Cloud Security - Are your files safe

Cloud Security

 

7 Ways ‘The Cloud’

is Your Safest Bet

In The Digital World

 

According to the masses, the everyday business owner seems to believe that the Cloud is not a very safe place for their data, especially for the sensitive information about their clients. We are ready to call their bluff.

 

Yes, as security goes, the Cloud can be scary. You must take the necessary precautions to secure your files if you plan to use the Cloud to store sensitive data. And not every Cloud service offers the security you need, so be very careful what Cloud you choose.

 

Read the Terms and Conditions (T&C) of the Cloud service you choose before storing ANY of your sensitive data in their service. Many T&Cs state that they accept NO LIABILITY if your data is stolen or compromised.

 

Some versions of Google’s “Drive” services actually state that what you store in Google Drive belongs to Google, and they can use and/or modify the data in your Drive account as they see fit, without your consent.

 

If the service does not state they are HIPAA compliant, I recommend you look elsewhere.

 

Here’s seven reasons that the mysterious ‘Cloud’ is safer than you think:

 

It’s Nearly Impossible
to Avoid Using the Cloud
in Your Daily Work

 

It’s becoming nearly impossible for the modern Internet user to avoid using the Cloud. Cloud storage streamlines the process of accessing information and collaborating on projects regardless of location, making the service invaluable for many people in both their work and personal lives.

 

There Are Resources to Help
Educate You and Your Employees
About Cloud Security
and Best Practices for Cloud Use

 

Most Cloud users can find resources on the Cloud Security Alliance (CSA) website that will help them improve their Cloud security practices, especially if they are needing to improve their skills for professional reasons. CSA is a non-profit organization that promotes Cloud security education around the globe through research, training, and community building.

 

They call themselves the “world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure Cloud computing environment.”

 

There Are Less Chances
for Hackers to Access
Your Business Data
If It’s in The Cloud.

 

The Cloud provides great security because there are fewer hard points from which hackers can launch attacks. It’s also easier to protect one entity with one exceptionally strong password than it is to try to protect dozens of entities.

 

The Cloud Is More Reliable
Than Hardware

 

Since You Can Access It From Another Area If Something Were To Cause A Hardware Failure On Your Machine.

 

The biggest concern with Cloud storage is lost data, not hacked data. But that issue is eliminated if the Cloud is used more as a “sharing” platform instead of a “storage” platform.

 

By taking shared files and storing them into something like Google Drive, Dropbox or Microsoft Sharepoint, you can ensure that if your data are lost, you can easily locate them through the other platform. Your data might be safe if a local system that it is stored on has failed, but that won’t do much to calm you in the event of a system outage.

 

While Cloud storage keeps your data secure from fires, floods, hurricanes and computer meltdowns, it is still vulnerable in the sense that it is in the hands of a third-party system. Fortunately, since there are no geographical limits to Cloud storage, you can choose best in class security providers that major international companies also trust.

 

Ultimately, your data is more secure in the hands of a third party who have security front of mind in their everyday work, so you should be confident to rely on managed Cloud specialists.

 

There is the option
of Two-Factor Authentication
On Your Cloud Storage Applications

 

You can also add an extra layer of security to your password by activating two-factor authorization (also known as 2FA). This makes it harder for hackers to crack your password. If you don’t activate your 2FA, it will be very easy for hackers to attack you as they only need your username and password to access your data.

 

Several Cloud-based services, such as Dropbox and Office 365, offer 2FA by sending you a code via text or phone call that you need to access your account. It’s an extra step, but once you’ve set it up on all of your devices, you are good to go.

 

It Secures Your Data
From Careless Employees
That May Currently Be
Putting You At Risk.

 

People are the biggest weak spot in any security system. Employees will usually do what’s most convenient for them even if it’s less secure. For example, if you aren’t yet using Cloud services, employees might be sending themselves unsecured emails with confidential client files so that they can work on them on their home computers.

 

Your first step in evaluating a new system should be determining what your employees need to do and how they’d ideally like to do it. If new software makes your employees’ lives easier, they’ll be more likely to use it and less likely to turn to shortcuts that undermine your security efforts.

 

THE CLOUD IS MORE SECURE

 

While you may feel safer with your files locked up in a filing cabinet, Cloud services actually offer better physical security. When you keep information in your office, a burglar usually only has to pick a couple of locks to steal your computer or filing cabinet at night or on the weekend.

 

On the other hand, Cloud service providers usually keep their servers under close guard. This often includes 24/7 security guards, video surveillance and biometric access to the actual server room.

 

Agree? Disagree?

Leave a comment to let us know what you think

about this controversial issue!

 

Enjoy your weekend everybody,

have a great, and SAFE, Memorial Day!

 

 

Resources:

 

 

How Can MCS Help?

 

MCS specializes in computer and network, security and management, for small businesses. If you feel like you are not getting what you expected from your current IT solution provider, it’s time to look at alternatives. 

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

 

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs.

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($20/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers/month)
Many Backup & Recovery Options
Computer & Network Management
Managed Firewall
Managed Networks
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity
to talk with you or someone you know
about affordable technology solutions.

 

 

Help Desk Flow Chart

Remote Help Desk
vs
Local IT Support

 

Just because you have IT doesn’t mean you HAVE “IT”. What do I mean by that? I mean that just because you have a phone number to call that’s this wonderful 24/7 Technology Help Desk from Timbuktu, or somewhere else nowhere near you, doesn’t mean they really know your network or can always help you with every possible situation.

 

Have you ever called your “Help Desk” and it’s like it’s the first time you’ve ever called? Or they treat you like some kind of fool? Have you ever had the technician unable to connect to your computer and then had YOU try to explain EXACTLY what you are seeing without really knowing what they need to know?

 

You are the client,
they are the experts!

 

Shouldn’t it be THEIR problem to make sure they are able to help you in the best way possible for your network and your business? Their “tier-1” support is usually reading from a script, and answering from a trouble shooting step-by-step checklist, like the graphic on the left. They’re not servicing “your” network – they are servicing the “average” network. 

 

If you are pretty good with basic elements yourself, a remote Help Desk may be alright for you… but if you have trouble with your computer in some way, nearly every day, anytime there’s something new to learn, or even if your internet connections are regularly a problem in your network, a help desk type of support may not be the best fit.

 

You need someone who can work beside you, not just talk AT you! You need someone who can bring it to your level, someone you can relate to, who knows your systems.

 

Not to mention… There are technicians from these help desks that go onto forums after they finish their shift, and bash how ‘Stupid’ or ‘Moronic’ their clients were that day.

 

Here’s a quick quote from a forum post that I was talking about,

 

“She was a problem user and had numerous issues with her computer. She brought up previous issues, blamed the past issues on my incompetence and said that I plugged the power strip into itself.” 

(Source: https://www.reddit.com/r/AskReddit/comments/rpl8q/ithelpdesk_workers_what_is_the_most/ ).

 

Even if it wasn’t about you… do you want to have someone acting like that about their chosen profession in helping the customer? I know I wouldn’t…

 

So, What Can’t a Help Desk Do for You?

 

  • Major virus remediation,
  • Advanced hardware diagnostics,
  • Hardware repair,
  • Internet issues – remote support can’t log into your computer if you don’t have an internet connection that is working properly.
  • And lots more…

 

Yes, many issues can be handled remotely, but some are not easy without “seeing” what is really happening. A tech, who is able to see exactly what is really happening for themselves – on-site – is much more likely to make the “right” repairs for your computers and network. 

 

So what?

 

If you are not running Windows 10 as your current operating system (OS), remote support may not be able to reload windows for you.

 

If you are not currently on Windows 10, you will be if you have to reload Windows, because you cannot buy any of the older Windows versions any longer.

 

Do you know all of the new “security” setting that you will want to disable when you reload Windows?

 

Do you know where to go to update the drivers for all of your existing hardware? Remote support can’t help you with that. Are new drivers even available for your existing hardware?

 

And with remote support, you are just a number, the more problems you have, the more money they make off you. Why would you want to work with a company who benefits off of your problems? What incentive do they have to actually fix your computers and network correctly?

 

You need to work with a company who has to earn your business every month. Don’t work with any tech company that requires you to sign a 2 or 3-year contract. INSIST on working month-to-month so your support company has to earn your business every month.

 

Just think on that a bit,
and try to enjoy your week.

 

How Can MCS Help?

 

MCS specializes in Computer and network security and management for small businesses. If you feel like you are not getting what you expected from your current IT solution provider, it’s time to look at alternatives. 

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs. 

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($20/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers/month)
Many Backup & Recovery Options
Computer & Network Management
Managed Firewall
Managed Networks
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Back-Up Plan - 5 Myths of Data Recovery

3 Inevitable Reasons
You Need a Back-Up Plan

 

Only three, you ask? Well, I could keep going, but if all three of these are inevitable, then why bother? You CANNOT argue whether these scenarios are going to happen or not, they WILL happen, so then it just becomes your choice whether you decide to invest in your business, and yourself, enough to afford a Back-Up Plan. Back-up Plans do not need to be expensive. Your business needs dictate the cost of the Back-up plan.

 

Now, I’m not trying to scare you, but let’s look at realities. Going all in, all the time, doesn’t always work out very well.  And that’s basically what you are doing if you have no Back-Up Plan. On the other hand, a bad choice of Back-Up Plans, or even just an outdated plan, is like trying to bluff in a high stakes poker game with a table full of professional players.

 

Do you really want to put your business on the table
with those stakes?

 

Here’s what you’re
betting against

 

Human Nature: People Make Mistakes – ESPECIALLY WHEN THE PRESSURE IS ON. Even with a good Security Awareness Training program in place, roughly 3% of people will still click on bad links (as opposed to 17% of “aware but untrained” people). Ransomware will encrypt all of your important data, and make you pay a ransom to get your data back. A good Back-Up plan can save you hundreds of dollars in ransom costs.

 

Just like a good cyber security plan, a Back-up Plan is basically “insurance” for protecting your data, and meeting regulatory compliance requirements.

 

Scenario A:

 

Your star employee has been out for three days with a sick kid, and now they’re running close to their deadline, and they accidentally delete the WRONG FILE… now what? Can you get it back? Or is it gone forever, and now you’re back to square one?

 

Are you even worried? Or do you know that you may have lost a BIT of data, but you backed it up on Wednesday night and now it’s Friday morning.

 

So, it’s really okay, maybe you’re only down for a few hours while IT gets it back?

 

The former is usually associated with those businesses WITHOUT a backup solution, while the latter is more likely someone that knows that their data, and in turn their company, is safe because they did have a restorable backup.

 

 

Technology Failures/Lifespans: Machines Do Not Last Forever – AND THEY COULD TAKE YOUR DATA WITH THEM.

 

Hardware failures can’t be avoided. They are not Immortal or Indestructible. They are delicate machines that are easily broken. And those Tape Backups, that are now outdated? Well, the only 100% guarantee in IT is that tape drives WILL fail at some point.

 

Scenario B:

 

You have your computer at your desk, it seems to be working just fine. Suddenly, it freezes, and then the screen BSODs. The BLUE SCREEN OF DEATH. What’s your first thought? Is it something you would rather not say aloud in front of a child?

 

Or is it, CRAP, let me call IT and see if this is fixable? Again: The former is usually associated with those WITHOUT a Back-Up Plan, while the latter is more likely someone that knows that their data, and in turn their company, is safe.

 

 

Unforeseen Events: Things Happen – YOU CAN’T CONTROL EVERYTHING. Natural Disasters, Break-Ins, Ransomware Attacks, and so many other factors that honestly are out of your control. The only thing you truly control is YOU.

 

Scenario C:

 

We are now fully into tornado season, let’s say a tornado came through, and your building is in pretty good condition… except some debris came in one of your windows and now all of your electronics are either wet, damaged, or both.

 

Are you “freaking out” about ALL OF THE DATA that will have to be re-entered, if you can, or are you thinking of getting your office back to its usual state so your data can be restored and you can all get back to work?

 

For a final time: The former is usually associated with those WITHOUT a Back-Up Plan, while the latter is more likely someone that knows that their data, and in turn their company, is safe.

 

Seeing a pattern with those
before and after Scenario’s yet?

 

YOUR DECISIONS WILL DECIDE YOUR FATE,
YOUNG PADIWAN.

(Okay, so maybe you aren’t a padiwan anymore…
but you get the idea.)

 

Which person do you want to be
in each of those situations?

 

Think about it,
and enjoy your weekend everyone!

 

 

How Can MCS Help?

 

MCS specializes in computer and network security for small businesses. Part of securing your business is protecting your business data. If you feel like you are concerned about your current Back-Up Plan, or you don’t have a Back-Up Plan at all,  please call us as soon as possible to relieve your concerns. Left alone, you could lose everything you’ve worked for in an instant.

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

Is it time to think about outsourcing some or all of your IT?

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We start with free consultations to determine what you want to accomplish, by when, and then decide how we can meet your needs.

 

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($20/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Securing IoT Devices

Securing IoT Devices

7 Ways You’re Leaving
Your Back Door Open

 

If you are like most people today, you want to feel safe. At night, you probably lock your doors, arm your security system, and go to sleep.

 

But what if you left the back door wide open?

 

I’m sure you are thinking that you would have already checked that, or that you would simply get up and check.

 

But I’m not talking about your LITERAL back door. I mean the back door of your WIRELESS NETWORK.

 

If you are one of those people who want to stay on the cutting edge, and you have multiple “Smart” devices in your home, it is your responsibility to make sure you are securing them properly to protect your family,

 

because the manufacturers aren’t!

 

Have you considered how “unsafe” these new “Smart Devices” are?

In fact, have you even changed their default username and password?

Have you thought about securing these devices?

 

THAT is exactly what hackers count on!

 

When you don’t secure these devices a hacker will get into your home network through your new 60” Smart TV – then disable your home security system.

Then, they see you tell all your “friends” on Facebook that you will be on vacation for the next two weeks.

 

Now it’s “Open Season” on your home.

 

Once they confirm you are gone, they break in and take that TV and everything else of value. And, while they’re there, they also leave a keylogger on one or more of your “Smart” devices so they can remotely wipe your bank accounts. And maybe even get access to your business network as well.

 

Here is an excerpt from an article
CNBC wrote on the issue:

 

“ Connecting everyday devices to the Internet seems like a great idea, but users need to be mindful of the risks, warned JD Sherry, vice president of technology and solutions at Tokyo-based antivirus-software maker Trend Micro.

“No one is going to keep the door to their house unlocked,” Sherry said. “You need to think [the same way] about the appliances on your network.”

 

So, how can you protect your devices?

 

Now, on to the ways to ‘lock up that back door’, with a collaborated list from that CNBC Article and TomsGuide.com:

 

1)   Secure the wireless network.

 

The old Wired Equivalent Privacy (WEP) protocol is still widely used, but it is weak and easily compromised. Make sure the home wireless network is instead protected by the Wi-Fi Protected Access II (WPA2) protocol and a strong, COMPLEX

 

Give your Wi-Fi network an obscure name, or SSID, that doesn’t give attackers personal information they can use in social-engineering attempts. For instance, don’t call it “Smith Family”. Instead, call it something random, such as “FBI Surveillance Van 5”.

 

Disable guest network access entirely, and be strict about who — or what — can get on your network.

 

Create two different Wi-Fi networks if your router can handle multiple SSIDs. Trey Ford, global security strategist at security company Rapid7, suggests one network for computers, tablets and smartphones used for online banking, shopping and general Web activity; another network can be for smart devices.

(MCS input) It’s worth your family’s safety to spend $100-$200 on a good router that includes a firewall. A good Firewall box is so much more secure than using a firewall built into Windows!

(Don’t understand why? Call us – set up a free consultation so we can explain further – Remember, your family’s safety is at stake here)

 

Good password management is essential. Neither network equipment (such as firewalls, routers and switches) nor newfangled gadgets (such as Smart TVs) should use default factory-set administrator usernames or passwords.

 

Change each admin username & password to something suitably strong and complex, and regularly change them going forward (usually every 90 days is adequate). Changing usernames and passwords will make it harder for attackers to brute-force their way in.

 

2)    Firewall the network, either with a stand-alone appliance or software that ships with the router, to restrict incoming connections.

 

Every home with an Internet connection should have a good firewall.

 

Most networked IoT [Internet of Things] devices include information about the ports, network protocols and IP addresses used in the owner’s guide or the support website. Set the firewall to allow traffic on those specific ports and no others. Port restrictions will cut down on opportunistic network-probing attempts.

 

If [devices] require a wide-open access to, or from, the Internet, beware!

 

3)    Install a unified threat management appliance (UTM) if you have a highly-connected home – and you connect to highly sensitive websites like banking/financial, insurance, medical or other web portals .

 

UTM’s will handle intrusion detection and prevention, manage the Internet gateway and provide network antivirus protection.

 

Good UTMs (small-business models start at about $300) will have signatures and countermeasures to detect and stop the more common network entry points that attackers will use.

 

4)    Once the network is secure, examine each IoT device you own — and what it is doing.

 

Disable remote-management access and other powerful network tools if they won’t be used.

 

Perhaps your car lets you connect to Facebook. If you don’t plan to check your Facebook page while driving, don’t hand over your credentials to set up the connection. Use your phone instead — it’s safer.

 

5)    Install security software wherever possible, such as on mobile devices used to control IoT devices.

 

If attackers can access a smart garage-door opener or a smart thermostat via a malicious Android app instead of by hacking the device directly, they will go with the easier option.

 

 

6)    Check manufacturers’ websites for firmware updates on a regular basis (beginning of every month), as Internet of Things companies can be slow to patch vulnerabilities and push out updates.

 

Install each update right away. Updating the firmware is particularly important for networking gear such as firewalls and routers.

 

7)    Pay attention to brands.

 

Consumers expect smart-device vendors to take proper steps to secure the platform. But if the manufacturers don’t take security seriously, or claim the underlying platform is “hacker-proof,” be wary, better-known brands are less likely to risk their reputations this way.

 

If you have these devices, and implement these security measures, you should be able to sleep better at night, knowing that you really have locked up those doors, and that they will definitely have to pick a few locks to get into your home.

 

 Is your Back Door Unlocked?

 

Sleep well, everybody!

 

Sources:

http://www.cnbc.com/2016/11/04/alarm-grows-as-smart-home-technology-and-hacking-risks-proliferate.html 

 

http://www.tomsguide.com/us/secure-smart-home-how-to,news-19380.html 

 

How Can MCS Help?

 

MCS specializes in Computer and network security for small businesses. If you feel like you need help, or need to learn more, please call us as soon as possible. Left unsecured, you’re a sitting duck for hackers! When hackers get in to your network, anything is possible.

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs.

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($20/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Downtime_Hourly_Cost

Cyber Security:
An Inconvenient Truth

 

“We have met the enemy and it is us.”

This quote aptly describes the current state of security and cyber security.

 

End users now arguably pose a bigger immediate and ongoing threat to the cyber security of consumer and corporate devices, applications and networks.

 

Cyber security and protecting corporate and consumer assets will always be, a 50-50 proposition. End users and IT administrators, own 50% of the responsibility to secure their devices and adhere to safe computing practices. For starters, this means getting security training and actually installing and utilizing security mechanisms.

 

Similarly, security vendors bear 50% of the responsibility to incorporate strong security mechanisms into their products.

 

It’s absolutely imperative for corporations, consumers and vendors to be proactive in their approach to security in the 21st Century Digital Age.

 

With so much data from myriad sources traversing private and public networks on a daily basis, even the strongest system and network security is easily undone or bypassed completely by a careless corporate or consumer user. Nonetheless, many people continue to blithely ignore the seriousness of the issue.

 

Companies of every size
across every vertical are at risk.

 

SMBs, which account for nearly 60% of all companies businesses, mistakenly believe they’re not big enough to be targeted. In fact, over 70% cyber attacks occur at businesses with less than 100 employees, according to a 2015 Report, “Small Business, Big Threat: Protecting Small Businesses from Cyber Attacks,” by the Small Business Committee.

 

IoT Bots Emerge as Latest Cyber Security Threat

 

In IoT, the attack surface is potentially limitless. There is no singular mechanism to secure the millions or billions of inter-connected components and endpoints. IoT is a veritable hackers’ playground. Consider that connected devices are equipped with default user IDs and passwords that are child’s play for a hacker to crack.

 

Yet many users and companies never change simplistic original passwords like “Admin,” “123456,” and “Password.” Additionally, many IoT vendors and third party service providers use default passwords that are an abbreviated version of the company brand name. Hackers are well aware and waste no opportunity to exploit these weaknesses.

 

Despite highly publicized security incidents, ITIC’s 2017 Hourly Cost of Downtime Survey found that corporations, their C-level executives, IT Managers and end users are the biggest culprits in unplanned downtime due to security issues. Some 65% of businesses do not calculate the cost or business impact of security-related downtime and over 40% of firms are unable to detect or defend against a security breach in a timely manner when one does occur.

 

This Blog Post is curated from knowbe4.com  (see resources below)

 

How Can MCS Help?

 

MCS specializes in Computer and network security for small businesses. If you feel like you are experiencing any of the above symptoms please call us as soon as possible to correct the condition. Left alone, many malware connect back to the hacker’s network and download more serious threats.

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs. If we cannot meet your needs, we know high quality providers who we can recommend.

 

 

Resources:

https://blog.knowbe4.com/we-have-met-the-enemy-and-it-is-us 

Original content by Laura DiDio, Principal at ITIC, a research and consulting firm based in the Boston area.

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($10/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Security awareness - Insider Threat Report 2017

Security Awareness Training

The 7 Most Asked Questions

 

Now, I’m not exactly a pessimist, but I AM a REALIST, and as such, I feel the need to point out that PEOPLE are the most dangerous threat to your business, and nothing can truly 100%, GUARANTEED, protect you from them. Why? Because people are not robots to be programmed.

 

People make mistakes, they forget things, they get curious, they had a bad day… WHATEVER the reason… people mess up. It’s just going to happen. “Political correctness” aside for a moment, one term for it, is having an ID-10-T Error (Idiot), which we ALL have from time-to-time… but there are plenty of times it seems accurate.

 

Security Awareness Training is how you ‘Upgrade’ your ‘Human Equipment’.

 

What Is Security Awareness Training
and Why is it important?

 

Security Awareness Training is a formal education for your employees to learn and understand computer security, including any company policies, and how to spot when something isn’t right BEFORE it’s too late.

 

It is important not only so that you don’t have to spend time and money cleaning up mistakes from an untrained employee’s unfortunate encounter, but many laws and compliance regulations require it, and you may incur a fine if your employees were not trained, such as:

  • HIPPA (both Privacy & Security)
  • Gramm-Leach-Bliley Act (GLBA)
  • Missouri’s Data Breach Notification Law
  • Federal Information Security Management Act (FISMA)
  • Payment Card Industry Data Security Standard (PCI-DSS)

By the way, if you fail PCI requirements you have also failed HIPAA Compliance because HIPAA requires you to be PCI compliant. And PCI-DSS now requires everyone who accepts credit cards to have a quarterly vulnerability scan. When was your last scan?

  • ISO/IEC 27002
  • NIST Special Publication 800-53

 

What should a good
Security Awareness Program cover?

 

Here’s a list from Professor Daniel J. Solove of Techprivacy.com – his FAQs suggest the following security topics… 

  • phishing
  • social engineering
  • malware
  • passwords
  • use of portable devices
  • physical access
  • data destruction
  • encryption
  • data breach

 

How often must security awareness training
be given?

 

A good baseline is to train each new employee hired, and then your company as a whole annually, so that your employees get a refresher course and can remember what it was they were taught.

 

What are the consequences
for inadequate security awareness training?

 

First off, the possible previously mentioned fines that you could incur… and that can also include fines from PCI-DSS.

 

Secondly? Lack of training has been shown to lead to more data breaches in the long run, costing you more time, money, and not to mention customers who move to your competitors when they find out you’ve been hacked.

 

So how much does it cost to do a training like this?

 

A Great place for Small Businesses to work with is KnowBe4.com and their Annual Security Awareness Training Systems. Go check out their website Here to find out a little more about them and take a look at their pricing, or give us a call and we can discuss the options with you to help you decide what might best fit your business.

 

But I’m too small to really need to worry about this?

I’m a small business owner with only a few employees.

 

As I have said time and again, SMALL BUSINESSES ARE A HIGH RISK FOR CYBER CRIME. If you are a one-man shop, you STILL NEED TO KNOW how to protect your business from scams and hacking.

 

Why is this becoming such an important factor
in today’s world?

 

Cyber-crime has evolved. It used to be all about your identity… now they remotely take over your systems, hack bank accounts, and steal whatever they want. Every business is at risk, from a 1 person office to enterprises.

 

If you still don’t think that Security Awareness Training is a fundamental piece of protection for your business, (just like business insurance) check for that ID-10-T Error and see how often you find something happening because of PEOPLE. This stuff is, once again for the people who are slow to catch on, MANDATORY FOR PCI-DSS COMPLIANCE. You know, that thing that lets you ask the all-important question, ‘Credit or Debit’… and if you lose that payment option due to non-compliance… how many customers could you lose?

 

 

How Can MCS Help?

 

MCS specializes in Computer and network security for small businesses. If you feel like you want to learn more about security awareness training…

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs. If we cannot meet your needs, we know high quality providers who we can recommend.

 

Resources:

https://www.teachprivacy.com/security-awareness-training-faq/

https://www.knowbe4.com/

 

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($10/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Vulnerabilities Risk Assessment Sample

Finding What Hackers Want

Vulnerabilities Risk Assessment

 

At MCS, we strive to be proactive in our security, and that involves education as often (or more) as fixing something when it breaks.

“If it ain’t broke, don’t fix it?” is a common saying, but does it apply to how your data is stored and protected?

 

NO!

 

In this post, we are going to uncover what hackers want in your computers and break down how our Vulnerability Risk Assessment (VRA) identifies that information, why you need to know about each piece, and what the VRA does for YOU. If you think you don’t have data at risk?

 

THINK AGAIN!

 

In the time we have been running scans for our small business clients (1-35 PCs), NO ONE has ever had a ‘perfect’ or ‘clean scan’.

 

Even in your business, every computer holds the potential for hidden liability that could make or break your business financially, if you were found to have a data breach.

 

Did you know that most data breaches are found by a third party, like law enforcement, security researchers, banks or merchant services companies. And that the average length of time a breach lasts before it’s found is around 6 months.

 

Your Business is a Target to be attacked, you need to know what you are risking every day! If you’d like to learn more about how to close some of the vulnerabilities from your business check out our March 24, 2017 Blog Post titled 7 Ways To Remove Vulnerabilities From Your Small Business.

 

What Does The VRA Scan Show?

 

These are the sections included on the scan reports and what each collects for your review, and we will help you understand what corrective actions need to be taken.

 

  • Unprotected Data Summary – In our Unprotected Data Summary, there is a Pass/Fail category, with the monetary value of your potential Liability. It also Includes an unprotected data count by type, the number of files scanned, the number of files with violations, and the total number of violations.

 

  • Vulnerability Summary – The Vulnerability Summary will also hold a Pass/Fail Category, along with the vulnerability count by severity and a percentage of vulnerabilities by vendor.

 

  • Unprotected Data Scan Statistics – (This will be in your paperwork if you Pass the Unprotected Data Summary.) The Unprotected Data Scan Statistics section reiterates the number of files scanned, but also delves into the details, including: Files with Suspect Data, Bytes Scanned, Suspected Instances Found, the Drive Root, Drive Capacity, Used Space, and Free Space.

 

  • Unprotected Data Scan Details – This scan will show if you Fail the Unprotected Data Summary, and will give you the file path to each item the scan found that contains unprotected data.

 

  • Vulnerabilities by Vendor Details – This section in your paperwork will show you the scoring system (CVSS) (LINK FOR WHAT CVSS IS) for vulnerabilities, and then will go on to label, for each found vulnerability, these six items: the vendor that contains the vulnerability, how to fix it, the title of the vulnerability, the Check ID, the CVSS Score, and references.

 

MCS does our Vulnerability Risk Assessments for only $20 per workstation and are able to run them on any number of workstations (from 1 to 300) in any environment that your company has. All of this AND a free consultation to help you understand the report we generate for just $20 per computer.

 

We also offer a free no obligation consultation prior to running the software if you have any questions or concerns!

 

As a footnote, this assessment comes with no obligations to participate in any of our other services. However, we will be happy to discuss any service offerings that we feel may benefit your systems, and you as a client, based on our findings and any previous conversations we have had with you about the current state of your network.

 

Think we’re full of hot air?

 

I Challenge you to
PROVE US WRONG!

 

How Can MCS Help?

 

MCS specializes in Computer and network security for small businesses. If you feel like you are experiencing any of the above symptoms please call us as soon as possible to correct the condition. Left alone, many malware connect back to the hacker’s network and download more serious threats. But security is not all we do…

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

MCS is a full-service technology solutions provider offering affordable solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We typically start with a free consultation to determine what you want to accomplish, by when, and then decide how we can meet your needs. If we cannot meet your needs, we know high quality providers who we can recommend.

 

 

Contact Us For More Information

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($20/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866.

Give us an opportunity to talk with you or someone you know

about affordable technology solutions.

 

 

 

Click on image to enlarge.
Hacked Statistics Infographics

10 Point Hacker Watch List

10 Ways To See If You’ve Been Hacked

 

Everyone has heard of computer hacking, but do you really KNOW about hackers? Do you know what signs to look for so you can determine if YOUR computer may have been hacked?

 

What does Hacking mean?

 

Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is referred to as a hacker or cracker. This person may alter system or security features to accomplish their goal.

 

Hackers employ a variety of techniques for their trade, including:

 

  • Vulnerability scanner: checks computers on networks for known weaknesses
  • Password cracking: the process of recovering passwords from data stored or transmitted by computer systems
  • Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks
  • Spoofing attack: involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs
  • Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators
  • Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later
  • Viruses: self-replicating programs that spread by inserting copies of the same program into other executable code files or documents
  • Key loggers: tools designed to record every keystroke on the affected machine for later retrieval. Do you access a “secure portal” in your business? Are you sure it’s still secure?
  • Ransomware: Encrypts your data files and requires you to pay a ransom to get your files back.

 

Certain corporations employ hackers as part of their support staff. These legitimate hackers (called White Hat Hackers) use their skills to find flaws in the company security system, thus preventing identity theft and other computer-related crimes.

 

What to Look For

 

Now that we all know what hacking IS, it’s time to start looking for what to watch out for. Here are ten symptoms that may indicate your computer has been hacked.

 

1 – Your Computer is Running Slow. This could be a hardware problem, but it is also a pretty well-known fact that some types of Malware can slow down your system.

 

2 – Advertizing Pop-Ups. Everyone has seen them at one time or another (Malvertizing). They are annoying, but if you click on them, they will infect your computer. BE VERY CAREFUL!

If these show up regularly, it’s likely a sign that you are already infected.

 

3 – If You Have Regular Software Crashes. This is either a technical issue that must get fixed, or a sign of a malware infection. No matter what you think, your computer doesn’t just look for ways to upset you. I promise.

 

4 – Your Hard Drive is Acting Suspicious. Specifically, if it sounds like its running a marathon when it should be resting. If nothing is running on your computer, and the Hard Drive is still running as if you have 4 browsers open, 8 programs running, and watching a DVD… well… you’ve been hacked.

 

5 – You’re Running Out of Hard Drive Space or Files Seem to Be ‘Missing’. Check to see if your actual storage space is growing from things that you as the user are doing, or if something seems to be happening that doesn’t make sense. If it’s the latter, then it’s possible you have a Worm infection.

 

6 – Your Network Activity Is High and There Is No Obvious Cause for It. There are times where there are perfectly safe underlying causes of this, like an update in the background or a program uploading or downloading data, but it’s still good to check into WHY it’s happening when you notice it. This could be a malware “phoning home” to get further instructions or to download a more severe malware.

 

7 – Browser Alterations That You Don’t Remember Applying. This can be a change of your browser’s homepage, a toolbar that you aren’t sure where it came from, or even websites opening or closing without your interaction.

 

8 – Programs Opening and Closing on Their Own, Or Messages That Just Don’t Seem to Make Sense. A few warning signs should really make you suspicious. If any of these happen, pay closer attention and try finding the cause.

 

Andra Zaharia at Heimdal Security
explains it this way…

“If, all of a sudden, you see:

  • programs opening and closing automatically,
  • your Windows operating system shutting down without reason,
  • you notice strange windows in the booting process or
  • Windows informs you that you’ve lost access to some of your drives.

Though the root cause may be a technical one, it could also be a sign that malware has compromised your system.”

 

9 – Your Security Measures are Mysteriously or Suddenly Disabled. Malware is SPECIFICALLY designed to disable your security solutions to allow it to hide better from you. Don’t let it fool you!

 

10 – Friends and Co-Workers Tell You That Odd Messages Are Coming from Your Accounts. This includes Email, Social Media, Instant Messengers, Etc. You can also usually check your sent folder or archives to be sure there has been nothing sent that you or someone meant to have access to those accounts did not send.

 

How Can MCS Help?

 

MCS specializes in Computer and network security for small businesses. If you feel like you are experiencing any of the above symptoms please call us as soon as possible to correct the condition. Left alone, many malware connect back to the hacker’s network and download more serious threats.

 

Call us today at (636) 614-0866 for a free consultation.

 

Brought to you by: Managed Computer Services (MCS)

 

Need more time in your day?

 

Is it time to think about outsourcing your IT.

Call MCS at (636) 614-0866

to schedule a free consultation!

 

How can we help your business?

 

MCS is a full-service IT company providing affordable technology solution that meet the unique needs and budgets of small businesses. Our ideal client is a small business with 1-35 computers.

 

We start a conversation with new prospects with a free consultation to determine what they want to accomplish, by when, and then decide how to best meet their needs.

 

If their needs do not fit with our services, we happily suggest a different provider that can better serve their needs. We have many trusted quality providers that we can recommend.

 

Resources:

https://www.techopedia.com/definition/26361/hacking

https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware/

 

Contact Us For More Information

 

How can we help you succeed?

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($10/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866. Give us an opportunity to talk with you or someone you know about your business’ needs. You will be pleasantly surprised. 

Click on image to enlarge.
Why You Should Care About Mobile Device Security

Mobile Device
Security Checklist

Is Your Mobile Device Secured?

 

It seems that many people disregard the threat of an unsecured or under-secured mobile device, such as a smartphone, tablet or even laptop. These devices carry plenty of sensitive data, and they go everywhere with us. Mobile Device Security is just as important today as network and computer security. So what can you do to keep your mobile devices safe?

 

We have compiled a Do-It-Yourself guide to mobile device security. Just follow these 10 simple steps.

 

 Step 1

Make sure you have a screen lock.

 

  • A PIN Code doesn’t count here. All someone needs to do is peek over your shoulder to see what to press. A toddler could do it. I’ve seen it happen.

 

  • Passwords or patterns with the visibility turned off are great, but if your phone supports it, go for the fingerprint. It’s a lot easier to figure out what keys to press or how to slide your finger versus replicating your fingerprint.

 

Step 2

Know what apps you use
and what permissions they require.

 

  • Make sure all the apps you use are from your official App Store (either the Apple Store of Google Play Store).

 

  • No Downloading 3rd party apps – this is a MAJOR security risk!!!
    they are not in the official store FOR A REASON.
    Actually – Just disable that ability in your settings.
    You don’t want to use it anyway.

 

  • UPDATE YOUR APPS! This will allow anything the developer has done to secure your apps to work for you, instead of leaving them exposed as a vulnerability.

 

  • Keep track of what permissions your apps have. For example… why would your flashlight app need your contacts?

 

  • Check out what apps are using the most battery, memory, data… etc. – if it doesn’t make sense, it probably shouldn’t be happening!

 

  • And finally in this section, go through your apps once in a while, and delete all those apps you don’t use anymore. They are vulnerabilities waiting to be used against you.

 

Step 3

Be careful browsing the web,
even more so than on your computer.

 

  • Install an Adblocker.

 

  • Disable popups in your browser app’s settings.

 

  • And please, PLEASE… WATCH WHERE YOU ARE CLICKING!

 

Step 4

Be extra vigilant
in watching for Phishing Scams

 

  • Don’t click on links or attachments you didn’t ask for. You get less ability to know exactly what you’re ‘clicking’ on with your mobile devices.

 

Step 5

Make sure you have a way to remotely
locate your device should you lose it.

 

  • You can either work with what your phone may have come with, such as Apple’s “Find my iPhone” or something of the like; OR you can download a tracking app from the store that all the rest of your apps come from on your phone. AGAIN – DO NOT DOWNLOAD 3rd PARTY APPS.

 

Step 6

Be sure to have everything
automatically backing up on a regular basis.

 

  • This is CRUCIAL for anything that holds your sensitive data.

 

BACK YOUR STUFF UP!

If you don’t know how, we can help with that.

 

Step 7

Use Two factor authentication
whenever possible for accounts.

 

  • This is becoming more and more prevalent in many platforms, use it to your security advantage!

 

Step 8

Turn on encryption capabilities for your phone
if it has the ability.

 

  • Not all phones have this, but it is a great way to add security if it does. Just do NOT forget your password. If you do, you will have no choice to factory reset your phone. BACKUPS PEOPLE. BACKUPS.

 

Step 9

Install an antivirus.

 

  • Options may be limited, but something is ALWAYS better than nothing.

 

  • We can recommend Eset or Sophos mobile AV products, but there are many options available for Android devices.

 

  • For iOS and MAC devices you may have difficulty finding an AV product because of the way these Operating Systems don’t allow apps to talk to other apps.

 

Step 10

ONLY use secure connections.

 

  • If it’s public WiFi (or no WiFi) use mobile data.

 

So, how many of you will actually put in the effort to implement even one of these Mobile Device Security precautions?

 

If you just don’t “get it” please call us at (636) 614-0866 and schedule a free consultation. You can ask all the questions you want and we will help you understand why Mobile Device Security is critical to protecting your business computers and networks.

 

Don’t forget to have your computers scanned to find out what data is being kept exposed and un-encrypted on your business computers.

If you’re not securing your mobile devices, you’re putting your business network in jeopardy of attack.

Once a hacker hacks into your computers, all of that exposed data if free for the taking…  and can cost you hundreds of thousands of dollars in fines and penalties. 

 

Fill in the form below. $20 per computer could save you hundreds of thousands of dollars!

 

 

Resource(s): 

Adapted from Heimdal Security’s Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Safe

 

 

Contact Us For More Information

 

Brought to you by:  Managed Computer Services (MCS)

 

MCS is a full-service IT support & solutions company focused on serving small businesses. Our ideal client is a small business with 1-35 computers.

 

We always start a conversation with new clients and prospects with a free consultation to determine what they want to accomplish, by when, and then decide if their needs fit within our service offerings.

 

If their needs do not fit with our services, we happily suggest a different provider that can better serve their needs. We have many trusted quality providers that we can recommend.

 

How can we help you succeed?

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($10/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866. Give us an opportunity to talk with you or someone you know about your business’ needs. I am positive you will be pleasantly surprised. 

Click on image to enlarge.
How to spot a phishing email

Online Scams

Phishing

 

Most of us use internet services every day to shop, make travel and restaurant reservation, pay bills and sometimes, even for work. And sometimes, we even do all of these AT work, but that’s a story for another post. ;p 

 

We even have access to a whole world of news, fashion, retail stores, sports and lots more. But don’t forget that the same international reach we have also allows hackers and cyber crooks to reach out and touch us too, so be careful!

 

Many security breaches are traced back to a user who unknowingly or foolishly provides login credentials to fraudsters. With credentials in hand, online crooks have all they need to authenticate transactions and access banking accounts. Typically, these credentials are acquired via socially engineered schemes, such as a phishing or vishing attack. 

 

True Story about:
Phishing Scams

 

Close Call Proves
Customer Education is Critical

 

Tracy had been replying to online ads for ticket sales to the Kentucky Derby – a big event that no doubt attracts all types of scammers trying to sell cons.

 

She got a reply from a seller who seemed legitimate. She provided the seller her mobile number, so they could discuss the logistics of payment. The seller requested her eBay ID, saying she could pay for the tickets through eBay and bypass PayPal.

 

Odd, she thought. But giving him the benefit of the doubt, she provided her eBay ID, thinking this guy just didn’t really understand how PayPal and eBay work.

 

Within five minutes, she got a confirmation for an eBay transaction texted to her phone. And a few minutes later, she received an e-mail from what appeared to be eBay. And a few minutes after that, the seller e-mailed her, asking her to give him the confirmation code that was sent to her phone.

 

Right then, she knew this was a scam. The e-mail was convincing, though a few details seemed sketchy, like the fact that her alleged eBay representative lived in England and that her name was misspelled. And the fact that this person asked her to provide the texted verification code was a big indicator this was a scam.

 

To the casual user, however, those sketchy details might not have stood out.

 

Knowing not to click any links, she logged in to her eBay account and checked her inbox. Nothing. she immediately called eBay, and forwarded the phishy e-mail to eBay’s customer service department.

 

Here’s an excerpt of the
response she got from eBay:

 

Thanks for forwarding the suspicious email you received. The email is a spoof, also known as a “phishing,” e-mail. (That’s phishing, as in “fishing” for personal information.) It didn’t come from eBay. Our Trust & Safety team is working to disable any websites it links to.

 

Copies of any e-mails we send you about the status of your account or a change in your account information will be displayed in My Messages. This is especially helpful since many spoof emails try to convince you that your account is in jeopardy.

 

Important – *Never* respond to a suspicious e-mail or click any links in the e-mail message. If you think you may have given out personal information in a spoof email or website, you need to take steps to protect your identity right away. …

 

Keep those reports coming — you’re helping protect the global Internet community! Our Trust & Safety team works closely with Internet Service Providers to shut down fraudulent sites. We also send your reports to Web browser companies so that they can develop tools to identify spoof sites.

 

Why We Need More Education

 

Had Tracy fallen for this scam, her first reaction as a consumer would be to blame eBay. But eBay was in no way involved. The tickets were not even advertised on eBay. Banks and credit unions face similar issues.

 

Customer education is not the only answer, but online users have to increase their security savvy. Tracy’s education about how fraud is perpetrated saved her in this case. But for a typical user, this could have turned out badly.

 

How we as an industry (Technology & Security) better communicate security risks to the general public is a challenge. But it’s one we have to embrace. We can’t rely on technology alone.

 

Tracy is a veteran journalist with more than 19 years’ experience. She has covered the financial sector for the last 13 years. She joined Information Security Media Group in 2010, where she now serves as director of global events content and executive editor of BankInfoSecurity and CUInfoSecurity.

 

Tracy is savvy about internet scams and phishing, yet, she nearly became a victim of a phishing scam.

 

Learn what to look for and how to protect yourself, or you may find yourself SCAMMED!

 

(See New Strategies to Fight Phishing by Tracy Kitten.)

 

Resource:

http://www.bankinfosecurity.com/blogs/my-phishing-story-p-1253

 

 

Contact Us For More Information

 

Brought to you by: Managed Computer Services (MCS)

 

MCS is a full-service IT company focused on serving small businesses. Our ideal client is a small business with 1-35 computers.

 

We always start a conversation with new clients and prospects with a free consultation to determine what they want to accomplish, by when, and then decide if their needs fit within our service offerings.

 

If their needs do not fit with our services, we happily suggest a different provider that can better serve their needs. We have many trusted quality providers that we can recommend.

 

How can we help your business?

 

FREE IT Consulting
Vulnerabilities Risk Assessments ($10/computer)
Computer & Network Repair ($60-$75/hour)
Business Computer Security (Only $35/computers)
Many Backup & Recovery Options
Computer & Network Management
PCI Assessments
Managed PCI Compliance
Telephone Systems

 

Call us if you have any questions at (636) 614-0866. Give us an opportunity to talk with you or someone you know about your business’ needs. I am positive you will be pleasantly surprised.