Proofpoint Email Security

Proofpoint Email Security

The people you employ should be your company’s biggest asset. Every day your people create more and more valuable data for your business, but when it comes to protecting that data, your current defenses can’t keep up. 

With the speed cyber criminals are moving and the pace technology evolves, today’s advanced threats are designed to bypass traditional solutions. Targeting the way your people work to gain access to your sensitive information. This could be phishing attacks that appear as personal emails from colleagues, anti-malware software providing a false sense of security, or any number of new methods which appear every day.  With Proofpoint, you can protect the information your people create and stop security threats before they happen.


Proofpoint’s solutions combine deep insights across the attack chain with advanced technology to stop attacks anywhere your people work. On network or off, on any device. Enabled by the cloud, within seconds Proofpoint can see everything, correlate across existing defenses and protect everywhere. If an incident is detected Proofpoint allows you to confirm compromises and enable rapid responses reducing the impact of attacks or stop them from happening in the first place.


Email fraud, also called Business Email Compromise (BEC) is a type of phishing that preys on your trust.  Unlike most email attacks, email fraud doesn’t use malware attachments nor does it use malicious links or other common phishing techniques.  Instead it relies on social engineering in order to trick you into doing something the attackers want.  According to the FBI email fraud attacks have more than doubled since 2017. Costing an estimated 12 billion dollars since 2013.  So how do you detect email fraud?

When you receive an email from a co-worker it feels safe, but that message might not be from them at all.  Highly targeted imposter email attacks are the biggest threat facing enterprises today.  Costing 3.1 billion dollars in the past two years alone.  95% of those attacks spoof legitimate domains to target your organization.  This means cyber criminals create a fake email address using your domain tricking recipients into giving up valuable data, credentials, and funds. It takes just one malicious email to wreak havoc on your organization, but only if it reaches the inbox. 

Proofpoint Email Security Filtering can eliminate the devastating impact of imposter email fraud.  Leveraging the power of email authentication which enables you to detect block and respond to threats before they reach your employees.  With email fraud defense you gain full visibility into your email ecosystem not only will you see who is sending emails on your behalf, but you’ll also get recommendations on how to authorize legitimate senders by authenticating all of the good messages you can start blocking the bad. Combined with other Proofpoint email protection capabilities the multi-layered approach empowers your security team to respond quickly and accurately to even the most sophisticated threats.


Take the first step in protecting your business and contact Customized Computer Services Inc. We work with our clients to develop protocols for best practice and monitor your IT infrastructure to protect against cyber threats. 

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 31 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

SentinelOne Endpoint and Server Protection

SentinelOne Endpoint and Server Protection

Today, enterprise organizations face billions of cyber threats. Attacks are sophisticated and are carried out using multiple vectors: malware, exploits, and scripts. The majority of these threats target the most vulnerable parts of the organization: user endpoints and servers.

Legacy antivirus cannot keep pace with the growing onslaught of new malware. Next-gen antivirus still only focuses on prevention, offering no other protective measures against malware attacks that go uncaught, or against other types of threats.

Even if a threat is detected, most organizations aren’t equipped to respond effectively. How can you protect all of your endpoints against more than just file-based malware? How can you respond to threats effectively enough to eliminate the vulnerability gap between detection and response?

SentinelOne Next generation Endpoint and Server Protection

Protect against every threat.

SentinelOne’s Endpoint Protection Platform (EPP) offers multi-layer threat protection delivered by a single lightweight agent.

Driven by state-of-the-art machine learning, EPP pairs signature-less static prevention with behavioral detection. EPP uncovers and blocks file-based malware on access.

It also monitors all endpoint activity to detect malicious behavior perpetrated by any type of threat, from advanced malware, to exploits and stealthy insider attacks.

Automatically Eliminate Threats

SentinelOne EPP leaves no time for detected attacks to spread.

You can automatically:

  • Kill malicious processes
  • Quarantine infected files
  • Roll manipulated files back to their trusted states
  • Disconnect compromised devices from the network
  • And, when a NEW threat is detected, SentinelOne notifies agents on the network so that other endpoint devices become immune to it.

Take the first step in protecting your business and contact Customized Computer Services Inc. We work with our clients to develop protocols for best practice and monitor your IT infrastructure to protect against cyber threats. 

Customized Computer Services, Inc. is a Managed IT Service Provider, we have been serving the Dallas-Fort Worth Area for 29 years.  Contact us to find out how we can help your business stay one step ahead with your IT.

Dropsuite Email Backup and Archiving.

Dropsuite Email Backup and Archiving.

There are two types of businesses out there, those who have been hacked and those who are about to be hacked.

Did you know that 90% of all companies say they’ve been hacked at least once and 71% of data breaches occur in businesses with less than 100 employees? As if running your business wasn’t difficult enough, now you have to protect yourself against viruses, data theft, ransomware, and more.

With phishing campaigns targeting employees on the rise, these threats can disable or destroy your business in seconds. Sometimes with zero advanced warning.

If your email files are hacked, deleted, overwritten, or stolen, your business and its reputation could be damaged. Your revenue could drop.  You may not be able to restore all of your important email files attachments calendar entries and tasks. Your business operations could come to a standstill.

Wouldn’t it be nice if there was an easy cost-effective way to stay one step ahead of these online dangers? Well, now there is.

Never lose data again with Dropsuite Email Backup and Archiving.

Dropsuite Email Backup and Archiving is fully compatible with most popular email platforms, such as Office 365, GSuite, Apple Mail and more. Dropsuite Email Backup and Archiving is fully automated.  Just set and forget, and your emails will be protected 24/7. It’s like insurance for your data.

You can rest easy knowing that your email data, staff email records, and customer information is safe. For just pennies per day, all of your business email data files are backed up automatically.

Dropsuite Email Backup and Archiving even comes with unlimited storage. So as your business grows, you won’t be penalized for amassing too much data. You can retrieve and restore previous versions of your email files anytime you need.

Dropsuite Email Backup and Archiving includes a suite of advanced email management tools, such as journaling, eDiscovery, and 3rd party auditor and regulator access. Features that are especially important if you work in an industry subject to Federal regulations that require you to ensure the security and confidentiality of customer information.

With Dropsuite Email Backup and Archiving you can insure both regulatory compliance and business continuity in one fell swoop.

For more information, contact CCSI and get Dropsuite’s Email Backup and Archiving today.

Stay one step ahead of the bad guys and gain peace of mind.

Microsoft 365: Same Price, Same Product, New Name.

Microsoft 365: Same Price, Same Product, New Name.

Earlier in 2020 Microsoft announced they would be rebranding their Office 365 line of productivity software to Microsoft 365.

The capabilities of the products will not change and pricing will remain the same. Microsoft is using the new branding to simplify the services offered and make it easier to chose which product is right for you.

Office 365 SMB offerings

The Microsoft Cloud Works For You

The biggest advantage Microsoft 365 offers is the ability to work anywhere you have an internet connection. With it’s desktop and web-based platforms you can seamlessly create and edit files in Word, Excel, or PowerPoint on multiple devices.

So whether you are working in the office or remotely, your files are just a few clicks away.


Easy Collaboration

Microsoft 365 allows multiple people to simultaneously edit and contribute to a document, spreadsheet, or presentation without the need for multiple files. Cloud documents also automatically save revisions so you can easily see what changes were made and when.


Always Up To Date

With Microsoft 365, you will have access to the latest versions of all Office programs. Microsoft is constantly adding feature improvements across all programs making them better and more secure for your business. You will also get access to new products, such as Microsoft Teams, as they are released at no additional cost.

National Cyber Security Awareness Month

National Cyber Security Awareness Month

This October marks the 17th annual National Cyber Security Awareness Month in the US. As our dependence on our technology grows, so too does the risk and cost of cyber attacks.

Businesses face significant financial loss when a cyber attack occurs. In 2019, the U.S. business sector had 17% increase in data breaches: 1,473 breaches. Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity
requires the vigilance of everyone to keep data, customers, and capital safe and secure.

As technology continues to evolve, cybercriminals will use more sophisticated techniques to steal your identity, personal information, and money. To protect yourself and your business from online threats you must know what to look for and how to better defend yourself in our increasingly online world.

Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.

Don’t make passwords easy to guess. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to prevent data breaches.

Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it and set your security software to run regular scans.

Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share PII on social media platforms.

It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

Knowing how to protect your personal and business information is only half of the battle. Without implementing these safeguards you are leaving yourself and your business open to attack.

Proper Backup Planning and Disaster Recovery

Proper Backup Planning and Disaster Recovery

Understanding the risk and potential for a disaster is one important part of proper backup and recovery planning. Businesses must have an actionable response protocol that minimizes the damages of a disaster event.

Backup and disaster recovery planning revolves around the notion that by protecting the business from the effects of a natural or human-induced disaster, organizations are better able to withstand downturns.

One Backup Means No Backup

Traditionally, backups were physical copies. While physical backups are still useful, there are newer, more effective ways to backup data. Virtualization provides more effective, strategic backup tools, like snapshots, replication, and live migrations.  Virtualization also offers data redundancy by storing your data locally as well as in the cloud you are better prepared for potential disasters.  You can read more about the benefits of cloud backups here.

COVID-19 Exposes Weaknesses In Traditional Backup Plans

The recent outbreak of the coronavirus has shown the value of cloud backup solutions. 

As businesses migrate to a remote environment, this increases their risk of data loss when relying solely on physical backups.  With so many businesses moving off site, now is the time to update your backup plan to accommodate a remote workforce.

Creating An Effective Disaster Recovery Plan

After 30 years in IT, the one issue we see time and time again with our new clients is a failure to regularly check and modify backup and disaster recovery plans.

An out-of-date or untested backup policy is about as good as no backup policy; it is rarely effective and often wastes valuable resources – like your employees’ time.

Here’s a quick run-down of the items you’ll want to check off:

  • Backup and Disaster Recovery Team
  • Completed Risk Assessment
  • Identified Mission-Critical Facilities, Resources, and Functions
  • Aligned Backup and Disaster Recovery Program