Showing posts from 2019

How To Make Your Windows 10 Computer Look and Feel More Like Windows 7

Are you attached to your Windows 7 machine? Does the thought of upgrading your system to Windows 10 send chills down your spine? We get it, Windows 7 is familiar; it does its job without any flashy voice assistants or weird start menus. But your undying love for your computer may be putting you and your company at risk. As you may have heard, the timeline for support for 7 ends this coming January 2020. That means that after January, your computer will be left vulnerable to cyber attacks, failures and other maintenance tasks that won't be followed up with. 

BLOG: Why You Need To Upgrade Your Windows 7 Machine

There's some good news though! There are hacks and customization options that can bring back the warm fuzzy feeling you get about Windows 7, but on a secure, properly maintained Windows 10 machine! You can thank us later.

Love your list start menu? You can download the classic version to get that back.

Not a fan of Cortanta- Microsoft's version of Siri or Alexa? You can h…

Everything You Need To Know About Ransomware

Chances are you've heard of ransomware before- it's been around for a while. Recently though, ransomware has branched out significantly. Since 2013 there has been a gradual increase in types, and by late 2016, the amount of ransomware seemed to explode, with 10+ new variants per month. This isn't surprising though. The ransomware business is a multi-billion dollar industry. 

I want you to reread that sentence. Ransomware is a BUSINESS. No longer is any kind of hacking one greasy 30 year old living in his moms basement. These are companies with many employees and an office building just like any other business. They have quotas, business plans for the quarter, and meetings just like your business does. Ransomware is even offered as a service with kits you can buy to send out your own ransomware.

What Is Ransomware?

Ransomware is a form of malware or a virus that prevents users from accessing their systems or data until a sum of money is paid.¹ Typically, targets are home users…

3 Ways Managed Service Providers Can Save You Money

When determining the affordability and ROI of engaging with Managed IT Services Providers, small business owners often find themselves in a position of trying to balance a limited budget while making sure they have the proper tools to grow their business. It is a challenge many business owners face, in that they recognize the need for additional products or services that will allow their business to continue to thrive. However. funds may be in short supply to achieve these goals. .

Faced with this challenge, many small business owners are forced to make difficult decisions as to where they can afford to spend money to improve their business. One of the areas in which business owners are on the fence is whether or not hiring a managed services provider is something they can afford. In some cases the cost is not worth the benefits, however there are many situations where cutting costs will end up costing you more money in the long run.

 Here are a few reasons why managed service providers…

Capital One is the Next Victim of a Data Breach

Capital One has notified the public of a data breach affecting 100 million Americans and 1 million Canadians. This is the latest in what seems to be a never ending line of data breaches for large corporations. As per Capital One's press release on the breach, they are notifying people who's data was compromised as well as offering free credit monitoring.

[UPDATE 8/1/19 10:45 AM]

Analyst Betsy Graseck from Morgan Stanley has estimated that the breach could cost Capital One between $100 million to $500 million in U.S. fines alone, not including the fines and damages from the 1 million Canadian victims. It has also been speculated that the alleged hacker, Paige Thompson, is also behind additional breaches including Michigan State University, UniCredit SpA (Italy’s largest bank), and Ford Motor Co. All three companies are investigating the issues. The FBI arrested Paige Thompson on Monday.

It seems like every day there has been a new breach or hack- especially this year. Unfortunatel…

Is Your Boss Letting Hackers In?

Is your CEO unknowingly exposing the entire company to cyberattacks? While almost all security teams (92%) set out specific plans to help protect their CEO from cyberattacks and data breaches, 54% of security personnel believe their CEO is ignoring these plans.¹ If this is worrisome to you, either as the CTO of a company, an employee, or even the CEO in question, here are some ways you can ensure that you or your CEO can be compliant with the cybersecurity practices that are put in place.

Highlight the Risk

If your CEO doesn't see the risk in having a mediocre cybersecurity plan in place, you may need to reposition your argument. They need to understand cyber risk in the same way they understand financial risk, or health and safety risk.² It's common for C-level executives and board members to see cybersecurity and data breaches as an IT department issue, but in this age, a cyber attack affects the WHOLE company, not just the IT department. It's important to highlight how at…

Eight Ways To Keep Your Small Business Secure

If you own and operate a small business, lowering costs is an important part of keeping your company in the black. Cutting costs on your IT budget could inadvertently compromise your company’s security. Even though small businesses may not have all of the resources that large corporations do, they are still just as vulnerable to the same cybersecurity threats. Here are some ways to help keep your small business secure:

Purchase Anti-virus Software
Every computer is vulnerable to the wide variety of viruses, Ransomware, and worms that are on the Internet. These malicious software programs can do anything from damage your computer and files to steal your password and other important informant.
ion stored on your computer. Purchase a good anti-virus software program and make sure that it is always up to date. Also, check to see that your anti-virus software checks for spyware, adware, and any other type of malware that could be hiding on your computer.

Avoid Phishing Emails
It is importan…

The Quest for Security in a Data Breach World

This morning began with my coworker warning all of us to monitor our credit if we don't do  so already. Quest Diagnostics, the popular lab most of us in the office and most of you get your bloodwork done at, got hit with a data breach on May 31st. 12 million people potentially had personal, financial and medical information breached due to an issue with one of its vendors.¹ As desensitized to cyber attacks as I am, working at a tech company and all, this one actually worries me- and it should worry you too.
"In a filing with securities regulators, Quest said it was notified that between Aug. 1, 2018, and March 30, 2019, that someone had unauthorized access to the systems of AMCA, a billing collections vendor. The information on AMCA’s affected system included financial information (e.g., credit card numbers and bank account information), medical information and other personal information (e.g., Social Security Numbers),"¹[UPDATE 6/5/19 11:00 AM] 
As of this morning, LabC…

Cybercrime: The Vulnerability of Small Businesses

The Impact of Cyber Crime on Large-Scale Companies

Data breaches have become a recurring threat for many large corporations and will continue to increase in severity during 2019 and beyond. Uber, a large and an evidently popular corporation, was hacked by two individuals during 2016. Due to this breach, nearly 57 million Uber riders and employees private and personal information including names, phone numbers, email addresses, and driver’s license numbers were stolen by the hackers.² The data was accessed through a third-party cloud based service, where the hackers were able to filter through millions of private profiles.¹Uber chose to not publicly disclose the breach and paid a ransom of $100,000 to have the collected data destroyed.² This breach negatively impacted Uber financially which exemplifies the importance of cyber security for businesses and companies.
I Thought This Was About Small Businesses?
You may be saying "We're a small business, why does this matter to us?&quo…

Baroan Technologies to offer CB Defense from Carbon Black

May 14, 2019 Baroan Technologies to offer CB Defense, Carbon Black’s award-winning Next-Generation Antivirus (NGAV) and Endpoint Detection and Response (EDR) solution ELMWOOD PARK, N.J. – May 14, 2019 – Baroan Technologies, a leading managed IT service provider, today announced it has joined Carbon Black’s partner program as a value-added reseller. Carbon Black (NASDAQ: CBLK) is a leading provider of cloud-delivered, next-generation endpoint security. As part of the program, Baroan Technologies will aim to better secure its customers against cyberattacks and data breaches by offering Carbon Black’s CB Defense, an industry-leading NGAV and EDR solution delivered via the CB Predictive Security Cloud™ (PSC). CB Defense leverages the powerful capabilities of the PSC by applying streaming analytics to unfiltered endpoint data in order to predict, detect, prevent, respond to and remediate cyber threats. CB Defense affords users the ability to effectively replace legacy AV and is designed to d…

WhatsApp hackers install government-grade spyware on an undetermined amount of devices

"The vulnerability was discovered by the Facebook-owned WhatsApp in early May, the company confirmed to TechCrunch. It apparently leveraged a bug in the audio call feature of the app to allow the caller to allow the installation of spyware on the device being called, whether the call was answered or not.

WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” the company said in a statement."

Read the whole article from TechCrunch here:

4 Key Facts About Data Breaches

You probably hear about data breaches and cyber attacks all the time, but do you understand what you're reading? Often times it's a lot of information thrown at you, it's too technical, and it's hard to digest it all. Our mission is to help our customers be successful with technology, and that means presenting information in a way that you don't need to be a senior tech to understand it. We want you to be able to understand how this information pertains to your business, and how to stop you from becoming one of these statistics. We created a fast facts sheet with the most important facts about data breaches that we think you need to know.

Microsoft Outlook Breach Much Larger Than First Expected

"A recently-disclosed Microsoft email-platform breach is reportedly much worse than previously thought, now impacting a large number of Outlook accounts as well as MSN and Hotmail email accounts. On Friday, a slew of Outlook users reported receiving notifications from Microsoft. The notification warned of a data breach impacting accounts between Jan. 1 and March 28, but said that the breach only impacted “some” accounts, and that the content of emails and any attachments were not exposed.

However, a Sunday Motherboard report said that the breach is “much worse” than previously reported. According to Motherboard, the hackers were, in fact, able to access email content, and that the breach impacted a large number of Outlook, MSN and Hotmail email accounts"

Read the full article here:

What is Multi-Factor Authentication (MFA)

Multi-Factor Authentication, similar to Two-Factor Authentication, is a way to further protect you, your business, and employees from cybercrime. With the ever rising rate of hacking and other cybercrime, it's more crucial than ever to safeguard your sensitive information. It's no longer enough to just have a strong password. This is where MFA comes into play. Let's break it down.
What is Multi-Factor Authentication?
MFA is a second layer of security that you can use for your email logins, device logins, and many other places that you store sensitive information. It's usually broken down into three concepts:     Things you know (knowledge), such as a password or PIN    Things you have (possession), such as a badge or smartphone    Things you are (inheritance), indicated through biometrics, like fingerprints or voice recognition¹The combinations of the three above concepts work to create a more personalized layer of security for the end user. You may have seen these in use…

What Is the Dark Web and Why You Should Care

The dark web may seem like a word you should only say in the dark of night, behind closed doors, but is it really that bad? Yes and no. To some, the dark web is a bad place beyond the internet, a flea market for criminals if you will. Instead of finding handmade jewelry and dusty vinyl records, you'll find illegal drugs, social security cards, and counterfeit money for sale, usually at a relatively low price.¹ Surprisingly, not everyone on the dark web is a malicious criminal. Sometimes, the dark web is a person's only access to the outside world.² People who live in a closed society like North Korea, whose internet is extremely limited and censored,³ use the dark web to give and receive information without consequence. It's not all black and white though If you wanted to, you could go to the dark web without being a criminal or a desperate hostage. There isn't any penalty for just being on the dark web,¹ however take extreme caution when doing so, as one wrong move, o…