ProdigyTeks Logo
CALL US
(312) 600-8357
  • Home
  • About Us
    • Awards and Publications
  • IT Services
    • Managed IT Support
    • Network Security
    • Network Design and Implementation
    • Backup & Disaster Recovery
    • Email/Spam Protection
    • Cyber Security Services
  • Contact Us

The Manifest Recognizes ProdigyTeks Among Chicago’s Most Reviewed Vendors for 2022

March 13, 2022 by Paco Lebron Leave a Comment

Can you believe that it’s almost a decade since we’ve founded ProdigyTeks? Time flew by quickly, but every moment was worth it. We are thankful for the wins that we’ve unlocked, and we are thrilled to announce this new one!

We are incredibly honored to announce that The Manifest has named ProdigyTeks one of Chicago’s most reviewed IT services providers for 2022!

Our story began in 2013 when Paco Lebron established ProdigyTeks with a simple goal in mind, to empower Chicago’s underserved small businesses by providing quality, convenient and friendly IT Support. We efficiently combine our services to provide you with customized support, so you only get what you need and what you want.

In 2020, we received a 5-star rated review on an established B2B platform. An environmental governance platform needed help with several IT issues. We handled everything from minor IT issues to cybersecurity. We are currently switching the client’s operating system to the newest Mac operating system.

“They’re very proactive. They know what security we have, and they reach out ahead of time to let us know if something needs to be updated.” – Grace Elrod, HR Generalist, Goby Inc.

This year marks another breakthrough for ProdigyTeks. According to The Manifest, we are recognized as one of Chicago’s leading and most reviewed IT services providers for 2022. The Most Reviewed Company Award features the 15 companies found on The Manifest’s listing page that have received the most reviews in the past 12 months.

“It’s an honor to be considered a leader in the IT and cybersecurity space as our devotion is always to our customers. This is to say not only are we focused on their success but on the experience they have with us as well.” – Paco Lebron, Founder, ProdigyTeks

Bring peace of mind to your small business today! Fill out the form, and one of our representatives will reach out to you shortly.

Filed Under: Uncategorized

Share:

Paco Lebron Honored on Inaugural Channel Futures DE&I 101 List

August 9, 2021 by Paco Lebron Leave a Comment


Paco Lebron Honored on Inaugural Channel Futures DE&I 101 List

The List Recognizes Individuals Working to Promote Diversity, Equity & Inclusion in Technology Channels

AUGUST 9, 2021: Paco Lebron is among the honorees on the inaugural Channel Futures DE&I 101 list. The list recognizes individuals from a wide spectrum of multicultural backgrounds who are driving diversity, equity and inclusion in the technology channel through their words, actions, and leadership.

Paco Lebron is both an exemplary leader and an excellent role model in the Chicago community and beyond. Currently, as CEO and Founder of ProdigyTeks Inc., a privately held information technology services firm established in February of 2013, Lebron guides a dedicated team of leaders and experts to support his mission. Located in the West Loop of Chicago, the firm is committed to providing small businesses with high-quality service and support. Outside of serving as a thought leader in the technology space, Lebron demonstrates a passion for serving his community. Lebron joined the Hispanic Alliance for Career Change (HACE) in September 2015 as an at-large member until his Vice-President appointment of the HACE Young Professionals in July of 2016.

The Channel Futures DE&I 101 list was created to turn a spotlight on the dedicated and determined individuals working to eliminate discrimination in the industry. The need for DE&I has been acknowledged in the information and communications industries for many years. But while any number of tech organizations have received attention for the DE&I programs they’ve launched, it’s the people at the grassroots level who get things started and keep the momentum going. And too often their efforts go unacknowledged.

“The publication of this list represents a milestone for the industry and channel in raising the visibility of individuals who are truly at the center of change in the industry,” said Robert DeMarzo, vice president of content, Informa Tech Channels. “These individuals are propelling their organizations forward when it comes to innovation, business growth and customer/supplier connections. The Channel Futures team is proud of its role in bringing this list, spearheaded by Managing Editor Buffy Naylor, to market recognizing such a great group of individuals.”

Nominations for the premiere DE&I 101 list were solicited on the Channel Futures website. Between April 15 and June 15, individuals could nominate themselves or others for the list. Applications were open to managers, leaders and individual contributors. All submissions were thoroughly reviewed by members of the Channel Futures editorial team with input from advisory board members.

“It’s been proven that a diverse workforce can make a company more innovative, productive and profitable,” said Kelly Danziger, general manager, Informa Tech Channels. “Our industry is constantly evolving to keep pace with advances in information and communications technologies and the workplace structure. It’s essential that the industry and the channel also evolve in step with the workplace demographics. Beyond making good business sense, it’s the right thing to do.”

 

About Channel Futures

Channel Futures is a media and events platform serving companies in the IT channel industry with insights, industry analysis, peer engagement, business information and in-person events. Our properties include Channel Futures MSP 501, recognizing the most influential and fastest-growing providers of managed services in the technology industry, Channel Futures DEI 101, honoring and celebrating those who have often been under-represented in tech channels; Channel Partners Events, delivering unparalleled in-person events, including Channel Partners Conference & Expo, The MSP Summit, and Channel Evolution Europe; and DEI Community Group, our initiatives to educate, support, promote, and sustain diversity, equity, and inclusion (DEI) in the IT channel industry. Channel Futures is part of Informa Tech, a market-leading B2B information provider with depth and specialization in the Information and Communications (ICT) Technology sector. Every year, we welcome 7,400+ subscribers to our research, more than 3.8 million unique visitors a month to our digital communities, 18,200+ students to our training programs and 225,000 delegates to our events. Channel Futures is where the world meets the channel; We are leading Channel Partners forward. More information is available at channelfutures.com.

 

Media Contact
Buffy Naylor

Managing Editor, Channel Futures

buffy.naylor@informa.com

Filed Under: Uncategorized

Share:

ProdigyTeks, Inc. Recognized as a Leading Managed IT Services Company in Illinois by Clutch

June 22, 2021 by Paco Lebron Leave a Comment

Ever since our company was founded in 2013, our main goal has always been to empower small businesses through our quality and friendly IT services. We continue to provide amazing and innovative solutions in the market to keep with our client’s growing demands. 

Today, we are going to have a huge announcement that we want to share with all of you! Clutch has recently announced their list of top companies in Illinois and we were lucky enough to be included there. Our team was named as one of the best IT services in our state and we can’t express how thankful we are for this recognition.

As a matter of fact, here is a summary of what our company feels about this award:

“It’s an honor to be considered a leader in the IT and cybersecurity space as our devotion is always to our customers. This is to say not only are we focused on their success but on the experience they have with us as well.”

In case you don’t know Clutch, they are an established verified reviews platform in the heart of Washington, DC, committed to helping small, mid-market, and enterprise businesses identify and connect with the service providers they need to achieve their goals.

Again we are very thankful for Clutch and all that they do for the B2B industry. Furthermore, we would also like to thank our clients for choosing us and our services throughout the years. Your support is what helped us propel our business forward.

Looking for a capable IT company for your business? ProdigyTeks, Inc. is here to help! Drop us a line and let’s talk about how we can help you.

Filed Under: Uncategorized

Share:

ProdigyTeks Ranked #4 Among World’s Most Elite 501 Managed Service Providers

August 3, 2020 by Paco Lebron Leave a Comment


 

ProdigyTeks Ranked Among Illinois Most Elite 501 Managed Service Providers 

 

Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services

CHICAGO – August 3, 2020: ProdigyTeks has been named as one of the world’s premier managed service providers and one of the top MSPs in Illinois on the prestigious 2020 annual Channel Futures MSP 501 rankings.

For the 13th year, MSPs from around the globe completed an exhaustive survey and application this spring to self-report product offerings, annual total and recurring revenues, profits, revenue mix, growth opportunities, and company and customer demographic information. Applicants are ranked on a unique methodology that weights revenue figures according to long-term health and viability; commitment to recurring revenue; and operational efficiency.

Channel Futures is pleased to name ProdigyTeks to the 2020 MSP 501.

“It is a true honor to be recognized as one of the top 10 among my peers in the 501 MSP rankings. This designation further demonstrates the devotion of our team, who are committed to continued growth. We look forward to new opportunities to advance and move the digital landscape forward,” said Paco Lebron, CEO, ProdigyTeks.

In the 13 years since its inception, the MSP 501 has evolved from a competitive ranking list into a vibrant group of service providers, vendors, distributors, consultants and industry analysts working together to define the growing managed service opportunity.

“These benchmarks are what local businesses should examine when choosing a managed service provider with the experience, skill set, business knowledge and defined strategy to help them succeed in this fast-changing digital landscape,” says Kris Blackmon, Senior Content Director, Channel Partners and Channel Futures. “In all of the managed service providers that IL has to offer, ProdigyTeks stands as a shining example of excellence.”

Ten MSP 501 special award winners will be recognized at the MSP 501 Awards Gala at Channel Partners Virtual: Digital Events for the Modern Channel on September 8 – 10. Nominations for these special awards, including Digital Innovator of the Year, Executive of the Year and the Newcomer Award, were included in the MSP 501 application, and all candidates were encouraged to submit for them.

The data collected by the annual MSP 501 program drives Channel Partners’s and Channel Futures’s market intelligence insights, creating robust data sets and data-based trend reports that support our editorial coverage, event programming, community and networking strategies and educational offerings. It serves as a lynchpin to dozens of programs and initiatives.

The complete 2020 MSP 501 list is available at Channel Futures.

 

Background

The 2020 MSP 501 list is based on data collected by Channel Futures and its sister site, Channel Partners. Data was collected online from Mar. 1 through June 30, 2020. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, profit margin and other factors.

 

About ProdigyTeks

Founded in 2013, ProdigyTeks is committed to empowering Chicago’s underserved small businesses by providing quality, convenient and friendly IT support. ProdigyTeks takes pride in their innovative approach and excellent service experience by providing a personal touch with every customer interaction. ProdigyTeks is a Chicago-based Minority Business Enterprise.

MEDIA CONTACT:

Marketing Department

marketing@prodigyteks.com

 

About Informa Tech

Channel Futures, Channel Partners Online, Channel Partners Conference & Expo and Channel Partners Evolution are part of Informa Tech, a market-leading B2B information provider with depth and specialization in the Information and Communications (ICT) Technology sector. We help drive the future by inspiring the Technology community to design, build and run a better digital world through our market-leading research, media, training and event brands. Every year, we welcome 7,400+ subscribers to our research, more than 3.8 million unique visitors a month to our digital communities, 18,200+ students to our training programs and 225,000 delegates to our events.

MEDIA CONTACT:

Allison Francis

Editor, Channel Futures & Channel Partners

Editor, MSP 501

Allison.Francis@informa.com

Filed Under: Uncategorized

Share:

Tips for Trouble-Free Online Meetings

May 1, 2020 by Paco Lebron Leave a Comment


Online meetings are the new norm for many, but that doesn’t mean people magically know how to enjoy a trouble-free online conference experience. These tips can power more successful meetings.

Many businesses today are working from home with a reliance on Skype, Microsoft Teams, Google Hangouts, Zoom, or GoToMeeting. But even with these platforms offering voice or video capabilities, there can be tech problems. These tips can minimize trouble and enhance business collaboration.

1. Go Wired

Connecting to Wi-Fi offers flexibility and mobility. Yet when it comes to an online meeting, prefer a wired connection. Enjoy a more reliable meeting connection by plugging your laptop or desktop into the internet router using a network cable.

If you need to use a mobile device and can’t connect via cable, reduce Wi-Fi obstacles. Call in from as close to the wireless access point as you can. Wi-Fi signals are a form of radio wave, which means they can be hindered by:

  • large metal objects near the router;
  • thick walls;
  • other electronics;
  • Wi-Fi congestion from your neighbors’ access points.

So, that important meeting is not the one you join from a cement-bricked basement, not when your Wi-Fi router is in an upstairs bedroom and your neighbors are all relying on Wi-Fi signals, too.

2. Prioritize Your Meeting

When you have a scheduled meeting, announce it to the rest of the household. Ask kids not to get on Xbox or stream movies at the same time as you connect to your meeting. See if you can’t persuade your partner, who is also working from home, not to download large files or new software at the same time as your meeting.

Program your devices to back up at times that won’t compete with your work hours. In the office, your IT team scheduled updates or security patches outside of business hours. Now that you’re doing it all at home, be smart about when you do upgrades. Depending on your home internet speed, trying to do too many things at once can cause trouble for everyone.

3. Test Connections Before the Meeting

You may feel that all you’re doing is meeting online right now. Why would you need to test audio and video each time? Well, every time you unplug a device such as a microphone or a headset the settings will return to the default. That means the next time you connect you aren’t set up the way you want to be. You were expecting to listen in using your USB headphones, but the last time you unplugged them your computer switched back to the next available audio input (e.g. your monitor or built-in laptop speakers).

By checking the connection first, you also make sure you have the most up-to-date platform software. You don’t want to be late to a call because your device has decided it needs to re-install Skype right at that moment.

4. Use the Right Equipment

Headsets and external microphones limit the ambient noise. You’ll hear better. Plus, it will make your contributions easier to hear, too.

Muting your microphone when you’re not talking also helps – it reduces the noise pollution. Problems can arise when your mic picks up other people talking through your speakers. This precaution also saves you from apologizing when your dog barks ferociously at the FedEx delivery person.

5. Pick the Best Setting

Plan the best place to take that online meeting. The closer you are to your wireless access point, the better your connection.

Plus, you want to avoid high-traffic areas, as you’re more likely to be distracted. A child or furry colleague could make an unplanned appearance.

Select an area with a simple background, too. Sitting in front of a window may seem like a good idea, but it makes your face darker and more difficult to see on the video. Ideally, you want to be in a well-lit room with a plain wall as your background.

6. Take Full Advantage of Online Meeting Features

You may have done conference calls in the past. Everyone called in, spoke when necessary, and that was that. But much of the top business collaboration software offers added features:

  • Call recording provides a record that can be checked later.
  • Call transcripts give you an efficient way to capture all that happened in a meeting.
  • Some platforms let you add virtual backgrounds to video calls.
  • You might also enable an interactive shared whiteboard, presentation slides, or co-browsing.

Online meetings are efficient and cost-effective. With the current health crisis forcing many of us to adapt to connecting virtually, implementing these ideas can help.

Need help setting up your online meeting platform or deciding on the solution that’s right for you? We can help. Contact us today at 312-600-8357!

Filed Under: Cloud, Uncategorized, Virtual Meetings, Working From Home

Share:

Do Macs Get Viruses?

August 23, 2019 by Paco Lebron Leave a Comment


Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After all, nothing’s happened to them yet. Regrettably, Macs do get viruses, and the threat is growing.

For a long time the argument was that cyber criminals didn’t bother to develop Mac viruses. There weren’t enough users to justify the effort. Instead, they’d focus on the lower hanging fruit – PCs running Windows.

Yet Apple’s market share is on the rise, and it’s increasingly common to see Macs in the workplace, especially in creative industries. Plus, there’s a widespread assumption that Mac users are a smart target as they are likely to be better off. So, while Macs remain harder to infect (installing most software requires a password), there’s often a greater payoff.

The research reflects the reality. In 2017, for instance, the iPhone OS and Mac OS X placed #3 and #6 in CVE Details’ top 50 ranked by total number of distinct vulnerabilities. Apple TV and Safari also made the list at #17 and #18, respectively. In 2017, Malwarebytes also reported it “saw more Mac malware in 2017 than in any previous year”. By the end of 2017, the cyber security firm had counted 270% more unique threats on the Mac platform than in 2016.

Finding Apple’s Weak Spots

It’s obvious then that bad actors are no longer steering clear. They are actively looking for ways to exploit Macs.

A common approach is to use Trojans. Named after a gift wooden horse that hid an army, Trojans look like something you would want to install. So, Mac users happily enter their passwords to download that application and open the gates to the cyber criminal.

In 2011, for instance, a Trojan called “Mac Defender” took advantage of people’s desire to protect their computers. The fake program appeared to be anti-virus software. Once the users installed it, they’d get an onslaught of pop-up ads encouraging them to buy more fake software.

Trojans get through the gates because you let your guard down. You are taken in by that supposed note from a long-lost friend. You think you want to see that pic of that famous celebrity. All it takes to stop this type of attack is suspicion of everything you might install or download.

A business would want to educate its employees about the importance of:

  • clicking on emails with care;
  • validating the source of any files they plan to open;
  • checking a website’s URL (being especially wary of those with less common endings such as .cc or .co);
  • questioning any promises of Ray-Ban sunglasses for 90% off or the latest iPhone for $29.99.

A new threat comes from within the Mac App Store, according to Thomas Reed, a Mac security researcher. When a user tries to install an app on a Mac, a Mac OS program called Gatekeeper checks the file’s code signature. The signature helps certify the app is valid. However, Reed found that cyber criminals could buy a legitimate certificate from Apple, or steal one and trick users. Users would install masked malware that could infect legitimate programs and evade detection.

Key Takeaway

Apple is always working to protect its users from malware. It has measures in place, and user caution can make a big difference, too. Still, it’s not true that Macs are completely safe.

Find out what you can do to protect your Macs and guard against threats. Partner with a managed services provider to gauge your security levels.

Call us today at 312-600-8357!

Filed Under: Uncategorized

Share:

Are You Due? What to Do When You Get a Renewal Notice

August 15, 2019 by Paco Lebron Leave a Comment


Your business relies on any number of service providers. You’re likely contracting for domain names, website hosting, data backup, software licenses, to name just a few. And that’s only your online presence! So, when a renewal notice comes in, you might just forward it on or file it away for future reference. Here’s what you should be doing instead.

First, when you get a renewal notice, you should confirm that it’s legitimate. This is especially true of domain names. Your business’s domain name and expiration date are publicly available. Anyone could look them up and send you an invoice. Scammers do. They monitor expiring domain names and then send out emails or convincing physical notices telling you it’s time to renew. They are not doing this as a civic service!

Instead, they will be trying to get you to switch your domain services to a competitor or, worse, hoping you’ll pay your renewal fee to their account, which has no connection to your domain.

  • Look out for the following indicators that the notice is a fraud:
  • The price is much more than you’d expect.
  • The deadline is within seven days.
  • You don’t know the business name.
  • This business has never contacted you before.
  • The notice requires you to send a check.

Handling Authentic Renewal Notices

Once you’ve determined the authenticity of the renewal notice, you’ll want to take stock. Putting your licenses or other online services on auto-renewal plans can be easier, but it may not be cost effective. Before re-upping your plan consider:

  • Are you still using this service?
  • Do you really still need it?
  • Do your current needs meet your current plan?
  • Should you upgrade or downsize?

You might also contact your provider directly and ask:

  • Is there a better product available now?
  • Are you eligible for a loyalty discount?

The company you’re dealing with wants to keep your business (hence, the renewal notice). That can give you some leverage in negotiating what you are paying or what service you are getting. You could treat an annual renewal notice as an opportunity to renegotiate terms. It’s not always going to work, but it can be worth a phone call as you try to keep business expenses under control.

Finally, you should pay attention to any deadlines on the renewal notification. Some are sent months in advance. That seems so helpful, but if you put it away to deal with later, before you know it you’ve missed an important date and the service is stopped.

You should always get a renewal notice for something like a domain name. The Internet Corporation for Assigned Names and Numbers (ICANN) requires companies to send reminders approximately one month and one week before your domain name expires.

Don’t leave your renewal to the last minute. With expired domain names, for instance, you can lose your website! Options and fees for renewing domain names, including expired ones, are going to vary, so be sure you know what your subscription involves.

Also, there are bad actors out there who monitor domain expiration to buy them up at bargain prices. Then, when you notice the subscription has lapsed, you have to pay a king’s ransom to get the Web address back. Yes, it can happen to you. In fact, the World Intellectual Property Organization (WIPO) handled a record 3,074 cyber squatting disputes last year.

Avoid being overwhelmed by all the subscriptions and service plans your business relies upon. A managed service provider (MSP) monitors your license and domain expiration dates to ensure your business is current. At the same time, the MSP has the expertise needed to determine what plans best suit your business needs.

Give us a call at 312-600-8357 to enjoy the peace of mind a managed service provider brings!

Filed Under: Uncategorized

Share:

Don’t Get Hooked by Spear Phishing Attacks

February 8, 2019 by Paco Lebron Leave a Comment


Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used.

A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a phishing attack captures the login details you enter so an attacker may use them to enter the genuine service later.

By sending out tens of thousands of emails at a time, attackers can guarantee that even if only one half of one percent of people fall for it, there is a lot of profit to be made by draining accounts. Spear phishing is a more modern, more sophisticated, and far more dangerous form of the attack. It’s typically targeted at businesses and their staff.

A Convincing, Dangerous Attack

While a traditional phishing attack throws out a broad net in the hope of capturing as many credentials as possible, spear phishing is targeted and precise. The attack is aimed towards convincing a single business, department, or individual that a fraudulent email or website is genuine.

The attacker focuses on building a relationship and establishing trust with the target. By building trust and convincing the target that they are who they are pretending to be, the user is more likely to open attachments, follow links, or provide sensitive details.

Consider how many times you have followed a link or opened an attachment just because it has come from a contact you have trusted before.

A Trusted E-mail

The malicious email can appear to come from a vendor you deal with regularly. It may even look like an invoice you are expecting to receive. Often attackers can simply substitute the vendors’ banking details for their own, hoping the target will not notice the difference.

Such an attack is very difficult to detect. It takes a keen eye, strong working knowledge, and constant awareness to keep your company protected. Even a single small mistake by an unaware member of staff can compromise your business accounts.

Defending Your Business

The key to stopping a spear phishing attack is education. Learning attack techniques, and how to protect against them is the single biggest thing you can do to enhance business security.

Whenever you deal with a vendor in a business transaction, you should always consider important questions before proceeding. Are you expecting this email? Is the vendor attempting to rush you into a quick decision or transaction? Have you checked all the details are correct and as you expected? Sometimes a simple query to the vendor can protect you against worst-case scenarios.

In many cases, a phishing attack can be halted in its tracks with a strong IT security package. Web filtering prevents malicious emails and links from entering the network, shutting attacks down before any damage can be done.

Good Security Practice

As with many types of IT threat, good security practices help mitigate damage. Locking down security to ensure employees only access the systems they need helps to prevent damage spreading across the network.

Enforcing unique and strong passwords prevents leaked credentials from affecting systems related to the one that has been compromised. Getting employees set up with a password manager and good security policies can do the world of good to boost your security to the level it needs to be.

Give us a call at 312-600-8357 to audit your security practices. It could be the difference that secures your firm against sophisticated spear phishing attacks.

Filed Under: Uncategorized

Share:

Time to Refresh Your Passwords

January 4, 2019 by Paco Lebron Leave a Comment


We often tend to be creatures of habit, particularly when it comes to technology. Passwords are a prime example. Many of us use the same logins for multiple websites and applications because we don’t have a photographic memory. A large percentage of users aren’t aware that this is one of the most significant security dangers they can face online. It has a simple fix too.

Regularly, in the news today, there are stories about major companies being hacked, their customer data stolen, and their customers left stranded. Hackers commonly use data stolen from one site to access others where login credentials have been reused between accounts. In some cases, access to bank accounts has been gained simply by using a compromised email account.

Businesses and individuals can face significant losses simply because a third party outside their control has been hacked or compromised.

The Danger Of Old Passwords

MySpace is a key example of why old and possibly forgotten services pose a security danger when passwords haven’t been regularly changed. Once a thriving popular network, the use of MySpace services declined drastically from 2007 onwards. While many people moved to new social networks, old accounts typically remained abandoned on their servers. Hundreds of millions of accounts remained on MySpace servers many years past the firm’s peak.

In 2016, MySpace suffered a data leak which exposed usernames, emails, and passwords of 360 million user accounts. Shortly after the hack, these details were published online for anyone to see. Many were used to access email accounts, servers, and accounts that shared the same details.

Shared Responsibility

Even if you have never had a MySpace or social media account personally, how many of your employees or coworkers have one or more? Many have had more social media, forum, or game accounts than they care to remember. Have their passwords been updated since 2016?

Your business network protects your systems, work, and intellectual property. For many firms, it’s the single most critical component, the backbone to business operations. Keeping it secure regardless of the number of people, staff or clients using it is a crucial task.

Consider how many people currently have access and how many of those may reuse their password on another website or service. Just reusing your password once can expose you to the hacking of a third party entirely out of your control.

Password Management

Good security practice is to use a unique and strong password for every login you use. A strong password should include, where possible, capital letters, lowercase letters, numbers, and character symbols. Many consider this impractical or even impossible, but it is entirely achievable for every firm.

It is clearly impossible to manually remember a strong password for each one of the dozens of logins needed today. Few would even attempt to. A password manager makes storing, retrieving, and using unique passwords easy.

When using a password manager, an individual is required to remember only one single strong password to access a database which contains a different login password for each service. This database can be synced between multiple devices, saved and backed up to the cloud, and even used to create strong passwords for you.

Strong Protection

Password managers can be used to implement security policies that demand zero password reuse, between services or over time, and set strict limits over the duration a password can last. With the right policies in place, both your business and your employees are protected against attacks from hackers that have compromised third-party sites.

The maximum recommended lifetime of a password for any service is a single year. Make the start of the calendar year the time which you refresh your passwords and start new.

To help keep on top of your security and make sure your firm is safe well into the new year, give us a call at 312-600-8357.

Filed Under: Uncategorized

Share:

How Losing a Mobile Device Puts Your Entire Business at Risk

December 26, 2018 by Paco Lebron Leave a Comment


Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device are unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself.

Chances are, you already use automatic login on a large variety of online services. Each of these services is vulnerable to an attacker having possession of your device.

Usernames and passwords – An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser. This is often done to save time when logging into sites that you visit often. Almost universally, people opt to save login information so that they don’t have to attempt to remember it every time they return.

In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device. These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information. Simply by finding a phone misplaced in public, they may gain access to a huge array of services.

The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts. In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services.

Email – Email accounts are a key target for attackers looking for access to your personal information. It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after. It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access, a malicious user can gain access to many of the most commonly used web services online.

Using the “forgotten password” button on many sites triggers a response that emails a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords to one of their choosing. Doing this both grants themselves access to your account and denies you access to rescue it.

Contacts – One of the best features of instant messaging is that your contacts know the messages come from you. When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too. This can lead to identity theft, one of the biggest concerns of a lost or stolen device.

With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.

Social Media – Your social media accounts are often the face of your brand. They can be a primary way to reach out and contact customers. They are almost always the first point of contact a client has with your business. They are also extremely vulnerable to being hijacked from a stolen device.

Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business.

Protecting your business – Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer.

We can help you to stay secure and remain in control even in the face of losing a device. Give us a call at 312-600-8357 and let us help secure your business.

Filed Under: Uncategorized

Share:

  • 1
  • 2
  • 3
  • Next Page »

ProdigyTeks

(312) 600-8357
159 N Sangamon Street Suite 262
Chicago, IL 60607

Get Remote Support

Services

  • Network Design and Implementation
  • Network Security
  • Email/Spam Protection
  • IT Support & Managed Services
  • Backup & Disaster Recovery
  • Cyber Security Services

FOLLOW US

Copyright © 2023 · ProdigyTeks · 159 N Sangamon Street Suite 262, Chicago, IL 60607