• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Network

Network Security And The “People Problem”

November 30, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

Security teams that focus on what is already happening and the layers of defense being breached are constantly in reactive mode.

Reviewing reams of data produced by technology – firewalls, network devices or servers – is not making organizations more secure. With this approach, the team fails to prevent breaches or respond in a sufficiently timely way.

Instead, the addition of more data and more complexity perversely prevents achieving the end result: protecting sensitive information.

The significant breaches of today are executed by people infiltrating the organization and attackers are doing this by assuming identities or abusing insider privileges.

There is a gap between the initial line of defense (the firewall) and the company’s last line of defense (the alerts received by the security team and their following analysis.)

Tracking user activity, especially connections between suspicious behaviors and privileged users, would allow organizations to close this gap.

True understanding of identity has the ability to cut through the overwhelming explosion of data that can render security organizations blind and unable to respond to real threats or even detect if they are under attack.
It is time to incorporate identity into the organization’s breach prevention strategy and overall security. We have to stop accepting a gap approach to security, which is usually focused on data and devices rather than people. In light of the budding perimeterless world, identity will increasingly be the primary factor that matters to the security team.

Identity data is pervasive, yet typically absent from the security world view. For security organizations, our corporate identity (the personal identity elements we bring to our corporate environment) and our behavior are aggregate details essential in building a picture of what is happening within – and beyond – the corporate perimeter.

business people iconsTogether, they offer deep context to inform the security team of the appropriate response to potential threats and real attacks.

The critical piece in this approach is the security organization’s ability and capacity to understand the full scope of identity: who the person really is behind any given device and whether they are behaving abnormally.

This is particularly helpful when identifying attackers that have managed to acquire privileged user credentials.

Identifying Normal Behavior
One way to reduce the scope is to focus on the highest risk identities first. If you accept that the greatest risk comes from people inside your organization that can access sensitive information – known as “privileged users”, which can also include non-human accounts that may have access – then the correct steps are as follows:

1) Reduce the number of privileged users/identities and accounts.

2) Limit the privileges any one user has to systems and applications necessary to do their job.

3) Integrate the identities of privileged users into security and risk monitoring to spot behavior that may indicate a breach.

Closing the Gap
As more and more of the computing environment breaks outside of the control of central IT organizations, spearheaded by the move towards BYOD (or Bring Your Own Device), the ability to recognize who a user actually is and what is normal for them becomes a foundational part of effective security monitoring.

Without such identity-powered security, security teams will continue to struggle to differentiate whether the events they are monitoring are worth a reaction and that hesitation allows attackers to execute more and more damaging data breaches.

Furthermore, security teams will continue to operate in reactive mode and fail to prevent breaches or respond in a sufficiently timely way.

If identity is a central component to security management, then security teams will be in a better position to understand the behavior of users and will spend far less time trying to identify the meaning behind the events they are seeing.

People will continue to be our biggest point of exposure and with a keen focus on user behavior and activity, we will be in a much better position to limit the impact of breaches.

(Image Source: iCLIPART)

Tips To Protect Your Business PC From Malware

October 31, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

In today’s online world, technology users are essentially in a state of near-constant attack. Almost every day, there’s a new data breach in the news involving a well-known company and, quite often, fresh rules for protecting personal information are circulated.

Because of malware in email, phishing messages, and malicious websites with URLs that are one letter different from popular sites, employees need to maintain a high level of awareness and diligence to protect themselves and their organizations.

Phishing activities are especially pervasive, including attempts to steal users’ credentials or get them to install malicious software on their system. The astonishing success rate of phishing attacks makes them a favorite.

Why? More than 70% of people will follow the link to a phony website and, of those that followed the link, 30%-50% will routinely give up their usernames and passwords.

Many like to think of the network perimeter with all its firewalls and other fancy technologies as the front line in the cyber war, but the truth is there’s a whole other front.

Every single member of a company’s staff who uses email or the Internet is also on the front line and these people are generally considered a softer target than hardware or software. It’s simple: if the bad guys can get an employee to give up his or her user credentials or download some malware, they can likely waltz right past the technological controls, basically appearing as if they belong there.

When using a computer for personal functions, a user generally has to have the ability to install software and modify the system configurations. Typically, such administrative functions are not available to all users in a corporate environment.

c471994_mAs a result, even if an organization has made an effort to improve a system’s security, a user doing work on a personal computer has the ability to disable and circumvent protections and has the privileges to allow for the installation of malware.

As companies migrate toward a world of bring-your-own-device policies, some companies are developing strategies to help address these risks. But, as a rule, using a work computer for personal reasons or doing work on a personal computer (or tablet or smartphone) can significantly increase the threat level that an employer has to protect itself against.

To help their organization protect systems and data, employees need to implement some smart web browsing habits. Smart web browsing means engaging in the following activities:

Beware of downloads
Malware can be hidden, not just in applications or installation programs, but in what appear to be image and video files also. To limit the likelihood of downloading content that contains malware, only download from reputable sites. With sites that are not a household name, take the time to do a little research and see if other people have had issues.

Additionally, be sure that antivirus software is set up to automatically scan downloads. Or scan downloads manually, even when receiving them from name-brand sites, as it is not unheard of for infected files to make their way onto otherwise legitimate web sites.

This is especially true for file-sharing sites where the site owner cannot control every piece of content a user may place there.

Be wary of deceitful sites
Those running sites already breaking the law by illegally distributing copyrighted materials — like pirated music, movies or software — probably have no qualms about including malicious content in their downloads or stealing information.

Many popular web browsers today have built-in functionality that provides an alert when visiting a website that is known to be dangerous.

And if the browser doesn’t give a notice, the antivirus software may provide that function. Heed the alerts!

Employees need to protect their devices from online and in-person threats. Start by keeping the company’s system patched. Configure it to automatically apply updates or issue notifications when there are updates and then apply them as soon as possible. This doesn’t just apply to the operating system.

Keep all installed applications updated; sometimes this takes a little extra work.

Remember, the challenge of security is that the bad guy needs to find only one hole in a security system to get past it, so fix them all. Think of it as putting dead bolts on doors, but leaving the basement window wide open.

To that end, security professionals like to debate the usefulness of today’s antivirus software. And it’s true that malware continues to become more sophisticated and harder to detect. But it always amazes me how old some of the malware running around is. As a result, use antivirus software and keep it up-to-date.

Also, use a software firewall, either the Windows firewall or one provided in an antivirus package. This is especially true for laptops connected to public wireless access points at hotels or coffee shops, but it also applies to home systems. It just provides that extra layer of defense.

And finally, please, don’t ever give passwords to anyone. Be vigilant and question anything new, especially emails and forms in the web browser that request work credentials, no matter how nicely the request is made.

(Image Source: iCLIPART)

When Nature Strikes – Is Your Ark Ready to Float Your Business to Dry Land?

October 31, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

Flooding can strain the resources of even the most well-equipped organizations. Natural disasters give little warning to companies, so preparing for the disaster is the only way to reduce the high cost of rebuilding.

Have a plan ready and in place
Disaster recovery plans are now becoming a requirement for many industries. To be prepared, businesses need to locate and define the regulatory requirements of their individual industry. In addition to reducing hardware damage and data loss, this will help avoid fines, penalties or negative press associated with noncompliance.

The health care industry has begun to require that hospitals have a recovery plan in place. The Joint Commission on Accreditation of Healthcare Organizations (JCAHO) sets standards for operating a health care organization and evaluates the industry to ensure that these standards are met. Documented and field-tested recovery plans for theft, vandalism, loss of critical data, provision of emergency power, and file and flood recovery are now required.

Trying to implement or even design a plan while in the middle of a disaster will only lead to a less than successful recovery. Make sure your team is ready for action and everyone knows what to do. It’s better to be overprepared than have a plan with holes that will sink your business.

Your data: Make sure you have it
Back up your data regularly. Manage a duplicate copy of all data, programming, and company processes at a different physical location or in the cloud. That way, you can continue working at a secondary location if your system crashes.

One way to do this is to keep copies of all your data, programs, bare metal backups and virtual machines in data centers in other states or in some cases different countries.

Tech Experts offers encrypted, HIPAA-approved, online c414084_mbackup of your files, documents, folders and data bases. If you require bare metal backups or the ability to convert your server into a virtual machine to keep afloat until replacement hardware is in place and running, Tech Experts also offers devices that can fulfill that requirement as well.

Treat your data like your money
Keep it safe and keep a lot of it.

Power: Must have it
An uninterruptable power supply (UPS) and a generator provide consistent backup power for your business if power lines go down. Make sure you routinely test and service them to ensure they’re working correctly.

Electrical components, including service panels, meters, switches, and outlets, are easily damaged by flood water. If they are underwater or come in contact with water for even short periods, they will probably have to be replaced. Make sure all of your computer systems — from servers, workstations, backup devices, and UPS’s — are up off the floor. Servers, backup components and UPS’s should be at least four feet off the floor.

Another problem is fires caused by short circuits in flooded areas. Raising electrical system components helps you avoid those problems. Having an undamaged, operating electrical system after a flood will help you clean up, make repairs, and return to your property with fewer delays.

Good relationships with vendors, customers and partners
Create strong relationships with your partners, vendors and customer base. In good times, they will give you access to new ideas, technologies, and business opportunities. During a crisis, they’re a security blanket with teams of people who know your business model and have resources to help you rebuild.

Insurance: Business is life
Floods and water damage are expensive. Business insurance is crucial and it’s not only for physical property. The right kind of insurance will replace lost income as well. Make sure your business insurance policy is up to date and has the correct coverage to support your business in crisis mode.

If you have questions or you’re looking for suggestions on prepping your business for recovery, call Tech Experts at 734-457-5000.

(Image Source: iCLIPART)

Why Is Network Security Important For Your Small Business?

May 30, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

Network security is very important to all networks big or small. The purpose of network security is to prevent loss, through the misuse of data.

There are a lot of issues that can arise when network security is not properly implemented and maintained, a few issues include, but are not limited, to the following: data destruction, data manipulation, and breach of confidentiality.

The most important layer of security is physical security, this should be the first line of defense for any network. An organization can have all the access rules, logical security policies, and Intrusion Detection Systems (IDS) in place, but nothing beats being protected at the physical level.

One of the simplest steps is to lock the door, for example the server room or network closet should have a physical door and lock that secures it. This can also include any items that may be vulnerable to theft or physical damage.

Another form of physical security can be having surveillance cameras monitoring the premises. This gives an organization that extra sense of security, especially after hours.
Earlier we discussed ways to secure the physical network, but what about the logical network? You do not want to be on a network that does not challenge you for logon credentials to access systems.

This is where authentication and password security comes into play. Securing a network with usernames and passwords can prevent unauthorized access to data and also provide measures that prevent unauthorized changes of systems.

System administrators can also implement a password complexity policy, which requires users to have passwords that are of a certain length, and contains a combinations of alphanumeric and special characters. It is also wise for users not to use any personal identifying characters in their passwords because this is usually the first things hackers look into.

The Internet is not a secure place, viruses pose a big security pad lockrisk to a computer network because there are so many out there. Without antivirus protection, a computer can get infected and may even infect other computers on the same network.

Depending on the purpose, or payload, of the virus, the viruses’ creator may have designed the virus to steal or delete information, render a system useless by using all resources, or even use the computer as part of a botnet. Antivirus software provides protection against most, but not all viruses.

Not only should users frequently update and scan their computers for viruses, but they must also be smart when browsing the Internet because many viruses can disguise themselves as legitimate software.

Firewalls are a great way to control the internal network traffic and also incoming traffic from the Internet.

While antivirus protection helps to protect a computer from potentially unwanted programs and viruses, a firewall can help to control network access into a computer system.

There are two types of firewalls: software- and hardware-based firewalls. Both provide similar functions, but it is best to implement a hardware firewall because it gives a system administrator the ability to make changes to a system as a whole, rather than at individual systems, or endpoints.

Within the firewall there are policies which allow or deny traffic based on the needs of the network. The most secure policy is a restrictive policy which denies all network traffic, this policy only allows essential network traffic to traverse the firewall.

If you have any questions about your network security give us a call at the office, (734) 457-5000, or email info@mytechexperts.com.

(Image Source: iCLIPART)

Mobile Device Management Is Key In Securing Your Network

November 27, 2013

by Jeremy Miller, Technician
Mobile devices have been finding their way into the workplace since the cell phone was invented. Since the evolution of mobile devices in the workplace is rapidly growing and changing it can be hard to make sure that your device is not leaking company information intentionally or even unintentionally.

Information Technology (IT) has had to evolve alongside mobile technology and how to secure devices without restricting too much access.

There are usually two options of allowing mobile devices in the workplace. You can provide your employees with a company owned device or you can allow them to use their personal device.

Providing your employees with a company owned device allows you to monitor every detail about the phone including calls, messages, installed apps and location of the device. This is possible because the employee can expect no privacy from the company on this device.

When you allow an employee to use their own device at work you have to take their personal privacy in consideration. You might not want to monitor their phone calls, messages and apps installed.

Instead you can make the device more secure. You can install monitoring software that will allow you to lock the device if it gets lost, wipe the device if you know it may have fallen into the wrong hands, or find the device by using GPS location.

We have the ability to install our monitoring software onto any Android or iOS device and choose a profile that will suit a personally owned device, a company owned device or we can even customize a plan that will suit your needs even more specifically.

Since mobile devices are prone to getting lost or stolen they need to be protected in the best way that you can. In most cases installing monitoring software is the best solution.

This is because we can monitor the phone without interfering with the device usage. Once the device is compromised we can act quickly to get the device secured.

On the other hand if you notice an employee is acting suspiciously you can monitor their phone usage to determine if they are wasting time or acting maliciously against the company and take action before something more serious happens.

The best part about managing your mobile devices through Tech Experts, is that we are very competitive with other personal phone security managers out there in both price and features.

Our prices are very affordable and services can be easily customized to meet your needs.

It takes just about as long as installing an app to your phone as it does to setup our management software on any mobile device running Android or iOS.

You will be able to rest assured that your mobile devices are virtually safe from data loss, your employees are using their resources and time accordingly, and in the event of an issue we will be there to assist you in any way we can.

If you are interested in trying out our mobile device management service please contact us and we will be happy to help you with any questions.

Network Security: Top Tips For A Secure Network

November 27, 2013

by Michael Menor, Network Technician
As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter security.

To ensure a sound architecture, you want to start with what ultimately must be protected and then design your perimeter security so it can scale as your needs grow/change. Since the threats you know about and face today may not be the ones you face tomorrow, you want to be sure your design is flexible enough to meet future needs.

Think of your network perimeter like a castle during medieval times, which has multiple layers of defense – a moat, high walls, big gate, guards, etc. Even in medieval times, people understood the importance of having layers of security and the concept is no different today in information security. Here are four tips:

Build layers of security around your castle
No defense is 100% effective. That’s why defense-in-depth is so important when it comes to building out your security. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by source/destination IP, port or protocol.

It’s very binary – either traffic is allowed or it’s blocked by these variables. The evolution of these network security devices has brought the Next-Generation firewall, which can include application control, identity awareness and other capabilities such as IPS (Intrusion Prevention Systems), web filtering, advanced malware detection, and more baked into one appliance.

Whether or not it’s part of your firewall or a separate device, IPS is another important perimeter defense mechanism. Having your IPS properly optimized and monitored is a good way to catch attackers that have slipped past the first castle defense (firewall/router).

The popularity of moving more into the cloud has brought cloud-based malware detection and DDoS (Distributed Denial of Service) services. Unlike appliance-based solutions these are cloud-based services that sit outside your architecture and analyze traffic before it hits your network.

Harden your device configurations, software updates and security policies
Here is where we start building those walls to prevent attackers from getting inside the castle. The first line of defense typically involves network security devices such as routers, firewalls, etc. which each act like the guards, gate, moats, etc. of long ago.

For each layer of security, you want to ensure they are running the most up-to-date software and operating systems, and that devices are configured properly.

A common misstep occurs when organizations assume they are secure because of their many layers of defense, but a misconfigured device is like giving an attacker a key to the castle. Another important practice is to tighten security policies (of course without impacting the business), so for example you don’t have a router allowing just anyone to Telnet to it from outside your network.

Enable secure network access
While firewalls, routers and other security layers are in place to prevent unauthorized access, they also enable access that is approved. So how do we let authorized personnel into the castle? The drawbridge of course! Next-generation firewalls can help here by scanning inbound and outbound user traffic, all while looking for patterns of suspicious behavior.

Password complexity also plays a big part in Secure Network Access. Ensure your users are following these common rules.

  • The password must be exactly 8 characters long.
  • It must contain at least one letter, one number, and one special character.
  • Two of the same characters sitting next to each other are considered to be a “set.” No “sets” are allowed.
  • Avoid using names, such as your name, user ID, or the name of your company or employer.
  • A new password shouldn’t be too similar to the previous password.

Another way to have secure access from the outside through the perimeter is to install a VPN (Virtual Private Network) that is configured to allow encrypted communication to your network from the outside. Utilizing two-factor authentication with a VPN contributes towards ensuring the integrity of the users making the request. This is external-facing to your network and allows users to tunnel into your LAN (Local Area Network) from the outside once the appropriate measures are taken to secure access.

Create and segment the DMZ
If firewalls, routers, web filters, etc. are the guards, moat, gate, walls of a castle, then the DMZ (De-Militarized Zone) is like the courtyard once inside the castle – another area before the private quarters.

When creating a DMZ, there should be at least a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules should be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services in the DMZ. From an internal perspective you also want to limit who can access systems within the DMZ. One approach is creating firewall rules to only allow the source IP addresses and port to the specific server and then adding proxies in the network from which admins are allowed access to the systems.

Segmenting systems within the DMZ is also something to strongly consider so that if a system is breached in the DMZ, it can’t spread as easily. For example, you don’t want a web server passing data to an application or database server in a “public DMZ.” Configuring systems within different VLANs (with a layer 3 switch) will help you isolate and respond to incidents if a server in a DMZ is compromised.

A sound network security perimeter architecture requires multiple layers of defense, up-to-date and hardened policies and controls and segmentation. All of these things make it harder for an attacker to gain access to your crown jewels and easier for you to isolate and respond to breaches when they occur.

Why An Organized Cabling Plan Is Good For Business

July 25, 2013

by Jeremy Miller, Technician
When you need to begin to cable a building for a business it is a good idea to plan ahead to prevent many issues that you can encounter.

Cabling can be different for every organization. Some organizations move into a new building and need to cable the entire building. Other business may only need to add to the existing cabling.

It would be best to look and see how the cables can all be run throughout the building. Most commercial buildings have drop ceilings that make it easier to run cable.

You will want to check which directions you can run cable. There may be walls or boundaries that are not able to have cable ran through them.

You will also want to develop a standard wiring scheme or convention. This will make everything easier in the long run.

Most organizations have adopted the wiring standard T-586B. If you continue to wire all cable with the same standard then it will make the job easier for you and anyone who needs to add an additional cable after your installation.

There are some things to keep in mind while running the cable. It is best to leave about a foot of extra cable in a single loop above your drop.

This will ensure you have enough cable if you make a punch down error, or want to upgrade in the future. Don’t create a coil of cables as this will cause a magnetic field that will disrupt the data.

With all of this in mind you will need to determine exactly how many data and voice drops you will need to install.

Make a document detailing which room needs what cables and where they need to be placed on the walls.

It is best to color coordinate the cable, for example you would use blue cable for data, white cable for voice, and another color if you need to run other cable such as Ethernet cable for a security system. This will let you easily detect which type of cable you are working with.

If you are installing phones you will want to punch down the same pairs of wires in the same order. This will allow you to terminate the phone systems in your telecomm room more efficiently. Efficiency is essential when undergoing a time-consuming project.

Cable management is important regardless of how many cables you have ran. Your telecomm room can easily start to get out of control with all of the different cables coming into a single location.

There are many ways of organizing your cable, but it is best to plan this before you begin to run any cable. This will also make sure that all of your cables will be long enough to reach the punch-down panel in your telecomm room.

If your business needs help with a cabling project or if you have any questions about cabling give us a call.

The Benefits Of Proper Networking For Your Business

May 17, 2013

By Tech Experts Staff
Many times a company’s network tends to be a difficult part of their infrastructure to decide what they really need.

There are many different ways of configuring a network depending on the company’s needs.

A network can be as simple as having your Internet Service Provider’s modem connected directly to a workstation or as complex as having thousands of workstations and servers connected to a company’s network around the world.

Deciding on what is needed for your network is completely dependent on the intended uses of it. Many factors contribute to this; security, size of network, locations, speed necessary, etc.

For most small companies, they can usually get by with a simple router that has a built-in firewall solution.

While the simple routers take care of giving access to users hardwired to the local network, and in some cases via a wireless connection, they don’t offer the features that a higher end router would.

Many companies have multiple sites that they want to have access to all the same files. One solution is purchasing cloud storage to accomplish this.

While that would be a great idea if you needed access when you are not on your companies network, a much more economical solution is to have a virtual private connection (VPN) setup between sites.

If a VPN is setup between sites the traffic is encrypted with a shared key between the routers which allows the two of them to pass traffic to each other without anyone being able to see what it is.

This allows you to safely send confidential information to members at a different site.

The biggest advantage of a VPN between sites is the ability to have one server at a centralized location and allow all of your sites to have access to it.

This alone can save thousands of dollars when it comes to the network build, you only need one server.

When it comes to having a server, if properly configured they can provide a significant amount of security on the network.

Servers improve security by offering centralized management and providing a means to allow or deny access to files on the network.

For instance, you may have accounting files on a network that you only want certain employees to have access to, with a server you can assign specific users access to these files.

Some routers also have the ability to manage bandwidth. This provides companies the ability to manage the amount of data users can use for different applications.

Many large companies need the ability to control how much bandwidth is being used and what is using it. With higher end routers you have the ability to do this.

On the business class firewalls we generally install at businesses they offer a large package of security tools to help protect your network.

Our business class firewalls offer all of the routing capabilities of the simple, home user routers but also offer antivirus, web filtering, antispam, intrusion prevention system (IPS), and vulnerability management.

The business class firewalls drastically improve a business’s security as well as offers many of the features listed above.

If your business is in need of network improvements to increase security and employee productivity, give us a call and we can offer you a network diagnosis to determine what your company’ needs are and where your networks weak points are.

Common Network Problems Resolved

February 12, 2013

By Tech Experts Staff
It’s amazing how easily network problems can turn into a huge headache for businesses and home users. If you don’t have guidance when purchasing equipment, or don’t know how to properly maintain and troubleshoot issues, you could be down for hours or days.

While network problems and questions are very common, there really are simple solutions to them. This month we’ll take a look at the most common network related questions and problems and how we generally resolve them.

The first question we regularly hear, most often from home users, is “How do I know what kind of equipment to purchase?”

That isn’t that hard of a question. Generally, with network equipment, it comes down to the old saying “You get what you pay for.”

When you buy networking equipment, whether it’s a switch to expand the number of available connections on your network, or a router, don’t buy the lowest priced one you can find.

There’s a reason one piece of equipment is more expensive than another. Generally, the price difference means drastic differences in the speed of the unit, number of available ports, range, and in some cases security features.

So, when buying network equipment, don’t scrimp – you’ll end up with a slow network lacking in features.

Even when you have good equipment in place you can still run into network problems. The most common issue on a network tends to be a malfunctioning device.

It is normally much less expensive to try replacing a device as a first step to resolving a problem than it would be to have a tech go around and test every device on the network.

For example, if your network is having issues with slower than normal connections, high latency, etc. it is entirely possible that your switch or router has begun to fail.

With consumer grade network equipment, routers and switches can fail as much as once per year depending on the quality of the device and how well you’ve protected it from power surges.

If you’ve replaced your router and/or switch, and you continue to have high latency and strange issues, the next step is to check your network cables.

The cables you’ve been moving around over the years and putting stress on may have faults that are causing problems.

At this point, a tech would need to go through and test the cabling to make sure there are no issues with them.

A cable that is either wired improperly or is starting to fail can cause problems that will affect a network in many ways.

Sometimes, depending on the severity of the fault, it can cause intermittent failures resulting in spotty connections. If a cable fails altogether it can prevent a user from being able to connect to the network entirely.

Once all of the cabling issues are straightened out and we know our devices are good, you may still have a computer acting up on the network.

In that case, it is possible that the network interface card (NIC) is failing. Sometimes this can be a hardware problem where the NIC fails, but sometimes it is possible that the software on your computer is causing problems with it.

For instance, a NIC takes drivers for the operating system to allow it to communicate on the network. If you have the wrong driver installed, or the driver is corrupt, it can cause a lot of network problems.

Another possibility is a virus or other malicious software installed on the computer.

Depending on what the virus is designed to do it could be causing the problem with your computer’s ability to connect to the Internet.

Depending on the severity of the infection and what it was designed to do, it is possible that a virus could cause the entire network to run slowly.

What it all comes down to is that it is really best to have a professional diagnose network issues and work with you directly when trying to get equipment for your network.

With the number of variables involved, if you don’t deal with networking on a regular basis it’s fairly easy to be confused.

Feel free to contact us anytime for advice on network upgrades and help diagnosing problems with your network, firewall, switches or routers.

Increase Network Security And Productivity

January 25, 2013

By Tech Experts Staff
As a managed services provider, we regularly consult with companies about issues they would like addressed. We find that many times, a simple solution can correct their issues in one fell swoop.

What are some of the biggest concerns businesses have? The top three we hear most often are security, productivity, and network speed.

These three main issues encompass many other common issues businesses have to deal with on a daily basis and are easily resolved.

In these days with high profile businesses such as Sony, GoDaddy, Verisign, etc. being hacked this past year it’s easy to see why security is of utmost importance.

Many businesses store confidential data such as credit card numbers, social security numbers, or other personal information on their servers, and because of this, must protect that information at all costs.

So, what’s the solution to this? Having good security policies in place is a start, but a giant leap in the right direction is having a business class firewall in place.

We offer Fortinet firewalls which, when properly implemented, can stop unauthorized network access in its tracks.

Fortinet firewalls offer many different security features to keep your network safe.

Network protection features include an Intrusion Prevention System (IPS), built-in antivirus solutions, and Data Loss Prevention (DLP) services. Fortinet firewalls protect your company’s, and more importantly, your client’s, private information.

Fortinet firewalls also offer the possibility of huge boosts in productivity.

In a recent study conducted by Salary.com it was found that employees waste on average 1.86 hours of work per day. That’s almost 25% of the work day!

So if this rings true to your company, you’re paying each employee for three months of work each year that they are not even doing!

What are your employees doing that is wasting so much time? Studies show that 52% of the two hours per day that employees waste were spent on non-work related websites like Facebook and Twitter.

While many companies don’t think this goes on in their business, the moment we put in one of our Fortinet firewalls, we almost always find someone on websites they were not supposed to be on during the work day.

Keeping these figures in mind, the costs associated with not having measures in place to stop these kinds of activities far out weighs the actual costs of having one of these units installed.

Once the unit is installed, we can implement web content filtering so employees cannot access time wasting websites.

Users that need access to these types of websites, like the owner of the company for instance, can have credentials to be able to override any filtering in place.

The final item that businesses strive for is a faster network. While this can be dependent entirely on the Internet connection speed your business has, it is entirely possible to have a high speed connection and still feel like your Internet is terribly slow.

So, this again goes back to web filtering. Users should not be able to download from unauthorized sites or do any activities on the network that take a large amount of bandwidth.

Also, if you have a couple of separate Internet connections, it is possible on some of our higher end Fortinet firewalls to have load balancing in place to help better distribute the load of connections out to the Internet if need be.

Whether you’re in a small business with a handful of employees or in a medium to large size company with potentially hundreds of employees, we have a firewall solution for your business.

Fortinet firewalls allow you to better manage your company and increase security, productivity, and network speed significantly.

 

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.