A Quick Refresher On How To Keep Your Business Safe

If you connect it, protect it

As more and more technology becomes a part of our personal and business lives, the line between our online and offline self has become increasingly blurred. Stay Safe Online reminds us that any device we connect to our home and business network needs to be protected and each has some amount of risk associated with the connection. So all of our smart thermostats, TVs, doorbells, alarm systems, and refrigerators need to have the appropriate protection policies in place.

Securing devices at home and at work

The global pandemic has removed the boundaries between “home” and “work” as much work was completed while at home. Remote work was already well on it’s way to becoming the new normal of work the adoption of the strategy was accelerated. With devices connecting from both our home and our physical workspace, this has opened the doors to a different kind of cybersecurity concern and how you can protect both.

Securing Internet-connected devices in healthcare

More and more healthcare facilities, from senior living to urgent care centers, are using Internet-connected devices in the day-to-day care of their patients. Tele-medicine has quickly emerged as a way for patients to receive care and doctors to give it as a result of COVID-19, but this opens both patients and providers to unique cybersecurity challenges. Strong passwords and encrypted Wi-fi will help to keep data secure.

The Internet Of Things Can Poke Holes In Your Network

Mark Funchion is a network technician at Tech Experts.

Some business owners spend a lot of time protecting their network. After putting a firewall in place, configuring security settings, and setting up users with complex passwords (and possibly even 2FA), it’s easy to think that’s secure enough.

Now, having that solid foundation and framework is great. If you’ve done that, you’re definitely on the right track. But you still might leave yourself open to exploitation without even knowing it.

How does that happen? IoT – the Internet of Things.

You’ve secured your business network, but what about the smart watches, fitness trackers, connected speakers, thermostats, and every other device with a battery and a tiny signal? Every single one of those devices is a potential inroad to your network.

For example, a user’s watch connects to their cell phone, which is connected to your business’s Wi-Fi network. With no firewall on the watch, that creates a potential path into your network.

All of these devices require an IP address. In the past, forty people only needed fifty IP addresses to allow everyone to connect their one device to the network, including wiggle room for guests.

Now, every person has a laptop, cell phone, and some sort of accessory – each with its own IP address.

Each of these devices are transmitting a tiny amount of data, but that data and usage grows exponentially.

Plus, if you don’t have that wiggle room for extra connections, you’re more susceptible to a denial of service (DoS) attack, which is when cybercriminals overwhelm your network with traffic and bring it to a halt.

Your network needs to be able to handle an increase in traffic while also securing all that extra information that you do not have control over.

It is scary and overwhelming, but you can take steps to secure yourself without going too far.

The easy way is withholding access to anything that is not corporate-owned and approved. However, limiting all these devices can have a negative impact on your business and its operation.

Instead, take a measured approach. Make sure your firewall is up-to-date, and monitor who is trying to access your network. Limit that access to the smallest “allow” list you can without making it impossible to work.

For all the smart things like watches and thermostats, keep these IoT devices on a separate virtual network. Encourage and educate users to keep their devices up-to-date – and to use them responsibly while on the network.

Cyberattacks are always increasing and changing, and a strong defense makes a considerable impact when it comes to preventing huge losses in productivity, data, business reputation and funds.

Developers know this too, and that’s why it’s important that your devices – all of them, from servers and PCs to security cameras and thermostats – are all kept up-to-date. These updates help patch up holes in the firmware and software that can otherwise be exploited.

We’re big proponents of the “an ounce of prevention is worth a pound of cure” philosophy. If you need help closing up any gaps in your network security, Tech Experts can assist.

We can conduct a network survey, set policies and passwords, segment and restrict access to/from your network, and ensure the right people have the right access.

As cyberattacks against small businesses mount, the time to fortify your first line of defense is now, before it’s too late.

Network Changes Can Affect More Than Your Internet Connection

Mark Funchion is a network technician at Tech Experts.

There are some areas of your technology that you may think of as “your area” to handle, but often, what might seem like a minor change or swap can be more complicated. This is especially true when it comes to any changes you make to your location that involve your network or Internet in any way. When it comes to these, we may be able to assist or at least make the transition easier.

One example of this is your Internet service and your Internet provider. Maybe you have Service A, but Service B calls and offers you more speed for less money. Sounds great! You sign up and schedule the install. Service B shows up, installs new equipment, and leaves after testing the connection from their device. The next thing you know, your PCs are not working, your phones are having issues, and no one is happy with the change.

The cause of the issues? That equipment relies on the Network Address of your Internet device (your modem), and when you change providers, this information changes too. The same thing can happen even if you are just upgrading or getting new equipment from the same provider. When they come out and do the basic set-up at your home, everything typically reconnects fine, but at your business, there are usually too many moving parts for that to work.

This also applies if you change your phone system. If you have an old style phone system and are switching to an IP-based phone system or you move from one IP provider to another, there are rules in place on your equipment that would prevent this change from working properly.

The easiest way to lessen the chance of issues is to call or email us first as far ahead as possible. We can assist in the transition and make it easier on you and your staff. In addition, planning ahead avoids a disaster where your location suddenly goes down and everyone is scrambling to find the cause.

Sometimes, it may not seem like we need to be involved – especially when, on the surface, it seems like a simple swap or adjustment – but it’s much better for us to be available for you in case of an issue. Your network is full of tiny moving parts that are reliant on other tiny parts, so often, things that may not seem like they would be affected can be.

Allowing us to use our expertise and experience not only simplifies your day, but also makes sure you get the right solution for your business rather than relying on the cable, Internet, or phone company to make a recommendation when they do not know your business like we do.

Remember: we are your partner, and the happier your network is the happier we all are. Please reach out when you’re considering a change in your network, Internet, or phones, so we can make sure the change goes as smoothly as possible and doesn’t leave you scrambling after the fact.

What’s The Difference Between Internet, Intranet, & Extranet?

The terms intranet, Internet, and extranet are often used interchangeably; however, there are some important differences between them. To better understand these differences, it is useful to look at the prefixes.

The prefix intra means within, inter means between, and extra means beyond. So how does this translate to online-based networks?

Basically, the Internet is an open entity that anyone in the world can access. It is open to everyone who has a working computer or device and appropriate Internet access.

An intranet is a private network that is typically limited to authorized users.

For example, most major organizations operate some form of intranet that only employees of the business can access and use. Intranets are usually employed to support a corporate culture and objectives and provide a platform on which employees can share information, communicate, collaborate, and network.

They are generally faster than the Internet because the information is stored on local network servers as opposed to being accessed from data centers throughout the world.

An extranet combines some elements of both the Internet and intranet. It is open to people both within and outside an organization; however, only people who have pre-arranged authorization can access it. An extranet is a restricted network that some, but not all, members of the public can access. A company may develop an extranet to create a mechanism by which it can connect with suppliers, customers, and other external agencies without making the content visible to the general public.

Network Security: What Does Your Firewall Do For You?

Jason Cooley is Support Services Manager for Tech Experts.

“Security.” It’s a word that we are all familiar with, but it can have many different meanings depending on context. Security to people nearing retirement age may mean financial security for their future.

At a large event like a concert, it could mean both security guards and the overall security of the event.

However, as time goes by, the word security has become increasingly related to the digital world.

Using the Internet to pay bills, access banking information, or even applying for loans is commonplace. We must be prepared to protect our identity and personal information.

Now, whether you are talking about your home or your business, network security starts with a firewall.

So what is a firewall?

A firewall, in terms of network security, can be a physical device that your incoming and outgoing data is routed through. It could also be a program on your device that can strengthen and supplement your devices’ security.

Both of these have different capabilities and purposes and can be used individually or together.

While there are different types, their essential function is the same. A firewall is put in place to allow or deny traffic, based on a set of security rules.

In a business setting where many staff members use a computer daily, a firewall can be put in place to block unwanted traffic.

A simple security rule to check for secure certificates can stop unwanted traffic easily.

Websites have security certificates, so when you access a page, your firewall can check the certificate. If the certificate is digitally signed and known as trusted, the firewall will allow traffic to proceed.

Search results can often display links of potentially harmful websites.

A firewall adds a layer of security making sure your employees don’t accidently find themselves on a website that could compromise your network.

This same principle works for home networks and can allow you to set some security rules. These rules can be put in place to help keep Internet usage safe, especially with children around the house. A firewall can also block certain content.

In an office setting, you could turn off access to social media to stop staff from accessing sites that aren’t needed to complete work.

It can block certain search engines and even limit the use of unsecure versions of websites.

At home, you can block content from websites you don’t want your family to have access to.

There is also the option of having active network times. You can have your Wi-Fi network only active during business hours, keep your kids off their devices at bedtime, or limit access to certain days.

There are many other things that your firewall can do to help keep your network safe.

Keeping your network secure has the potential to save you thousands of dollars, depending on the number of devices and your dependency on those devices.

Safety and security always has a high value to you. It can also help you rest easier knowing that either your business, or your family, is a little bit safer.

Do I Really Need A Firewall For My Business?

Ron Cochran is a senior help desk technician for Tech Experts.

Before we answer that, let’s look at what a firewall actually is. No, no actual flames of any kind are involved whatsoever.

A firewall is a barrier or “shield” intended to protect your PC, tablet, or phone from the data-based malware dangers that exist on the Internet. Data is exchanged between your computer and servers and routers in cyberspace, and firewalls monitor this data (sent in packets) to check whether they’re safe or not.

This is done by establishing whether the packets meet the rules that have been set up. Based on these rules, packets of data are accepted or rejected.

While most operating systems (desktop and mobile) feature a basic built-in firewall, the best results can usually be gained from using a dedicated firewall application, unless you know how to set up the built-in firewall properly and have the time to do so.

Firewall applications in security suites feature a host of automated tools that use whitelisting to check which of your applications should accept and reject data from the Internet — something that most users might find far too time consuming to do manually.

So it makes sense, now that it’s clear what a firewall is for, to have one installed and active. But just in case you’re still doubtful of the benefits…

Everyone who accesses the Internet needs a firewall of some kind. Without one, your computer will allow access to anyone who requests it and will open up your data to hackers more easily. The good news is that both Windows and Apple computers now come with built-in software firewalls (although the Mac’s firewall is turned off by default).

But businesses, especially those with multiple users or those that keep sensitive data, typically need firewalls that are more robust, more customizable, and offer better reporting than these consumer-grade alternatives.

Even a relatively small business engages in exponentially more interactions than an individual, with multiple users and workstations, and customers and suppliers. These days, most of those interactions are online and pose risks.

Not only are businesses exposed to riskier online interactions, the potential damage from each interaction is also greater. Businesses frequently keep everything from competitive bids and marketing plans to sensitive banking and customer data on their computers. When unprotected, the exposure is enormous.

Firewalls also allow computers outside of your network to securely connect to the servers that are inside your network. This is critical for employees who work remotely. It gives you the control to let the “good” connections in and keep the “bad” connections out.

Hardware firewalls must be compatible with your system and must be able to handle the throughput your business requires. They must be configured properly or they won’t work and can even stop your network from functioning entirely. You can use multiple hardware firewalls to take advantage of differing strengths and weaknesses.

Some industries (like medical and financial services) have specific regulatory requirements, so it’s important to consult your IT professional before choosing a firewall to make sure you’re not exposing your business to unnecessary liability.

It’s also important for you, or your IT service company, to constantly monitor the firewall to ensure it is up and working, as well as to ensure that it is regularly updated with security patches and virus definitions.

If you currently are not protected by a firewall or would like to inquire about an upgrade to your network infrastructure, please feel free to email (info@mytechexperts.com) or call (734-457-5000).

Should Your Small Business Use A Domain Network?

Luke Gruden is a help desk technician for Tech Experts.

If you have 5 or more computers that are sharing files and are constantly being worked with, a domain network would be in your best interest.

A domain network using a server has many benefits to a work area, a work building, or even multiple buildings using VPN. The flexibility, security, and convenience of a domain is, in most companies, invaluable. Sign into your account from any computer that is a part of the domain and you no longer need to use only your personal computer to access files.

If something were to happen to your computer, you could just use another computer to sign into your account and continue working without much downtime. This is also a far more secure way for users to access other computers as they have to use their credentials and only have the permissions that their credentials provide, not those of the computer itself. As long as users are not sharing passwords, you can have every user accounted for, policies implemented, and control what they can and cannot access when it comes to Internet, files, and programs.

Secure file-sharing is an easy and basic function of a domain server with Active Directory, which all the computers connected to the domain have access to. If you wanted only certain users to have access to certain files, you can have folders set up that prevent unauthorized editing, but still could be read — or even not be seen at all.

Having 5+ workers able to access the same set of files to edit as needed is an amazing way to save time and improve project efficiency. Everyone can see the file as it is saved or changed and they can continue to edit records as necessary without ever having to go on the Internet or transfer the file. Just get on any computer on the domain and you have instant access to the files that you need without a second thought.

Active Directory is your IT department’s best friend when it comes to handling large or small groups of computers as IT can access the domain server to make adjustments to other computers without ever stopping the work flow.

Forgot your password? Your IT can very easily use the server and reset your password for you without having to go to your computer. Setting up a new computer that needs certain printers and drivers installed? IT can set up the server to push those standard programs and drivers without having to install each individual program. Need to set up a new user account? It’s created on the server and the user can be accessed on all computers. There are so many possibilities that open up when you have a server domain available for your workstations.

We have only scratched the surface of what’s possible with a domain server and the amount of time and effort it can save for everyone in the company. I believe every business that is looking to grow should have a domain server early on as it will be easier to set up and can evolve to your needs as your company grows.

If your company needs help setting up a domain network, you can count on Tech Experts to take care of it.

Top Seven Network Attack Types So Far In 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

There’s no doubt that small businesses are under attack from hackers and cyber-criminals. Typically, small companies have less secure networks and looser security standards, making them easy targets.

The latest Threat Report from McAfee Labs details the types of attacks against small businesses. The chart shows the most common network attacks detected in Q1 2015.

Denial of service attacks – 37%
A denial of service (DOS) attack attempts to make a resource, such as a web server, unavailable to users. These attacks are very common, accounting for more than one-third of all network attacks reviewed in the report.

A common approach is to overload the resource with illegitimate requests for service. The resource cannot process the flood of requests and either slows or crashes. [Read more…]

Remote Employees And Network Connections

Scott Blake is a Senior Network Engineer with Tech Experts.

As businesses begin to downsize their ecological footprint, the need for remote or satellite employees grows. Business leaders and owners are now faced with the daunting question on how to allow remote employees access to their existing network without compromising network security.

One of the best ways to accomplish this is through the use of VPN.

VPNs allow secure access to business resources by creating encrypted pass-throughs via the Internet. The Internet, combined with present-day VPN technology, allows businesses a low cost and secure means to extend their networks to their remote employees.

The two most common methods in which to set up remote access are IPsec (IP Security) or SSL (Secure Sockets Layer). Both methods work well and both have their advantages depending on the needs and size of your business.

VPNs created using SSL technology provide remote-access connection from almost any Internet-enabled location or device using a web browser interface.

No special client software needs to be preinstalled on either device. This makes SSL VPNs a true “anytime, anywhere” connection to company-managed desktops.

There are two different SSL VPN connections to choose from: clientless and full network access.

Clientless requires no special software. All traffic is transmitted and delivered through a web browser.

There is no need to install or download any unique software to establish the connection. With clientless access, only web-enabled programs and apps are able to be accessed, such as email, network file servers and local intranet sites.

Even with such limited access to network resources, this style of connection is well-suited for most businesses.c868266_m

Additionally, because there is no need for special software to be supported by the IT department, businesses can cut down on managed overhead.

A full network access VPN allows access to almost any program, application, network server, and resource connected to your business network. Unlike clientless access, full network access connection is made through the use of VPN client software. Because the client access software is dynamically downloaded and updated, it requires little or no desktop support.

As with clientless access, you have the ability to customize each connection based on employee access privileges. If your remote employees require the full functionality of installed programs and applications as if they were sitting inside the office building, utilizing a full network VPN connection is the obvious choice.

IPsec based VPNs are the staple of remote-access connection technology. IPsec VPN connections are created by using installed VPN client software on the user’s workstation and connecting device.

Client software allows for greater customizability by modifying the VPN client software. Businesses are able to configure and maintain the appearance and function of the VPN client, which allows for easier implementation for connections with other desktops, kiosks, and other special need cases.

Many businesses find that IPsec connections meet their requirements for the users, but the advantages of self-updating desktop software, accessibility from non-company managed devices, and customizable user access make SSL VPNs a front runner for remote-access connections to your office.

If you have any questions or would like more information about how a VPN can help your company, you can reach Tech Experts at (734) 457-5000.

(Image Source: iCLIPART)

Why Is Network Security Important For Your Small Business?

Michael Menor is Vice President of Support Services for Tech Experts.

Network security is very important to all networks big or small. The purpose of network security is to prevent loss, through the misuse of data.

There are a lot of issues that can arise when network security is not properly implemented and maintained, a few issues include, but are not limited, to the following: data destruction, data manipulation, and breach of confidentiality.

The most important layer of security is physical security, this should be the first line of defense for any network. An organization can have all the access rules, logical security policies, and Intrusion Detection Systems (IDS) in place, but nothing beats being protected at the physical level.

One of the simplest steps is to lock the door, for example the server room or network closet should have a physical door and lock that secures it. This can also include any items that may be vulnerable to theft or physical damage.

Another form of physical security can be having surveillance cameras monitoring the premises. This gives an organization that extra sense of security, especially after hours.
Earlier we discussed ways to secure the physical network, but what about the logical network? You do not want to be on a network that does not challenge you for logon credentials to access systems.

This is where authentication and password security comes into play. Securing a network with usernames and passwords can prevent unauthorized access to data and also provide measures that prevent unauthorized changes of systems.

System administrators can also implement a password complexity policy, which requires users to have passwords that are of a certain length, and contains a combinations of alphanumeric and special characters. It is also wise for users not to use any personal identifying characters in their passwords because this is usually the first things hackers look into.

The Internet is not a secure place, viruses pose a big security pad lockrisk to a computer network because there are so many out there. Without antivirus protection, a computer can get infected and may even infect other computers on the same network.

Depending on the purpose, or payload, of the virus, the viruses’ creator may have designed the virus to steal or delete information, render a system useless by using all resources, or even use the computer as part of a botnet. Antivirus software provides protection against most, but not all viruses.

Not only should users frequently update and scan their computers for viruses, but they must also be smart when browsing the Internet because many viruses can disguise themselves as legitimate software.

Firewalls are a great way to control the internal network traffic and also incoming traffic from the Internet.

While antivirus protection helps to protect a computer from potentially unwanted programs and viruses, a firewall can help to control network access into a computer system.

There are two types of firewalls: software- and hardware-based firewalls. Both provide similar functions, but it is best to implement a hardware firewall because it gives a system administrator the ability to make changes to a system as a whole, rather than at individual systems, or endpoints.

Within the firewall there are policies which allow or deny traffic based on the needs of the network. The most secure policy is a restrictive policy which denies all network traffic, this policy only allows essential network traffic to traverse the firewall.

If you have any questions about your network security give us a call at the office, (734) 457-5000, or email info@mytechexperts.com.

(Image Source: iCLIPART)