Tag Archives: network security

3 Tips to Keep Viruses Away from Your Small Business Network

Following a few basic principles and keeping up on the latest scams should generally keep you save from viruses.

Following a few basic principles and keeping up on the latest scams should generally keep you safe from viruses.

The problem with viruses is that the nature of the threat and the tactics of those who employ them change from year-to-year. Small business owners already have more on their plate than they can handle, so keeping up with the latest antivirus trends isn’t easy.

However, even if you’re not combing the Internet three hours a day to stay up-to-date on the latest virus tech news, if you follow a few basic principles, you can avoid many of the worst virus traps.

These three quick tips will help you adopt essential cybersecurity habits for your small business:

Tip #1: You Are Your Own Worst Enemy

Employees are typically the biggest threat to a business network. Most viruses gain entry because of an unwise action among your staff. Macros malware has had a come-back recently (see this Microsoft report, if you don’t believe me) because hackers now try to trick users into enabling macros.

Or employees open email attachments from unknown senders or click on links in emails that seem legitimate.

Most of it is common sense:

  1. Don’t enable macros unless your IT team is instructing you to do so.
  2. Never open attachments from a stranger. If someone you know sends you an attachment, but the email seems a little off — if you have even the slightest suspicion that maybe the person’s email was hacked — communicate with the person first and confirm it before opening the attachment.
  3. Never click on links in an email claiming to be from a company that is asking you to provide account information (log-in info, personal data, etc.) by clicking on that link.

For example, if you get an email claiming to be from Wells Fargo telling you to click on a link to reset your password because of an alleged security breach, don’t click on the link. If you’re truly concerned about it, follow these steps:

  • go to the bank’s website through your browser (not through any link in the email)
  • log into your account through the normal channels
  • check your account messages to see if there really is an issue

Apply this routine to any email telling you to click on a link. If it appears to be with a company you know — even if it looks legitimate — always log into your account the normal way and avoid the email link.

Another essential habit: keep your software up-to-date. The latest versions of software often have patches that fix holes in security. Neglecting to keep our systems up-to-date is yet another way we become our worst enemies.

Yes, these are basic principles, but sometimes the madness or exhaustion of work short-circuits our common sense. It’s good to be reminded of essential security habits.

Tip #2: Get Some Quick Training Under Your Belt

In a recent news story from May 2015, it was observed that small businesses often bear the brunt of hacker attacks: “According to Symantic’s Internet Threat Report examining trends for 2013, 30 percent of targeted cyber-attacks (called “spear-phishing”) were aimed at businesses with 250 or fewer employees. And one in five small businesses received at least one spear-phishing email during the year.”

If you’d like to get some thorough cybersecurity training tailored for small businesses but you don’t have much time, consider the U.S. Small Business Administration’s free online training course, which only takes 30 minutes to complete.

Tip #3: Be Aware of Unusual Scams

The fake IT phone call is the perfect example of an unusual scam. In a May 12, 2015 report, an ABC News station alerted the public to a scam in which an imposter claiming to be an IT person called individuals and asked for personal log-in information so that he or she could remotely remove a virus on their computer. Of course, the imposter described the alleged virus in apocalyptic terms to stir the person into a state of panic.

In the news report, Kathy Birr, the Director of Dispute Resolution for the Better Business Bureau, said this: “They gain your trust and scare you and convince you that there is a problem and they need to fix it fast.”

At SystemsNet, even our basic service package Vita comes with our top-notch anti-malware assistance and virus monitoring. Contact us for more helpful information about anti-virus practices for small businesses.

The 7 Keys to Building a Solid Network Infrastructure

An independent HVAC system and uninterruptible power supply are two crucial physical elements of your network infrastructure.

An independent HVAC system and uninterruptible power supply are two crucial physical elements of your network infrastructure.

Network infrastructure refers to the software and hardware resources of a complete network that enable network communication, connectivity, management and operations of an enterprise network. Most office intranets are like the World Wide Web, but they operate on a closed network infrastructure that is accessible to only the people within it. Network security should be the main concern when you build a network infrastructure. Below are 7 keys to building a solid network infrastructure.

Antivirus and Anti-Malware: All of your employee computers and servers should have antivirus and anti-malware prevention software to prevent hacking and shutdowns.

Run Backups: Develop a thorough backup process and adhere to it under all circumstances. You can keep multiple ones in multiple places. The layered approach provides the best data protection.

ID and Password Control: When you implement a new piece of hardware rename the local administration ID and create a strong password. Another tip is to enforce password changes periodically.

Reliable Uninterruptible Power Supply: You need a reliable UPS in case there is a power outage. This equipment connects your servers and gives them time to shut down correctly if there is a power failure.

Naming Conventions: This is a very important part of a secure infrastructure because it makes it easy to identify missing files that require restoration.

Heating Ventilation Air Conditioning System: You need an independent HVAC system for your server room because if an air conditioning unit goes down in your building, a high temperature can put servers at risk.

Restoration Testing: It is a good idea to run restoration tests regularly. The process allows you to work to resolve problems immediately.

A good IT company can provide network solutions. Their highly qualified network specialists can assist you with help desk support, hardware and software support, installation and troubleshooting. They can even manage data backup storage. Details about 3 types of storage services to choose from are below.

  • Cloud backup is also known as online backup. It involves backing up data by sending a copy of it over a public or proprietary network to an off-site server. A third-party service provider usually hosts the server and charges you a fee based on the number of users, bandwidth or capacity. Most online backup systems are built around a client software application.
  • Network-Attached Storage utilizes a standard Ethernet connection to provide network nodes with file-based shared storage services. Most NAS devices do not have a keyboard or display. Each NAS resides on the LAN as an independent network node with a unique IP address. The advantage of this type of storage is its ability to provide several clients on the network with access to the same files.
  • Business Continuity Device storage is used to prepare for unforeseen risks to continued operations and is related to Disaster Recovery. Both of them refer to the procedures and processes your organization must put in place to guarantee that critical functions can continue after emergencies. This type of storage focuses on long-term or chronic challenges to your company’s success. It is designed to revive your network fast and get your employees back to being productive. It works automatically to back up your vital information as often as every 15 minutes. Files can be restored in about 30 minutes or it can take over as a virtual server to resume operations. Business continuity planning is a comprehensive approach to making sure you can continue to generate profits after anything from small disruptions to natural calamities.

Contact a network solutions service provider to request a consultation regarding network infrastructure and data security. The certified consultants are well-trained and knowledgeable about the latest products and can assist you with selecting the right software and hardware.

For more information please contact us.