change every 60-90 days will greatly decrease the chances of these attacks.

Password Managers can help store, generate, and manage your passwords for local applications and online services. They assist in generating and retrieving complicated passwords, storing the passwords in an encrypted database, or calculating them on demand.

2. Phishing Scams

Email has been used more for business throughout the years. Hackers have found a way to gain access into your information by creating email that impersonates those that you would receive every day, perhaps even from company executives. Phishing emails are scams that target a specific person/company. Having email security will help identify threats to make sure you keep your companies’ information safe. Identifying email threats will also help to keep your personal information and accounts from being hacked. Knowing what types of email are threats can make a big difference to you and your company!

3. No VPN/Secured Wi-Fi

Not using a VPN service, or logging into an unsecured network can allow hackers to gain access to your business data! Allowing your data to travel through an unsecured network gives access to someone who is using the same network, or even a hacker who is trying to gain access to information you were retrieving on your devices. Once you connect to an unsecured Wi-Fi network, your information is vulnerable. Make sure to use your VPN service, or log into a secured Wi-Fi when trying to access important information. These steps create an extra layer of security, helping to avoid malicious activity, and making it more difficult for your data to get into the wrong person’s hands.

4. Running Updating Operating Systems/Applications

If you’re still running Windows 7 or haven’t updated your applications … STOP HERE AND READ!! Using outdated software and applications can lead to system vulnerability. Microsoft confirmed that Windows 7 will no longer be supported for security updates or technical assistance. If you’re running an outdated operating system, you’ll open your company up to known hacks, malware, viruses and other potential future security flaws.
For example, any Google Chrome versions prior to 91.0.4472.114 may have vulnerabilities that allow attackers to execute arbitrary code in your browser. Having an outdated application or web browser could lead to malicious attacks within your systems, targeting all the information that hackers want to get their hands on. An attacker could view, change, or even delete data if they have the access to do so.
Try to keep track of everything and make sure you install all your software updates as new ones come out. It will help reduce system vulnerabilities and from being a target of a data breach!

Malicious attacks can be avoided if you take the proper steps. A VPN Service, Email Security, Password Manager, Multi-Factor Authentication, and up-to-date software will help keep your system protected and secure!

Want to make sure you’re protected and taking the right steps? Contact PCS for all your cyber security needs!

The Dangers of Direct RDP Access!

Direct RDP Access Used To Be So Common That Now It’s Become More Dangerous.

Did you grow up leaving your doors unlocked and your cars unlocked?
I bet you didn’t have to worry about intruders coming in.
Come to think of it, I don’t think I see it anymore.
Direct RDP access is just leaving your door unlocked for an intruder to come in!

Let’s go over why direct RDP access is dangerous.

What Is Direct RPD Access

The Remote Desktop Protocol (also known as RDP) is used to allow remote access to a computer.  Once you log into a computer, you are able to access everything the way you were able to working on the desktop. RDP is very easy to use and widely implemented. Remote Desktop even comes built-in to most versions of Microsoft Windows.  When it is used within a private network, it’s a very strong business tool. Unfortunately, it’s not secure enough to safely expose to the Internet.

What Can Happen With Direct RDP Access

Hackers are able to get into the information easier than you think.  They can target a specific business and they can act as an employee to gain access to administrative accounts.  Once they gain access, it gives them leverage to steal data, destroy data, install malware or ransomware, or even just staying under the radar and using the resources to host their own services or use as an intermediary to commit other crimes.
Most common is seeing employees getting locked out of their systems/accounts as a hacker forces access with their password.  Then the damage is done and a data breach has occurred.

What You Can Do To Prevent This

As we used above, the easiest way to avoid this is to simply close the door!  Closing down the ports to RDP and reduce the attack. There are so many different tools and protocols that can be used to provide businesses with the safety they need with secured access.

A few examples are as followed:
Setup VPN (Virtual Private Network) that must be connected first before using RDP.
Using a multifactor authentication mechanism can be implemented to augment traditional password authentication.

Another way to prevent a data breach from occurring is to contact your IT company for them to setup everything for you and your company that will keep your business safe.

Close the door and lock it so hackers can’t get in! Avoid intruders!

For more information or you want to get your company on the right track to safety, contact PCS!

Cyber Training … Why Is It Important?

Cyber security is one of the most important things in today’s technology world. 

From data breaches to just taking someone’s banking information, hackers are now being more creative with their tactics. But, there are plenty of ways to always stay alert so you can keep on top of any security threat.

Cyber Security Training

You hear this term a lot and it’s something that has been harped about … But why is it so important?

The workplace has evolved throughout the years and technology has been a big party of that transformation. Adding in the risk of having someone come into your personal information and even company data means workplaces need to have more security.  Firewalls and anti-virus protections are simply not enough for hackers.  Hackers have been more creative with their tactics and scams that now everyone needs to be more alert!

Having the ability to know what is a threat and what is just your daily routine is important.
|Cyber security training can help you recognize different types of threats using simulators and common hacker moves.

If you can’t recognize emails, links, or even phone calls, you can be potentially putting a company at risk for a data breach.
You always want to be alert with any email that is coming to you!

 

Having the ability to be one step above a hacker is challenging. One way is by having simulations will help you see the different kinds of attacks and how you can prevent your company from having a data breach and/or information deleted/stolen.

In 2020, there was an estimated amount of 1001 cases.
That’s 1001 cases that could of probably been avoided if companies has cyber security training.

Data breaches are getting worse and users are not aware of the risks!

Employees are often the primary targets for hackers looking to get into critical business systems.
Rather than trying to breach a secure network or system through external means, it’s much easier for hackers to pretend to be authorized members of a company while they inflict their damage from the inside and do so undetected.

Sadly, many employees don’t even realize how important cybersecurity training really is for the organization they work for.
Even worse, according to a survey of over 4,500 employees, 22% of employees don’t feel like they should be obligated to keep their employer’s information safe.

Employees handle the information on an everyday basis, so a hacker will come to them first before anyone else. Internal attacks are easier.

Don’t wait to get cyber security training. You could not only protect the company, but you can even protect your own information!

For more information about Cyber Security training, contact PCS today!

Keep Your Information Safe From Hackers!

We always try to make it harder for hackers to get into our information. Hackers don’t want to work too hard to get information.
There’s a few different things that can help keep your data safe and protected, but one easy way to do it is  …

Multi-Factor Authentication

Multi-factor authentication is an electronic authentication method that a device user is granted access to a website or application only AFTER successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something only the user knows), possession (something only the user has), and inherence (something only the user is).

Having multi-factor authentication makes stealing your information harder for the average criminal. If your information is hard to get into, it becomes less enticing to the average hacker and makes them move on to the next person.

Multi-factor authentication adds a second or third (or more) factor to the login process for company resources (apps, services, servers, etc.).  You can use multi-factor for banking accounts, emails, any sort of company program that has valuable information, and even email!

Having a hacker try to get into your information should be a challenge for them! Not having your information backed up by different security could lead to deleted information or even a data breach that could potentially lead to danger within your company or even for yourself! I know … It’s hard to think that you can’t just get into an app or even a site without having to use a code to get into it, but once you do it for a while it feels like second nature! You’ll be thanking yourself for it and happy you went with it.
Hackers are only getting more advanced with their strategies to get into your personal and company information.  Finding different strategies and approaches will help you continue to keep your data safe.  With multi-factor authentication, you are able to use security codes, questions, tokens, and other ways to make sure you are the only person able to get into the system and having access to the information.

There are a few different products out there that can help you get started, but talking to your IT company will help you see what is best for you and your company!

Always remember … The more a hacker needs to try, the less enticing your information is!!!

If you need more information or you are looking to start multi-factor authentication for your company, contact PCS today!

What Happens If Your Business Experiences A Breach?

“My business is experiencing a breach!”

This statement is something you NEVER want to hear.  But, there is a solution to avoid even thinking about it and we’re here to tell you about it.

The Critical Incident Response Team is here and ready to take on all your emergency IT needs.

Emergency IT help should be no more than a piece of mind.

Usually those two things don’t go together in one sentence.  Here at PCS, we provide live 24/7 help for you and your business so there is no waiting!

The Rapid Response Field Service comes with a variety of features that you will love.

 

support staff working on his computer

All solutions are 100% customizable with no lengthy contracts. With PCS, you get the attention and service you require. This means you never get stuck paying for something you don’t need or being talked into a lengthy agreement for services you’ll never use. Instead, PCS gives you the attention and service you require. That’s why you’re never locked into a contract with PCS.

We provide Remote Monitoring and 24/7 Remote Support.  You should be able to sleep knowing that your servers are always up and running. We catch the issue before it even occurs.   For a fixed and affordable monthly rate, PCS can perform remote monitoring of your network, hardware and software so you have the advantage of being proactive instead of reactive to IT issues.

When you have a question or feel like we missed something, we are ready to respond whenever you have an issue.  At PCS, we know that issues don’t only occur during business hours, but at the most inconvenient times.  Our well-trained IT consultants are ready day and night to respond to all your needs. Don’t wait until business hours to try to solve your problems, it’ll be too late! PCS is here for you.

Convenience is key and we’re here to provide!

For more information or need assistance, you may reach us at our website or by emailing rapidresponse@helpmepcs.com