Stop Phishing on National Clean Out Your Computer Day

Starting in the year 2000, The Institute for Business Technology began sponsoring a seemingly silly holiday called “National Clean Out Your Computer Day.” But unlike “Groundhog Day,” this tradition could actually help you protect yourself from harmful elements. With Spear Phishing attacks becoming more common and complex, February 11 is the perfect day to take a moment to make sure you’re doing your due diligence. Here are a few reasons why being more devout in your observance of this underrated annual ceremony is in your best interest.


It’s No Fun Being the Phish


Spear phishing might sound like a fun way to spend a vacation in Hawaii, but it’s actually a scarily sophisticated scheme that will quickly ruin the sunny disposition in your workplace. In a spear phishing attack, hackers pose as seemingly trustworthy sources and send emails designed to get you to click a link, download a file, or respond to an urgent request before you’ve fully thought things through. Spear phishing is usually targeted, with a long-term plan set in place to learn about you or your employees and fool the target with personalized information that makes the requests within seem reasonable and credible. Because human error is the most reliable vulnerability cyber attackers can exploit, these breaches are incredibly commonplace. An October 2017 study by the Better Business Bureau showed that 90 percent of cyberattacks targeting businesses come through phishing emails.


Unfortunately for many businesses, these attacks work because they’re very believable. A recent attempt targeted Netflix subscribers by sending emails addressing users by name and stating that their account had been deactivated due to billing issues. They were then linked to a site where they were asked to provide credit card details and other sensitive information. A breach like this is just one of many high-profile examples that show how a basic “fake email” tactic is enough to infiltrate even the largest organizations.


Celebrating Creates Peace of Mind


If appropriately spent, “National Clean Up Your Computer Day” on February 11 can be the perfect time to take all the proper precautions to prevent attacks like these.


Start the day by double checking your email filters. Email filters prevent spam and seemingly malicious messages from reaching you at all, so you won’t even consider responding to them. Taking this a step further, consider implementing a Sender Policy Framework (SPF) to help you prevent spoofing of your email addresses.


Next, do some cleanup. If you haven’t cleared them in a while, who knows what potential dangers are lurking in the darkness of your overflowing spam, inbox, and download folders? Getting rid of this unwanted clutter will remove potential pitfalls and create more space in your system to work with.


Finally, call a meeting and make sure your entire workforce is aware of the current risks and taking the same precautions. It’s always essential to make sure everyone in your organization understands potential risks and is on the same page about preventing hackers from finding a way to worm their way into your systems.


A Powerful Partner Can Protect You


Worried you might get phished? Celebrate “National Clean Out Your Computer Day” by partnering with an MSP who can help you stay safe. Working with Net Works will help alleviate stress about all types of phishing schemes and free you up to focus on the aspects of your business you really want to be worrying about. We will be your trusted partner who continuously arms you with the know-how and required tools to confront the latest cybersecurity threats. If you truly value your time and safety, contact Net Works today to learn how we can help keep you from staying late to clear out your computer.

Celebrate Data Privacy Day with A Disaster Recovery Plan

The New Year has arrived, which means you’re probably hard at work taking steps to achieve your New Year’s resolutions for your business. Hopefully, along with your growth goals, you’ve also set goals to improve your plans for disaster recovery in case of a data breach, systemic failure, or ransom attack. If not, you’re not alone, and it’s certainly not too late to start. In fact, oversights and ignorance about the importance of data security is one of the reasons Data Privacy Day is now an international holiday.


Every year on January 28th, the US, Canada, and over 40 European nations celebrate Data Privacy Day. Each year on this day, the National Cyber Security Alliance works to raise awareness about cyber security and promote best practices for privacy and data protection. While their efforts include efforts to educate individuals, a large focus of the initiative is to raise awareness for business owners on the dangers of data breaches in the age of the Internet and social networking.


Just as it’s crucial safety planning to change smoke alarm batteries yearly, Data Privacy Day is a great time to check in on your current security systems to see if there are any vulnerabilities and to find where you can make improvements. It’s also a good time to review your social media settings and change old passwords.


It’s likely that you’ve already taken some security precautions in an attempt to keep your business’ data safe, but it’s also important to have a fail-safe in place. Whether there’s a physical disaster that takes out your servers, like a bad snow storm, or a malicious attack on your data, like a ransomware attack, your business is still at risk and your assets need to be protected. Oftentimes, it’s not just your business’ information, but your clients’ information that can be at risk as well.


Not only can these types of incidents impede your ability to operate smoothly and efficiently, these disasters can be costly as well.


At Net Works, we know the devastating effect security breaches and data losses can have on your productivity and profitability. That’s why we offer comprehensive and thorough disaster recovery services that will keep your digital assets safe and accessible no matter the circumstances.


In order to offer you the disaster recovery plan that’s best suited to your organization’s needs, we will work together to build a customized plan for your business. The expert disaster recovery team at Net Works can help you explore different disaster scenarios and offer you the various solutions available so you can make an informed decision about the best course of action for your individual circumstances. By storing your backups in our secure, remote servers, your data will be safe from any localized attacks and dangers your business may face. Additionally, our team is available to offer you consultations and support to help address any further concerns you may have down the line.


While our goal at Net Works is to prevent any disasters from occurring, having a disaster recovery plan that’s been tested and proven effective for your business will give you the extra element of protection you need to rest easy that your business will thrive in 2019. Contact Net Works today to see how we can help make you more secure for this year’s Data Privacy Day.

Understanding Blockchain for Business

Have you heard about blockchain? By now, most business owners have, but that does not mean they know whether to build it into their IT strategy or not. If it’s challenging for you to find the time to keep up with the latest IT buzzwords, you’re not alone. Many, even most, small-to-medium sized business owners are focused on the day-to-day and long-term strategy of their business. They don’t have the time to pay attention to every new technology trend. However, you don’t want to risk falling behind or missing an innovation that could make a big impact for your company. That’s why Net Works stays up to date on the latest in business IT. We are here to help you stay knowledgeable so you can take advantage of the innovative technologies that make sense for your business.


Today, we will focus on helping you understand blockchain, which can be notoriously difficult for business owners outside of the IT world to grasp. You have most likely heard the term, even if just in passing, but what does it mean?


Essentially, blockchain is a form of shared digital record-keeping, originally developed in 2008 as a public transaction ledger for bitcoin. The transactions in each record (the block of information) link together forming a blockchain.


Three Key Business Benefits of Blockchain


1) Improved Trust & Consistency

How many transactions take place across your business each day, across how many partners? From orders to payments, when each party has their own record, the truth can get lost. Blockchain instead creates a single authoritative ledger of each transaction, which all parties must agree to. All transactions must be validated by all parties involved. They must also consent before a new transaction is added to the chain. Once entered, a blockchain record is extremely difficult to modify or remove. No transaction can be deleted, not even by an administrator.


2) Efficiency

This completely digitized record-keeping process eliminates inefficient paper processes that leave more room for human error and delays. With blockchain in place, you may be able to cut out the middleman for certain transactions, thereby cutting costs. For example, if you do business internationally, you may be able to use blockchain to make foreign transactions that would otherwise require a third-party service, thereby cutting the conversion cost.


3) Improved Security

Blockchain technology is harder to hack, and significantly improved cybersecurity may be the biggest benefit your business will see. Data is stored across a network of computers that verify information with one another. To infiltrate information stored in a blockchain, a hacker would need to compromise a majority of the computers in this vast network. Since hackers typically exploit human error to infiltrate the network through a single access point, this decentralization makes a big impact for cybersecurity. Better cybersecurity means better customer relationships. In today’s environment, businesses rely on customer data; meanwhile, those customers are hearing constant stories about data leaks and breaches. Strong cybersecurity practices can be a major differentiator in a climate in which customers are becoming more aware of business data practices.


These are just a few of the benefits that blockchain can bring to businesses. What could it do for yours? Contact Net Works to discuss blockchain’s potential applications for your business. Our team is here to answer your questions and help you develop a comprehensive IT strategy that evolves with the technology landscape.


Are Passwords Leaving Your Network Unlocked?

Passwords today are like spare keys that have been given out to too many friends and neighbors. Common password content like birthdays, favorite sports teams, or names of children or pets are easily found on social media accounts. With Thanksgiving around the corner and Black Friday sales emails flooding your inbox, you may not notice when a hacker poses themselves as a retailer in order to gain access to your accounts. Is your business prepared to take on the holiday hackers?


Cybersecurity is vital to a successful business, especially as these hackers try to exploit the companies they expect to be the least protected: small-to-medium sized businesses. Your accounts need an extra layer of protection so that your business network does not fall into the wrong hands. This is where multi-factor authentication comes in. Multi-factor authentication requires two or more pieces of evidence before a user is granted access to a protected account or device. We see this in practice all the time. For instance, at the ATM, the user must present both the correct debit card, and enter the right PIN. This is an example of two-factor authentication at work. The system works by requiring information the end user possesses, like a PIN or a password, with an object the intended user should have on hand.


Today’s businesses rely on cloud storage. The cloud is an incredible efficiency tool that empowers your workforce to access what they need when they need it. With that ease of access comes a risk that your information could be accessed by the wrong individuals, especially if you have not taken every precaution to secure it. When your sensitive business accounts and databases are secured only by passwords, you are putting yourself at risk, even when the passwords are complex and changed frequently. You need backup protection in the event that passwords are compromised.


There are many products that help you add this layer of protection to your network. Trying to sift through, select, and implement these products can be time consuming and confusing. At the same time, you know that an upfront investment of time and resources into cybersecurity can make all the difference when hackers strike. Multi-factor authentication creates more work for the hackers, and more opportunities for your defenses to protect your network. If someone is trying to invade an employee’s email account, guesses the password, but then needs to enter a randomly generated code that went to your employee’s phone or workplace computer, they may move on to invade a less protected network. Unlike a PIN, which suffers many of the same pitfalls of a password, these codes may only work for a limited period of time and have no personal connection to the user, meaning they cannot be guessed. This type of system gives you greater confidence that the people accessing your network are the ones meant to be there.


Setting up multi-factor authentication can have some unforeseen complexities, and is best handled by IT professionals who have the expertise and skill-set to implement this useful protection for your business.


Net Works has the experience and cybersecurity expertise you need to ensure your network is as secure as possible. Contact us today to talk about your next steps.


Attack of The Zombie Servers: Are Your Precious Resources Being Drained?


As Halloween approaches, you probably wouldn’t be too surprised to see a zombie or two. What you may not know, however, is that there are millions of zombies lurking in offices and data centers around the country year-round. These zombies might not hunger for brains, but they are scary for their own reasons.


Zombie servers are a common IT issue that is rarely discussed or addressed, despite its prevalence. The term is used to describe a server that’s physically running, but not performing any functions, and can refer to either physical or digital servers. While this might not seem like too big a concern, zombie servers can be a huge money sink, and in some cases, even compromise your network’s security.

Because physical servers can use up a lot of space and electricity, it’s incredibly wasteful to have them running when they’re not offering you or your business any benefit. Digital servers might not use up electricity, but they still often require costly fees to keep running. Potentially even more worrisome is the fact that zombie servers are often forgotten about, meaning they’re rarely updated or patched, and therefore vulnerable to malicious attacks or viruses. In these cases, they make easy prey of anyone trying to gain access to your data or network. To make things worse, some haven’t even been configured with an IP address – making them virtually impossible to discover without physically inventorying your data center. Because of this, it can be difficult to even realize that they’re there, making them even more difficult to sort out. This problem is primarily one with large data centers, but it’s one that can affect smaller businesses as well, where it can be even more imperative to save resources.


Now that you know the dangers of zombie servers, you might wonder how you can discover them at your own business. At Net Works, we know the risk zombie servers pose to your business’ efficiency and security, and we’re prepared to help. By partnering with us, we’ll perform a thorough examination of your IT infrastructure to analyze your existing systems to root out any zombie servers hiding in the shadows. Net Works will also create a personalized plan to remove any unnecessary redundancies, resolve any security risks, and keep your digital assets functioning as efficiently as possible.


Zombie servers can be the result of new systems being added without the older ones being shut down, servers not being decommissioned properly, or even just incorrectly estimating how necessary the server will be for whatever purpose it serves. Whatever the cause, the best way to prevent them is to have a dedicated and proficient Managed Service Provider monitoring your network to make sure all your IT resources are accounted for and serving a purpose. We are fully equipped to handle undead servers, as well as a number of other IT concerns.


Contact Net Works today, and we’ll make sure the only zombies lurking around your business this Halloween are the ones in costume.


New Threats you should know…. and be concerned with!

Is Your Business Ready To Face The Threat Of Ransomware Attacks?

Ransomware can be very profitable — if you’re a hacker. For example, according to a report by the security firm Sophos, the SamSam ransomware attacks, which target healthcare providers, have net the creator of this ransomware $6 million. The largest ransom paid so far was $64,000. Could your business afford an attack like that? As you can see, with stakes this high, hackers have plenty of motivations to utilize ransomware attacks. What can you do in the face of this threat?

First, it is important to understand what happens during a ransomware attack. There are two types of ransomware. In one type, your screen will be locked, and in the other, your files will be encrypted. In both cases, a ransom is demanded to either unlock your devices or decrypt your files. Often included is a ticking clock, and if you do not pay the ransom within a certain time frame, your files will be destroyed. Sometimes, it can spread to other devices in your network even without a user taking any action. Your files may be backed up, but you may not be out of the woods just yet. Some ransomware attacks can disrupt the ways in which your applications run, affecting your entire device. What is even worse is that in some cases, ransoms are paid without files ever being unlocked or decrypted. We are dealing with cyber-criminals who are known to be untrustworthy actors, yet businesses often find themselves left with no choice but to pay the ransom. With such devastating consequences, you need a plan in place to prevent these attacks and minimize consequences if prevention fails.

In order to understand how to prevent attacks such as these, you need to know how the hackers infiltrate your network. The most common method is through phishing emails, which makes your employees your first line of defense. A trusted IT partner like Net Works can help you and your team learn how to recognize suspicious emails. We can also help you navigate the decisions that must be made should your net-work become compromised by ransomware. With Net Works working on your behalf, you will not be facing these attacks alone. You will have a team of IT experts working for you who have seen it all.

Take the first step to protecting your business from the threat of ransomware. Contact Net Works. Together, we will build a strategy to fight off ransomware attacks, reduce downtime in the event of an at-tack, and minimize potential damages. We will help you understand all of your options so that you can avoid paying a ransom that may not even get your system unlocked. Our team is ready to defend your business, contact us today.

Is your business data on personally owned devices?

Is a Bring Your Own Device (BYOD) Policy Right for Your Business?


We are in the business of making sure you are prepared for what the changing technology environment will throw your way. One of the biggest current trends in business IT is Bring Your Own Device, or BYOD. This practice can happen with a clear, deliberate strategy and set policies, or it happens incidentally, with employees checking their work email on their personal computers, or accessing your cloud storage platforms from their phones or iPads. As a decision-maker, you need to determine how your business will handle this trend. Will you allow BYOD as long as employees follow a set policy, or will you insist on your team members using employer-provided devices? There are pros and cons to both. We at Net Works are here to help you navigate this and any other business IT concerns you might have.


First, it’s important to understand the benefits of BYOD practices for your team. BYOD empowers more flexibility for employees, allowing them to work when they feel inspired, access files when an emergency comes up, and work with the devices they feel most confident and comfortable using, rather than adjusting to, for example, Windows products at work while using Apple devices at home. Relying on the same device for work and personal use can also help alleviate small inconveniences, like going home for the weekend and realizing you forgot to send yourself an important file that is stored on the workplace desktop (this can also be solved through cloud storage solutions). Your employees may also enjoy small perks like having workplace software on their personal devices while being part of your team. For example, maybe an employee wants to get better at Adobe InDesign and practices on the weekend using the company account on their computer. As an employer, you benefit from employee morale boost. If bringing their own devices makes your team more productive, efficient, and happy, it may be worth considering.


Another benefit of BYOD is potential cost reduction. Instead of buying new hardware when you onboard employees, through implementing BYOD you may only need to cover supplemental software costs that get them up and running, and avoid lost productivity as the employee will not have to adjust to a new, unfamiliar device.


As you can see, there are many benefits to BYOD, but it is not without risk. Users tend to be more lax in security protocols for their own devices, and your business can end up paying the price for innocent mistakes made by your employees. Without proper cybersecurity practices in place, BYOD can leave your business network infected by viruses or infiltrated by hackers. When a team member leaves the company, they bring their device with them, and may forget to delete or turn over sensitive business information like passwords. Because of these risks, if you are going to allow BYOD, you need a set policy with guidelines for your team to follow. There is a good chance that your team is already using their own devices without realizing they could be putting your company at risk. It is time to take action.


Armed with this information, how do you move forward? Your first step is to call Net Works. We will help you explore the pros and cons of BYOD and identify whether it makes sense for your unique business. If it does, we will help you find the right tools and software to stay safe, and work with you to build a policy for your team to follow. Contact Net Works today to get started!

Declare Independence from Business IT Issues

Declare Independence from Business IT Issues


Are business IT issues affecting your productivity? As a business owner, you have enough on your plate just to keep your company moving forward and getting ready to face new challenges. In fact, you may be ignoring your business IT environment, keeping your fingers crossed and hoping for smooth cybersecurity sailing. That is the surest way to end up in the middle of an IT disaster. This Fourth of July, as we celebrate our nation’s independence, we’re here to help you declare your independence from business IT worry!


How can you ensure that you are moving your company in the right direction when so much of your work day can get bogged down by having to troubleshoot business IT issues? You want to be prepared to take advantage of new opportunities when they come your way. Worrying about whether your files are backing up, or if your employees will be able to access what they need when working remotely can be a major distraction.


It’s time to free your mind of that concern and declare independence from business IT worry. Instead of worrying about your IT, or ignoring it until something breaks, let us handle it for you. Partner with Net Works to manage your overall business IT strategy; we will make sure that you can rest easy knowing that we have your back. When you know we have your IT covered, you can devote more focus to other elements of your business, and you will be able to put your business IT in the back of your mind, where you want it to be.


Finding the right IT partner means creating more mental bandwidth to give to other aspects of your business, and the freedom to focus on those aspects that most matter to your overall strategic goals. Never again will you have to spend valuable time ensuring your hardware is running properly or attempting to fix any IT snags that come up. At Net Works, our technicians hold the most up to date certifications and are skilled at both anticipating and managing any business IT issues that arise. You will know who to call the moment something goes wrong.


We will also handle all of your updates and security protocols. Worrying if all your software is up to date or if you are vulnerable to malware because of a missed patch install will all be a thing of the past. Aside from that, if you ever had to face a disaster (natural or otherwise) you can rest easy knowing that your data will be safely backed up, so that your team can continue to function even if your physical location is compromised.


Partner with Net Works and declare independence from surprise IT costs. We will work with you to map out a comprehensive plan for your technology infrastructure, including disaster planning. With a plan in place you will know how all of your future technological needs will be met, with no surprises.


Business IT is constantly evolving. It is time to become independent from having to keep up with the latest trends. You will never again have to wonder if your organization is falling behind the technological curve. We’ll have you covered. We have the knowledge and the resources to allow you to take advantage the newest technological advances. You will always be one step ahead of your competitors.


You are an expert at your business. At Net Works, we are information technology experts. Pass the IT side of your operation to us so that you can focus on building your business. Declare your freedom from business IT worries. Contact us today and get us on your team!

Tech Support Scams and what to watch out for!

Don’t Get Fooled by Tech Support Scams


Are your employees trained to recognize tech support scams? These nefarious phishing attacks attempt to play on the trust you have established for reputable companies and scare you into giving up sensitive information.


Tech support scams are extremely common. Do you know how to recognize the signs?


It usually starts with an unexpected phone call. The caller claims to be from the tech support department of a well-known company you trust – typically Apple or Microsoft. Inciting a sense of urgency, this person informs you that your device is infected with a virus, throwing in many technical terms in order to confuse you. “You need to take immediate action,” they say. That’s when they ask for remote access to your device to perform a security scan.


Many people panic, and that’s what the hackers are counting on. These calls are designed to catch you off guard and scare you. Panic makes users less likely to second-guess the story they are being told, and more likely to grant the hackers the access they want.


This exchange may not always begin over the phone. Hackers also use pop-ups. You are familiar with pop-ups from your operating system that remind you to perform a software update, or notifications from your antivirus provider. A tech support scam pop-up is designed to look more alarming than these routine notifications, and will often provide a phone number for you to call – something you will never see from the legitimate sources mentioned above. Once you call the number, they will work to convince you they need sensitive information, like credit card details for anti-virus software, or remote access to your device to find and purge the virus.


The hacker’s goals are usually to:


  • Change the computer settings to make the device more vulnerable
  • Collect credit card information to charge the user for fake cybersecurity services
  • Collect personal information like the user’s social security number and date of birth that can help them hack additional accounts


Like many types of phishing attacks, in tech support scams, the hackers rely on user error in order to infiltrate your network. That means that well-trained employees are your best line of defense. If you or one of your employees sees a pop-up or get a phone call like this, don’t panic. Instead, hang up, or say you will call them back, and ask to take down their phone number. Then, call a trusted Managed Service Provider like Net Works. We can walk you through the steps to identify if your device is really at risk, or if this is an attempted phishing attack. It is always safer to contact a trusted Managed Service Provider instead of dialing a phone number from a pop- up or granting remote access to an unexpected caller. When it comes to network security, you can never be too cautious.


Even with training, mistakes happen, and you will need a backup plan. You will want to have a protocol in place in case your network is exposed. Managed Service Providers like Net Works can help you shore up your defenses. We help you and your employees recognize common hacking tactics, and we can monitor your network so that attacks are caught as soon as possible.


Hackers want to take advantage of you and your employees, but you don’t have to let them exploit you or your team. Contact Net Works to defend your business.

Are Mobile Devices Putting Your Company at Risk?

Are Mobile Devices Putting Your Company at Risk?


Did you know that mobile malware attacks are on the rise? According to Symantec, mobile malware variants have increased by 54% in just the first four months of 2018.


As their screen size, speed and performance have increased, smartphones have begun to replace devices like laptops and desktop computers. Hackers have caught on, and your business cannot afford to put mobile security on the back burner. In 2018, mobile security must be a key element of your cyber-security plan.


Cyber criminals are a practical bunch; as more and more users install banking, credit card, and corporate apps onto their mobile devices, these thieves are simply following the money. It is expected, as we move forward in 2018, that more malware will begin targeting banking and other financial apps through mobile devices.


Your employees may have learned to recognize suspicious emails, and you may have implemented requirements that have them your team changing their passwords at regular intervals. Yet, as business technology evolves, so do cyber-security best practices. Do you have a plan in place to handle the risks mobile devices pose to your business? If not, it is time to find a partner to help you craft one. Mobile device users are now more vulnerable to phishing attacks than desktop users, and that vulnerability leaves your network exposed.


Given the trends in today’s workforce, you can depend on your employees accessing your network from a variety of devices. It is safe to say that most mobile device users are not as vigilant about ransomware or phishing attacks as they would be when working on a desktop.


We can help your team stay protected in the face of mobile attacks.


Here are four cybersecurity steps your workforce can take today:


  1. Make sure employees working remotely are connecting through a Virtual Private Network (VPN). Do not connect to public Wi-Fi networks on a company device.


  1. Require regular software updates so that devices have the latest security patches.


  1. Lock devices with strong PINs and/or Touch ID. Just as we all know not to use “password” as the password for our bank account, we need to take the same care with locking our mobile devices in case they fall into the wrong hands.


  1. Update your apps. Just as you need to update your operating system to take advantage of security patches, users must do the same with their apps so that hackers cannot exploit known flaws that a patch would have fixed.


These are only the first steps. Don’t overlook mobile security. Contact Net Works today to protect your network.