How do I prevent Hackers from stealing my data?

How can I protect my business and data?

Scenario one: It’s 8:00 a.m. on a crisp, beautiful Monday morning. You walk into the business you own, and immediately realize your entire business is down. Overnight, your data and your clients’ data were stolen. It is being held for ransom. You panic. You’re on your own. now what?

Scenario two: It’s 8:00 a.m. on a crisp, beautiful Monday morning. You walk into the business you own, and realize your business is down, you call PremierePC. We share that a ransomware attack was detected. We identify the source of the attack, isolate it from the network, and then begin to restore all your data from backups. As a result your business is up and running with minimal effort on your part.” You take a deep breath. You are not alone. Thank goodness for PremierePC and a smart Cybersecurity plan.

Which scenario do you choose?

What is Huntress and how does it fit into a broader Cybersecurity plan?

Huntress collects and analyzes metadata about every application scheduled to execute when a computer boots up or a user logs in.

When a hacker establishes access, Huntress is there to help identify the breach, provide remediation steps, and monitor for any remnant footholds.

Huntress discovers new and existing footholds in shady email attachments, malicious website content, unpatched vulnerabilities, and tainted USB drives.

Breach detection alone is not a plan. Pairing this solution with a smart network design and backup and recovery plan help mitigate many risks and allows for flexible restorations.

PremierePC includes Huntress on every server we monitor.

Service plan clients can also add Huntress to each supported device for an additional fee.

New Features

Huntress has just added two new services at no additional cost: Ransomware Canaries and External Recon.

Ransomware Canaries is an early warning and detection system, sounding the alarm that the network has been hit and triggering protocol to restore their system from backups. This happens the moment a part of the network gets “ransomed.”

Networks have become harder to secure as endpoints move from office to homes and other mobile work locations. Ransomware canaries is a key solution.

External Recon is an automated tool which monitors the network, on a constant search for exploits that hackers have used in the past to penetrate security.

Huntress automated what hackers do to find vulnerable ports and make the client aware of them before hackers find them.

Additionally, there is a threat mitigation report that is automatically generated for customers to show the dangers that security software has intercepted and display the persistent nature of cyber-attacks.

Contact us today to learn more about automated breach detection and reporting from PremierePC.

cybersecurity

cybersecurity

Real-World Example: A food distributor received an invoice email. The email looked real: “from” the expected vendor, arrived at the expected time, and equaled the expected amount. The thieves had been watching. The company didn’t discover the problem until the real vendor got in touch to ask why the payment was late. By then, nothing could be done. The cybersecurity measures were not previously in place. Loss: $23,500.

Understand

What is cybersecurity?

Well it’s not just one thing; it is many things.

“Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.”

Cybersecurity can change based on industry, size, and services you already have in place or want to have in place.

Many people are afraid of cybersecurity because they think it is difficult, outside their knowledge level, and it can often be hard to implement. Many companies ignore it. This is not a solution. 

Your risks of not implementing cybersecurity measures include hackers, attackers, intruders,  malicious codes/malware, and vulnerabilities.

(Thanks to Homeland Security for the above quoted info.)

Analyze

So, what is the solution? How do you figure out what your business needs?

Do you have a dedicated IT department to analyze your business’s specific needs? Or do you simply use hosted email with default security settings and take your chances with your daily computing platform?

Are you proactively training staff on cybersecurity issues and searching for security holes in your system?

Have you implemented single sign on and MFA across cloud applications?

Are you monitoring devices on your networks to ensure they are not bringing in intrusions from outside?

Are you paying attention to how and where company data is being stored and accessed?

In today’s world, remote work is becoming increasingly popular and needed. Is your company implementing security measures to protect remote workers along with company-owned data?

Protect

You could spend as much money as you want to and still not achieve 100% protection. Making sure you spend the right money on the right solutions is the right way forward.

There are many areas that cybersecurity needs to be applied to. Having these particular areas properly managed by a professional team can mitigate your exposure to threats.

Some security solutions include: 

  • Firewalls with active security subscription.
  • Protecting users from inbound threats, phishing, and other external compromises via email.
  • Monitoring the DarkWeb for data which is already compromised.
  • Ensuring you are using next generation endpoint anti-virus solutions that monitor for behavior not just signatures.
  • Auditing how employees are using, accessing, and storing company-owned data.
  • Having a reliable source to call when you have questions.

What’s next?

Cybersecurity doesn’t have to be hard, scary, or overwhelming when you have professionals handling it. It can be as expensive as you want it to be, or you can get solutions that are customized to your needs.

If you have questions, we are here to make cybersecurity easy, affordable, intelligent, and a perfect fit for your needs. At PremierePC, Cybersecurity is built into all we do.

What is the Dark web?

According to Experian, dark web monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

The dark web is seen as the underbelly of the internet, a shrouded area of the internet hidden from search engines and only accessible with a special web browser. It also masks IP addresses, which essentially allows fraudsters to operate undetected to commit crimes, including identity theft.

Is My Information on the Dark Web?

PremierePC offers an identity theft protection product called DarkWeb ID, which includes Dark Web Surveillance for comprehensive dark web monitoring to protect you from the financial and reputational harm that can result from identity theft.

This product is available for your company’s entire domain, meaning we can gather and report on any compromises for your entire team. Unlike other solutions which are sold by the user, our service is sold by the domain (yourcompany.com)

Additionally, you may add up to 5 personal email accounts at no cost. Help bolster the protection of your C-Level executives who are often targets of social and spearhead phishing campaigns.

Security Awareness Training (SAT): Protect Against Human Error.

Monitoring the dark web for stolen credentials is critical for clients who want to provide comprehensive security to their users. Our SAT solution complements that data with simulated phishing attacks and security awareness training campaigns to educate employees, making them the best defense against cybercrime.

This solution is INCLUDED with our Dark Web ID solution. No additional costs to layer on a proactive security awareness program.

For a limited time, we are offering these solutions to our service plan clients at a discounted rate of $79 per domain (normally $99), Signup by the end of April to lock in this pricing

Learn More >>

Not a service plan client? Why not? Learn more about our service plans

If you company does not have an active service plan, you may still purchase the solutions above at the regular rate. month-to-month terms, setup is super simple and takes less than 30 mins.Prefer a one-time report? We are offering that for $349 per domain.

LogMeIn has made that possible by offering the Connect PRO Bundle, a cloud communication and collaboration offering made possible by LogMeIn’s acquisition of Jive Communications. The Connect PRO Bundle includes a GoToMeeting PRO license with every Jive seat purchased. This means that every member of your organization not only receives over 80 of Jive’s great VoIP features, but high-quality face-to-face meetings with anyone, anywhere, from any device.

The bundle is designed to simplify and extend customers’ UCC (unified communications and collaboration) solutions by combining GoToMeeting’s cloud-based video conferencing solutions with Jive’s cloud-based telephony solutions to offer more value, savings, and — most importantly — more valuable connections.

Are you only relying on your email platforms baked in spam filtering? You could be leaving yourself open to a range of threats.

PremeirePC is partnered with MailProtector (here in Greenville) to offer a range of email security and compliance services.

Elevate your email security to the cloud and stop spam and viruses for good. Let our team of email security experts protect your users around the clock.

Filter outbound email traffic with the policies you define. Prevent spam proliferation and keep damaging or sensitive data from being leaked via email.

Email encryption via Bracket offers an added layer of security to your email platform ensuring compliance in difficult industries like Health Care and Financial Services.

 
Learn more about our email security and compliance offerings:
https://www.premierepc.net/productivity/email-compliance-and-security/

All services sold by the user by the month, no long term commitments or up-front fees. Services are limited to manged service plan clients.

Multi-Factor Authentication:
Multi-Factor Authentication (MFA for short) is one of the single best ways to help keep you and your associated accounts safe, yet it is often the one of the most hated methods.

What is MFA? 
Simply stated, MFA uses a second (or third) device to allow you to authenticate your account. This is most common with Email and Banking applications. When you go sign-in, your MFA device is sent an activation code. This process attempts to ensure that you are the one who is requesting a login.  The logic goes that it is more difficult for a hacker to compromise both your password and your MFA devices.

MFA is one of the most effective tactics used to combat phishing scams.  Let’s say that a user at your firm is targeted and they disclose their password during a scam. While that is a problem, the bad guys would still need the MFA device in order to actually login. During this time, the user can report the disclosure to IT and we can make changes before anything happens.

Why don’t more people use it?
The simple reason is its perceived as a hassle. Having to have your phone nearby to login to email may add an additional few moments to the sign-in process, but in the end it can make your life much more secure.

Complexity weighs in too.  Not knowing how to properly setup MFA and integrate with your applications is a huge obstacle.

Another reason seems to be about awareness. This email is designed to help with that.

What are the costs?
Depends on your environment.  Microsoft and Google both offer free MFA as part of their core email offering. Several 3rd party solutions like Duo exist as well.

Can you help?
If you are a managed IT client then yes we can! We are actively advising all our managed clients of the importance of MFA and reviewing the methods we can use.

Our goal is to integrate your on-premise environment and your cloud infrastructure.

Happy Halloween from PremierePC.
Remember, there is nothing more scary than not having a proper backup and disaster recovery plan in place. 
Our ProSupport Complete offering includes backup to help with management and peace of mind.

Call PremierePC today to learn more about our solutions. 

PremierePC has achived the next level in our cloud services relationship with Microsoft. This means even better supprt and integration for our clients.

Our team can now support your organiation from sales to deployment. We now offer direct billing so you can skip keeping a card on file with Microsoft. All licence requests are now handled by our team, often in just a few moments.

If you are already using Office 365 solutions let us show you how to take full advantage of all the features avaialble to you.

If you are on the fence or using alternaitve solutions, let us show you what is possible.

Contact us at 864 335 9223, Opt 2 to learn more about Microsoft Cloud solutions for your business. 

Having trouble with your staff learning the solution? Ask about our learn as you go portal available for on a per user basis.

Problem

Cybercriminals target businesses through their end users, often using user information as shared on social networks and other locations online to gain their trust. When end users unwittingly click phishing links, open malware attachments, or give up credentials and other sensitive information online, cybercriminals can bypass existing layers of security to successfully breach organizations’ networks.

Businesses need a cost-effective solution that delivers the right security and cyber-awareness training to the individuals who need it most to stop breaches and minimize the security impact of unwitting user error.

Solution

With ongoing, relevant, engaging cybersecurity awareness training-such as phishing simulations, courses on IT and security best practices, and data protection and compliance training where relevant-businesses can significantly reduce the risks they face due to user error. Webroot Security Awareness Training ensures that people, processes, and technology are all harnessed effectively together to stop cybercriminals.

Global, real-time Webroot® Threat Intelligence helps provide highly topical, relevant, and timely real-life educational content. Our integrated online security management console and automated Learning Management System make administration straightforward and easy, helping organizations reduce risk, decrease infections and related help desk costs, protect their reputation by experiencing fewer breaches, and secure their overall cybersecurity investment.

Avaialble to existing ProSupport LITE and ProSupport Complete clients as an add-on to our included Endpoint securiety solution. 

Contact us at 864 335 9223, Opt 2 to learn more.

Jive Secure (Call Encryption)

PremierePC and Jive Commutations are proud to present Secure Call.

This feature is supported on Cisco MPP, Polycom, and Yealink only.

Jive Secure protects your conversations with audio encryption—ensuring unwanted listeners can’t hack into your calls. Here’s the nitty-gritty: When you’re on a call, audio travels between two separate paths. First, between your phone network and Jive Cloud; and second, between Jive Cloud and your caller’s phone network. The two paths together allow you to speak to and hear each other. Jive Secure encrypts the first path of audio and encrypts both if your call is with another device that has Secure Calling enabled as well. Now you can rest easy knowing your network is protected.

What You Need to Know

  • Jive Web and Jive Mobile support Jive Secure.
  • Jive Voice features like call monitoring (eavesdropping) and call recording still work with call encryption enabled.
  • Call encryption may use slightly more bandwidth and will change the network protocol you’re using. As a result, be sure to adjust your network policies as needed.
  • If Media Release is enabled on your network, Jive Secure will override this setting.
  • Jive Secure uses TCP protocol. Ensure that port 5062 is enabled on your network.

How to enable 
 
Need this feature enabled for your business? Reach out to our team to learn more and schedule an implementation session.  Certain adjustments to our client’s edge device will be required before enabling this feature.