ProdigyTeks Logo
CALL US
(312) 600-8357
  • Home
  • About Us
    • Awards and Publications
  • IT Services
    • Managed IT Support
    • Network Security
    • Network Design and Implementation
    • Backup & Disaster Recovery
    • Email/Spam Protection
    • Cyber Security Services
  • Contact Us

Why Periodic Security Assessments Should Be Your New Normal

July 25, 2018 by Paco Lebron Leave a Comment


By now you know that building up your cybersecurity is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cybersecurity is something they can set and forget. Unfortunately, cybercriminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files, and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these problems, you’re able to proactively set up adequate protection before cybercriminals strike. It’s best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that would otherwise be missed.

Regulations change – Are you affected?

Many businesses are kept to strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and timeframe. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. Our team can ensure your business is meeting the relevant regulations, diving deep to be certain you’re safe.

Security patches and updates are vital

It’s so easy to fall behind on your security patches, after all, it seems like there’s a new update every week and each one takes precious time to apply. What we’re seeing though, is that cybercriminals are targeting any business running late, and it’s basically easy pickings for them. If you’re unpatched where it counts, it’s like inviting them in. When we conduct your security assessment, we take a look at your history and see if your business has a robust patch plan in place and make sure you’re up to date. If there’s an issue that’s placing you at risk now, impacted you in the past, or will in the future, we’ll find it.

Viruses are always evolving

Just like the human variety, computer viruses are nothing to welcome into your workplace. They’re constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cybercriminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where you’ve had the most breach attempts and where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed

As your business has grown over the years (or shorter if you’ve experienced a recent surge), your entire setup has changed. More employees, expanded remote access, additional vendors, supplementary locations…the list really is endless. With each change has come a new risk, particularly if your security has been growing around you. It might be that your password policies haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cybercriminal would.

What to do with your assessment results

While many experts might present you with a long list of problems and leave you feeling overwhelmed, our team ensures you have a benchmark for progress. You’ll know exactly what you need to do, how we can help, and perhaps most importantly, which actions take priority. Moving ahead, future security investments will be smarter as you focus on the high-payoff areas. You’ll also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call us at 312-600-8357

Filed Under: Maintenance, Privacy, Security, Small Business, Uncategorized

Share:

5 Tech Travel Tips You Can Use

July 2, 2018 by Paco Lebron Leave a Comment


Traveling soon? For most people, this also means making sure your tech is packed and ready for the adventure. Smartphones, e-book readers, tablets, laptops, and smartwatches are now so light and portable that you’d never think of leaving them behind, plus they can add a ton of value your experience.

Here are a few tips to consider before you hit the road.

1. Backup to the cloud

While you’re jet-setting around, relaxing on a beach or hiking your way to freedom, your tech is always going to be exposed to a level of risk. This might range from accidentally leaving your laptop at a cafe to having it stolen from your bag, but either way, the problem is the same – your data is now gone. If you’ve backed up your devices to the cloud (eg Evernote, Microsoft OneNote or Google Drive) you’ll be able to access your files easily and securely from anywhere.

Hot tip: Scan or save important documents like itineraries and passports to the cloud.

2. Pack the right cables

Begging random strangers for a loan of their cable isn’t much fun, so remember to bring the exact cables and chargers you’ll need. Most smartphones and tablets use universal plugs like Micro USB, USB C or Apple Lightning, so you can get away with only packing one cable. Many locations now offer powered USB ports but are sure to also pack the right charger as well, it’s a convenience you’ll appreciate. If you’re traveling overseas and the socket is different, remember to pack a plug converter, and depending on your destination, you might even find the voltage is different. It’s a good idea to check whether you also need a voltage converter before you try and charge.

3. Download offline data

It’s no secret that global roaming can give nasty bill shocks. The easy access data you normally use over Wi-Fi or get included in your cell plan has us all accustomed to being connected. While traveling, you might find yourself in a location where data costs a fortune or it’s not available at all. Download any files you might need, including important documents like itineraries and bookings, so that you can access them even without a connection.

4. Update and scan

Just like you’d make sure you’ve got the right vaccinations and travel gear, make sure your tech is ready to travel too. Set aside a few minutes to run updates for your operating systems and apps, as well as your anti-virus. Go one step further and run a manual anti-virus scan too. The last thing you want to deal with one your trip is a cyber attack! While you’re doing your pro-active thing, turn on password protection for all devices so that only you can unlock them.

Hot tip: Use a complex password that is hard for thieves to guess.

5. Mark your territory

Almost exactly the way it sounds, let everyone know this tech belongs to you. Write your cell number on portable devices in case you get separated so whoever finds it can give you a quick call and save the day. Don’t want to use permanent marker on your shiny tech? Grab some sticky labels you can peel off when you get home.

You can also get little Bluetooth tracking tags to stick to your gear, so that if you ever lose something you can chase it down. Similarly, you might like to consider enabling the ‘find my feature on Apple devices. Having this feature switched on also means you can disable your device remotely, an excellent security option if it’s been stolen.

Need help preparing your tech for travel? Give us a call at 312-600-8357

Filed Under: Cloud Email, Privacy, Security, Travel

Share:

Does Dropbox Make Sense For Your Business?

May 29, 2017 by Paco Lebron Leave a Comment

It seems so easy! Drag your files into a Dropbox folder and you’ve got yourself a file sharing system that brings your business in line with modern expectations. But then again, maybe not.

Dropbox has grown to become one of the main file sharing and cloud storage solutions of choice, with a core simplicity that’s hard to deny. But for business, that simplicity comes with a catch. In some cases, sticking with the familiar blue box can provide good value, and of course, it never hurts when your staff already know how to use your software. In other cases, you’ll need to consider alternatives designed to meet your needs more explicitly.

When Dropbox is a Good Choice

Micro-sized: If your business is small with no more than a handful of employees (or none);

No sensitive information: This includes accounts, customer details, vendor, staff or proprietary data; plus

Nobody ever accidentally deletes anything: Dropbox is a syncing service, which means when a file is deleted, it deletes it from all machines. While the file is recoverable from the Dropbox website within 30 days, by the time you notice it’s missing, it might be too late.

If you’re thinking those attributes sound more like a fictional business, you’re not far off. Somehow, Dropbox’s popularity in the consumer sphere has snuck into business environments, despite the risks. Key amongst these is the fact that Dropbox is designed for syncing, NOT a backup. This means while your data is sprawling across all connected devices, it’s a mirror of the source only – when you delete or change the original file, the Dropbox version immediately syncs with it. In some cases, this can spread malware between your connected devices and put all of them at risk.

Your business also misses out on important security controls, such as user-level access control and password protected links. Rather like a free-for-all, the shared files are sitting there available to anyone with either a connected device or an unsecured weblink. You’ll also miss collaborative editing, losing out in productivity and data resilience as multiple employees overwrite each other simultaneously, with no record of who even opened the file, let alone changed it.

If Dropbox makes sense for your business, there’s no reason to change. But if it’s clearly not a good choice for you, there are multiple corporate grade syncing solutions. These are designed for business with security, encryption and collaboration controls built in. Rather than the easiest solution which may pose a risk to your business and digital security, consider implementing a scalable solution that meets all your needs.

Call us at 312-600-8357 to discuss syncing solutions for your business

Filed Under: Entrepreneur, Privacy, Small Business

Share:

ALERT: Your Antivirus May Be Letting You Down

March 13, 2017 by Paco Lebron Leave a Comment


The best way to avoid a computer virus is by using common sense, but that doesn’t mean you’ll be safe from attack. Even the most careful user can find themselves infected in an instant and spreading the virus faster than a sneeze in flu season. It’s why antivirus software is still the first package we install on all systems – because you never know when you’ll be attacked. But should you choose free or paid antivirus?

Advertising: Much like a free app making its fortune with in-app purchases, the free antivirus software will push for payment. Expect popup boxes pestering you to sign up to the paid version at least daily. Some free options will also try to change your browser home page and default search engine, an inconvenience you may be stuck with. Paid options are more respectful and largely invisible unless they’ve detected a problem.

Effectiveness: It’s fair to expect your antivirus to detect malware, and testing showed that in a head-to-head battle free and paid are about equal at catching known infections. And therein lies the kicker: generally speaking, free antivirus needs to have recorded a virus to its library before it can detect it. Paid antivirus is more likely to identify and stop a new virus. It essentially bases the detection on suspicious behavior, source and attributes, a far more effective method of detection.

Features: Free antivirus options are usually created from the paid version, taking out everything except the bare minimum. In your paid version, you can expect advanced features like spam filters, firewalls, parental controls and secure web browsing. Some paid antivirus will also update your other software packages, forming a more secure protection against attacks. For example, you might view a malicious image file that takes advantage of an exploit in your PDF software. Unfortunately, hackers have advanced beyond simple tactics and it’s not just about avoiding email attachments anymore.

Support: Free antivirus options are the most popular choice because they’re… free. Obviously. This also means there’s generally no support available. If there’s a problem or conflict with another program, you may find yourself without protection until it can be resolved. Paid antivirus options usually include telephone support, ready to help with problems ranging from installation to system diagnostics.

Ease of use: Depending on what you use your computer for, this may be an important concern. Free antivirus options are easy to install and use, but are very limited in their flexibility. They come as-is, meaning you can’t pick and choose what it monitors or how it reacts. For example, users occasionally find it necessary to disable ALL protections in order to install a network game. Paid versions are more likely to allow you to adapt the way it runs, switching features on and off as required.

Free antivirus is fine for very basic protection, those on a budget or those with an older PC. In these cases, something is always better than nothing. But we generally recommend you go with a paid antivirus to defend you from the new attacks that are released daily, and to ensure you’ve got solid protection that will make a real difference to your digital safety.

Talk to us about upgrading your antivirus solution.

Contact Us

Filed Under: Privacy, Security, Virus and Malware

Share:

Will That Click Cost You Thousands?

January 24, 2017 by Paco Lebron Leave a Comment

Ransomware has undeniably been the biggest security threat of 2016. No-one was safe. Hackers targeted everyone and everything, including home PCs – and they were astoundingly successful – earning themselves upwards of $846million from US reported incidents alone. Business is booming for hackers, with thousands of attacks each day bringing in an average of $640 per target. Perhaps even more alarmingly, the financial cost of each individual attack is on the rise – the more ransomware proves to be an easy earner for them, the more they demand each time.

For a quick payday, some hackers offer to ‘rescue’ you from immediate danger – for a fee. One method is to trick you into thinking you have a virus that will spread if you don’t pay money to remove it immediately. Another much scarier method is to pretend to be the FBI and say your computer was involved in a crime (anything from money laundering to child pornography) and you can avoid going to prison by paying a few hundred dollars.

Thousands of regular people are also waking up every day to discover they’ve been locked out of their own files. Entire music and video libraries, digital photos from the past 5 years, personal budget files and even their secret novel draft …all held hostage until the user pays a ransom. The encryption is so strong and unbreakable that paying the ransom often becomes the only solution.

The way ransomware gets onto your computer is deviously simple. Generally, the hackers convince you to click an email attachment/link or pop-up. With both approaches, the hacker usually offers helpful information, for example:

  • Tracking an unclaimed parcel
  • Alerting that a virus was found and needs to be removed
  • Advising details of a recent traffic fine

It’s so tempting to click through for more details and that’s what the hackers count on. Their messages and pop-ups aren’t obvious threats and so slip easily under our radar. Unfortunately, they’re not the most trustworthy bunch so paying may not actually unlock your files, and one payment can quickly become several.

To make matters worse, they can encrypt any backups connected to your computer too, like a USB drive. Having a backup is super important in any situation, but in cases like this, the right backup is needed. Not only one stored separate from your network, but one created recently with all the files you can’t bear to lose. Before restoring your backup, however, you’ll need to make sure the malware isn’t lurking in the background, ready to not just re-infect your restored files but also the backup drive itself.

To avoid finding yourself up to the waist in ransom demands or sending hackers money each month, we recommend being wary of email attachments, even from friends and family. If you’re not sure what the file is, don’t click it. They may not have sent that email intentionally; their infected system may be auto-emailing everyone in the address book. You should also be careful with any popups that appear out of place, especially ones that try to make you panic. If it doesn’t sound right or look right, don’t click it. Ransomware is just too dangerous to risk.

Contact Us to set your computer up with protections against ransomware, and put backups in place that will keep your important files safe.

Filed Under: Privacy, Security, Virus and Malware

Share:

How To Spot A Tech Scam Before You Get Stung

November 15, 2016 by Paco Lebron Leave a Comment

techscam


If your computer had a virus, you’d want to know about it ASAP, right?

Before your important files become corrupted, you lose your photos and your digital life is essentially destroyed. Even thinking about it is terrifying.

Tech scammers know we’d be lost without our computers, and that we don’t always know what’s going on behind the screen – which is why they’ve been able to swindle millions from every day people across the world.

The scam goes like this:

You receive a random phone call from someone with a heavy accent (usually Indian) saying they’re from Microsoft, or an alarming pop-up appears on the screen, saying it looks like your system has been infected with a virus.

To fix the problem, they need to you to download some support software, which they’ll give you a special link for.

A technician then uses that software to gain access to your system and make it appear your system is riddled with viruses. Flashing screens, mysterious diagnostics whizzing by, fabricated errors…they’ll do or say anything to make you panic. They’ll even go as far as claiming your system has been infected with illegal content and if not corrected, you’ll face criminal charges.

Demands for credit card information follow immediately after. Once paid, they simply stop fiddling with your system to make it seem the problem is fixed. To continue the scam, they’ll soon access your system to recreate the problem, this time offering a subscription for ongoing protection.

What To Do If You’re Targeted By A Tech Scam

1. Don’t taunt them. Just hang up. Right now you’re only a phone number in their system and they’ll move onto the next – if you give them cause to target you personally, you may find yourself in a dangerous situation.

The real Microsoft will never randomly call people like this. Ever.

2. If a pop-up appears, immediately run an anti-virus scan. Don’t click the pop-up or call the number.

What To Do If You’ve Already Been Scammed

It’s okay. It feels horrible, but you’re not alone and the situation can be corrected.

Call your financial institution and have the charges reversed and your card reissued. It’s easier than you might think and helps the authorities locate the scammers.

Then contact us and we’ll make sure they no longer have access to your computer.

Contact Us

Filed Under: Privacy, Scams

Share:

ProdigyTeks

(312) 600-8357
159 N Sangamon Street Suite 262
Chicago, IL 60607

Get Remote Support

Services

  • Network Design and Implementation
  • Network Security
  • Email/Spam Protection
  • IT Support & Managed Services
  • Backup & Disaster Recovery
  • Cyber Security Services

FOLLOW US

Copyright © 2023 · ProdigyTeks · 159 N Sangamon Street Suite 262, Chicago, IL 60607