MFA or multifactor authentication was important even before a large group of us moved to working remotely. Now that we are there, we are being targeted even more. Brute force attacks have increased significantly targeting RDP as people moved themselves to their home offices. Very targeted phishing campaigns have also increased as bad actors are using the COVID-19 situation to take advantages of our vulnerable state. One option we can use to help mitigate a portion of that risk is deploying multi-factor authentication.
Topics: Cyber Security, IT, security, MSP, remote, Multifactor, MFA
A lot has happened so far in 2020. If you are like most companies, you have quickly deployed a remote workforce. As we pivot into our new normal, we are having a lot of conversations about their Business Continuity Plans (BCP). In many instances, they simply didn’t exist or they need some work. Let’s explore that a bit below.
I’ve spoken with some companies that implemented their existing Business Continuity Plan (BCP) and it went relatively well for them. They had the right policies, procedures, and stake holders in place and things for the most part were rolled out as planned.
Topics: Cyber Security, IT, security, MSP, elite250, security100
Navigating the Remote Workplace: VPN Assistance and Teams Assistance
Cyber Advisors is ready to help you make the shift to a more remote workplace during this time of need. We are here to answer questions, provide licensing assistance and arm you with the knowledge your organization needs to maintain productivity while working remote.
Topics: Cyber Security, IT, security, Teams, MSP, remote, VPN
As the impact of COVID-19 continues to unfold, Cyber Advisors Inc. has activated it’s pandemic plan in accordance with our standard business continuity practices. The intent of this plan is to provide for the ongoing health and safety of our employees, partners and our clients while ensuring seamless service throughout this outbreak as well as compliance with governmental regulations and public health guidance.
Topics: Cyber Security, IT, security, MSP
Why invest a lot of time and money doing a cybersecurity risk assessment to receive a lengthy report to find out all the things you know you didn’t have, all the things you know are broken and all the things you know need to be fixed?
Yes, a top-notch Cybersecurity Analyst will report all of that, but it should only be a portion of the overall findings. An experienced Cybersecurity Analyst will find a lot of things your IT department didn’t know because they either lack the expertise or simply lack the bandwidth to get to these findings. Most IT departments are overused and are spending the majority (if not all) of their time just trying to keep the lights on.
Topics: Cyber Security, IT, security, Engineer
At Cyber Advisors, we believe the Primary Engineer is one of the most crucial roles we use so you have a great experience with our Managed IT Services. Yet, the value of having a Primary Engineer working with you is not always well understood before a Managed IT Services agreement begins. There are other Managed IT Service Providers that do not provide a dedicated Engineer-level resource to their customers. Instead, they provide a technician who is ready to serve when they are available, which may be a person the customer has never seen before. Without a complete understanding of their role and their value, the significance of the Primary Engineer may be overlooked.
Topics: Cyber Security, IT, security, MSP, Engineer
As a kid there was nothing more I loved than playing sports and competing. Now, as an adult and father of two, there is not much more I enjoy in my life than coaching. Initially, I was thrilled introducing my kids to the sports that brought me so much joy child and about teaching the basic skills of each sport. As my son has grown older and the skills and competition become more advanced new elements to coaching youth sports start to emerge.
Topics: Cyber Security, IT, security, MSP
According to a report from the FBI’s Internet Crime Complaint Center, financial losses from cyber-crime grew 90% from 2017 to 2018, while the number of complaints only grew 16%1. These numbers indicate that cyber criminals are getting more effective at siphoning large sums of money when they do succeed in compromising systems. This is likely due to the higher levels of sophisticated methods and tools they leverage to bypass traditional security measures such as next generation firewall and antivirus solutions. IT and Cyber Security Professionals in turn must also implement more sophisticated methods and tools to protect their organization’s digital assets.
Topics: Cyber Security, IT, security, MSP, Cyber-Crime, SIEM, Detection
It is typical for businesses of today have their data and applications living in multiple locations among many clouds. This multiple cloud strategy may include a significant amount of your applications living on premise as well.
Topics: Digital Transformation, IT, Boomi, Data, integrating, iPAAS