Protect Your Users with Breach Secure Now

Protect Your Users with Breach Secure Now

If you’ve been a regular reader of our blog then you are probably familiar with all of the ways you should be protecting your business. Whether that is securing your data with regular onsite and offsite backups, protecting your hardware with an always up to date Antivirus and Antimalware application, and protecting your email with intelligent and robust Antispam.

However, you may not be aware that your most valuable asset in the fight against hackers, and your first line of defense, is your users.  Every suspicious link, every rogue email that slips through your spam filters is the opening salvo that could lead to costly downtime for your business.  All it takes is one careless click for disaster to strike. 

So how can you make sure your users are prepared to defend themselves from online attackers?

Breach Secure Now is a comprehensive suite of monitoring, training, and education tools designed to safely and easily get your users up to date on the best practices when it comes to online safety.


AutoPhish: Unlimited, automated campaigns

With mock phishing emails, you can send routine simulated phishing emails, proven to minimize the risk of end-users falling victim to a malicious phishing attempt. Routine phishing instills into your users the very behaviors of IT professionals before they click on any link so that even on the most chaotic of days, they’re ready.


Continuous Education: Weekly micro-training video, quiz & monthly security newsletter

Customized weekly 2-minute ‘micro-training’ videos & short quizzes combined with a monthly security newsletter keep cybersecurity short, engaging, and interactive. With white-labeled emails sent on your behalf to all your users for hands-off management.


Interactive Leaderboard: Friendly competition

Keep track of users’ progress with real time scoring. An interactive leaderboard ignites friendly competition with just their screen name’s honor at stake. For managers, employee names are featured, with a report for performance evaluations, letting you track exactly who needs more time training.


Dark Web Monitoring: Continuous monitoring

Proactively monitor the dark web for compromised account data. The sooner end-users are notified of a breach, the sooner they can change their passwords. End-users also have the ability to scan the dark web for their personal accounts so they can prevent cross contamination between their personal devices and your business network.

For more information, contact Customized Computer Services Inc.  We work with our clients to develop protocols for best practice and monitor your IT infrastructure to ensure the security of your accounts.

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

Kaseya REvil Ransomware Attack

Kaseya REvil Ransomware Attack

The largest ransomware attack of 2021 has come, and the effects are still being felt.

Over the July 4th weekend, hundreds of businesses and thousands of computers were hit by the REvil Ransomware. This is pretty big news and the attack is still ongoing. At the center of the drama is a company called Kaseya.

Who is Kaseya?

Kaseya provides IT management software to businesses who need to monitor and maintain all of their computers. Their ‘Kaseya VSA’ software was hit with a supply chain attack, allowing cyber criminals to inject malicious code into a software update.  These software updates was then pushed out to all of the connected devices.

Kaseya VSA is a remote monitoring tool which allows full access to the computers it’s installed on which is useful for IT technicians to diagnose and fix problems remotely, or in this case, deploy software updates.  If an MSP which uses this software gets infected then all of their clients are vulnerable to attack.

Managed Service Providers Were the Target.

While Kaseya themselves are only reporting 40 of their customers have been infected, the true number of infected computers is thought to be in the thousands.  This is due to the large number of MSPs, or Managed Service Providers who use the VSA software to remotely manage their client’s computers.

We don’t know specifically which companies have been infected, as most infected companied are going to want to stay quiet about the intrusions, though we do know that a chain of supermarkets has been forced to close after their check out systems was ransomed. This chain was a client of one of the MSPs that was attacked.

How to Protect Yourself.

With CCSI’s Qualified IT Professionals we can help assess your business infrastructure and design tailormade solution to protect you from disasters like these.  Whether implementing proper backup planning and disaster recovery, or minimizing the risks of ransomware, we can work with you to implement changes so that your business will be ready to handle it with minimal impact to your daily operations.

For more information, contact Customized Computer Services Inc.  We work with our clients to develop protocols for best practice and monitor your IT infrastructure to ensure the security of your accounts.

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

Do You Need A Business Continuity Plan?

Do You Need A Business Continuity Plan?

It is common knowledge these days that securing and protecting your data is one of the most important things when it comes to running a business.  We’ve already discussed the benefits of proper Backup and Disaster Recovery Planning. With Ransomware attacks at an all-time high and natural disasters costing business owners billions of dollars there is no better time to make sure your business is prepared to react and reduce the impact of these threats.

What is Business Continuity?

Business continuity is not only about having a clear plan of action so your company can function with minimal disruption, but about being able to identify all aspects of your business, how they work together, and where improvements can be made to ensure smooth operation under unforeseen circumstances.


ASSESSMENT

The first step to successful planning is a thorough understanding of the critical functions of your business and identifying weaknesses in your current infrastructure.


DESIGN

Next you will identify solutions to achieve continuity during disruptions.  This includes your backup and disaster recovery and the details of the priorities, procedures, responsibilities and resources required to manage an incident and return to operation.


IMPLEMENTATION

Finally, the process of putting the solutions in place. Ensuring all of the protections are ready for when they are needed and that those systems are monitored and maintained.


VALIDATION

This step is an ongoing test of your continuity plan.  Carried out in a controlled environment you can test recovery of your business operations without the worry of loss of time or money.  Reoccurring on a regular basis, you can ensure your business will be ready if and when an emergency occurs.


With CCSI’s Qualified IT Professionals we can help assess the key components of your business and design a clear plan of action to minimize downtime.  We can work with you to implement these changes company wide and validate the effectiveness in a controlled environment, so that when disaster truly does strike, your business will be ready to handle it with minimal impact to your daily operations.

For more information on Business Continuity and Disaster Recovery, contact Customized Computer Services Inc.  We work with our clients to develop protocols for best practice and monitor your IT infrastructure to ensure the security of your accounts.

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

Multi Factor Authentication with Microsoft Office 365

Multi Factor Authentication with Microsoft Office 365

Passwords are everywhere.  We use them to access our money, our communications, even our social lives.

At first, we used one password for everything, but that wasn’t good enough so we started making our passwords even more complicated and relied on password managers or handwritten notes to organize the dozens or hundreds of unique passwords we use.

But no matter how complex our password system was it was never enough to prevent account takeover, because all it took was one phishing email or database exploit and your password was out in the world.

We’ve talked before about the importance of password security and how even the most complex passwords are not enough to prevent breeches(1) and malicious(2) attacks(3).

Security experts and even the United States Government(4) have expressed the need for increased security and protection in our increasingly online lives and business.

Still, every year the statistics tell the same story or worse;

It’s plain to see that relying on passwords alone is not enough to protect yourself or your business.

Two-factor authentication for Office 365 and Hosted Exchange

Two-factor authentication(5) is an extra layer of security designed to ensure that you’re the only person who can access your account, even if someone knows your password.

With two-factor authentication, only you can access your account on a trusted device or the web. When you want to sign in to a new device for the first time, you’ll need to provide two pieces of information—your password and the six-digit verification code that’s automatically displayed on your trusted devices or sent to your phone number.

Because your password alone is no longer enough to access your account, two-factor authentication dramatically improves the security of your account and all the personal information you store with Office 365.

Once signed in, you won’t be asked for a verification code on that device again unless you sign out completely or need to change your password for security reasons. When you sign in on the web, you can choose to trust your browser, so you won’t be asked for a verification code the next time you sign in from that computer.

For more information on how to secure your Office 365 account, contact Customized Computer Services Inc.(6) We work with our clients to develop protocols for best practice and monitor your IT infrastructure to ensure the security of your accounts.

Customized Computer Services, Inc. is a Managed IT Service Provider(7), we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us (8) to find out how we can help your business stay one step ahead with your IT.

Synology DiskStation: Innovative Data Storage

Synology DiskStation: Innovative Data Storage

When running a business, you know the security and ease of having dedicated file servers and a managed user database cannot be overstated, but if you are a small to medium sized company or have multiple locations, it can be hard to justify spending thousands on dedicated servers.

This image has an empty alt attribute; its file name is qtq80-X1V9xk-1024x576.jpeg

With Synology Network Attached Storage (NAS) you can have that convenience without the cost.

The Synology DiskStation line of NAS provides expandability and customization that allows for added functionality beyond data storage, tailored to your specific needs.


These days, business data is scattered across multiple platforms and devices, from servers to virtual machines, personal computers and cloud applications like Google Drive, Drop Box, or Microsoft One Drive.

With a Synology NAS all of your important data can be stored in one centralized location allowing your employees access, even when away from the office. 

For businesses with multiple locations, you can even set up file replication between Synology devices. No longer will your satellite offices be hampered by slow internet speeds as they try to access files from the primary location.


With Synology Hyper Backup you have the peace of mind of backing up your data to one centralized location. Partner that with Cloud Sync and you can increase the safety of your data with a redundant offsite backup.  So even if the worst were to happen, you can rest easy knowing your data can be quickly and easily recovered.

This image has an empty alt attribute; its file name is screenshot_01.png

As businesses migrate more and more to cloud based products and online focused collaboration tools many are finding it hard to keep up with the important data shared on these services.  Email from Exchange Online, Microsoft Teams messages and attached files, OneNote notebooks, SharePoint libraries, and OneDrive. 

No more will you have to worry about that email from 3 years ago that you may have deleted.  Or the document that was shared through MS Teams and now is lost in months and months of message logs.

All of these data sources can be securely backed up with Synology Active Backup for Microsoft 365.


While commonplace in larger businesses, a dedicated active directory server is often out of reach for those with fewer employees.  However, the benefits of managing your user accounts through AD are immeasurable, regardless of your business size.

With Synology Active Directory you can create and manage user accounts for all of your employees.  Set password rules and expirations to prevent malicious attacks.  Set group rules for file access on your network shares and more.


With Synology all of your data, no matter the source, is quickly and easily available to you.

For more information on how to protect your data, contact Customized Computer Services Inc. We work with our clients to develop protocols for best practice and monitor your IT infrastructure to ensure the integrity of your data.

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

Proofpoint Email Security

Proofpoint Email Security

The people you employ should be your company’s biggest asset. Every day your people create more and more valuable data for your business, but when it comes to protecting that data, your current defenses can’t keep up. 

With the speed cyber criminals are moving and the pace technology evolves, today’s advanced threats are designed to bypass traditional solutions. Targeting the way your people work to gain access to your sensitive information. This could be phishing attacks that appear as personal emails from colleagues, anti-malware software providing a false sense of security, or any number of new methods which appear every day.  With Proofpoint, you can protect the information your people create and stop security threats before they happen.


Proofpoint’s solutions combine deep insights across the attack chain with advanced technology to stop attacks anywhere your people work. On network or off, on any device. Enabled by the cloud, within seconds Proofpoint can see everything, correlate across existing defenses and protect everywhere. If an incident is detected Proofpoint allows you to confirm compromises and enable rapid responses reducing the impact of attacks or stop them from happening in the first place.


Email fraud, also called Business Email Compromise (BEC) is a type of phishing that preys on your trust.  Unlike most email attacks, email fraud doesn’t use malware attachments nor does it use malicious links or other common phishing techniques.  Instead it relies on social engineering in order to trick you into doing something the attackers want.  According to the FBI email fraud attacks have more than doubled since 2017. Costing an estimated 12 billion dollars since 2013.  So how do you detect email fraud?

When you receive an email from a co-worker it feels safe, but that message might not be from them at all.  Highly targeted imposter email attacks are the biggest threat facing enterprises today.  Costing 3.1 billion dollars in the past two years alone.  95% of those attacks spoof legitimate domains to target your organization.  This means cyber criminals create a fake email address using your domain tricking recipients into giving up valuable data, credentials, and funds. It takes just one malicious email to wreak havoc on your organization, but only if it reaches the inbox. 

Proofpoint Email Security Filtering can eliminate the devastating impact of imposter email fraud.  Leveraging the power of email authentication which enables you to detect block and respond to threats before they reach your employees.  With email fraud defense you gain full visibility into your email ecosystem not only will you see who is sending emails on your behalf, but you’ll also get recommendations on how to authorize legitimate senders by authenticating all of the good messages you can start blocking the bad. Combined with other Proofpoint email protection capabilities the multi-layered approach empowers your security team to respond quickly and accurately to even the most sophisticated threats.


Take the first step in protecting your business and contact Customized Computer Services Inc. We work with our clients to develop protocols for best practice and monitor your IT infrastructure to protect against cyber threats. 

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.