ProdigyTeks Logo
CALL US
(312) 600-8357
  • Home
  • About Us
    • Awards and Publications
  • IT Services
    • Managed IT Support
    • Network Security
    • Network Design and Implementation
    • Backup & Disaster Recovery
    • Email/Spam Protection
    • Cyber Security Services
  • Contact Us

The True and Unexpected Costs of Being Hacked

May 10, 2018 by Paco Lebron Leave a Comment


The True and Unexpected Costs of Being Hacked

There are the normal costs everyone associates with a breach, like getting your own server and computers fixed up, with maybe a little downtime. But really, most businesses view the possibility of getting hacked as more of an inconvenience than a bottom-line cost. For those who’ve come out the other side though, it’s a very different story. They know the hidden and ongoing costs of a data breach can be crippling, and that IT security exists to protect your business on multiple levels. All those surprise costs that spiral out of control are why most businesses close after a cyber-attack. Here are a few of the hard, but common realities of life after a hack.

Raiding the budget to reduce downtime

From the moment a cyber-attack gets into your system, things get expensive, and the longer the attack goes, the more it costs. Latest stats reveal most breaches aren’t identified for around 191 days, then it can take on average another 66 days to contain the damage. During this time you’re cleaning PCs, mobile devices, laptops, servers and even entire networks. Add to this the fee for experts to fix everything up, all the new tools and software they insist you have, and all the hours/days/weeks when your business is struggling with downtime, you’ll exhaust your emergency funds very quickly.

The long arm of the law

Depending on what data was stolen and how you handled the situation, you could be liable for fines into the millions. Having any medical data or legal files leak is a particularly messy scenario with fines coming from multiple sources. In any case, new privacy laws mean businesses are liable for massive fines if they don’t disclose a data breach, even if only email addresses were stolen. Where this gets even trickier is that the burden is on your business to know exactly what data has been stolen/illegally accessed, so you can report it before the fines stack up. This means that even if you were able to fix up the systems yourself, you still need to hire an expert who can identify exactly what the hackers took, from where and when.

Customer retention measures

In a double-down crush to your bottom line, not only does your business have to bear the cost of the hack, your future income takes a hit as customers lose trust and leave. To offset this, many businesses need to engage PR experts, spend more on advertising, and go all out to ensure they survive to fight another day. Even so, your breach disclosure will still come up in search results for many years. The more negative publicity your breach attracts, the more you’ll need to spend on customer retention.

All your secrets exposed

While you may not have Pentagon level secrets to protect, your business does have information that you’d like to keep to yourself. Hackers love going after those juicy tidbits, and the more closely you guard them, the more attractive they are. Think Coca Cola recipe, Big Mac Secret Sauce or 11 Herbs & Spices…While those corporations would be big enough to keep their competitive edge after the breach, your business success relies on at least some information staying secret. It may not be a secret recipe, but your proprietary methods and databases have a black-market value all of their own.

But simply avoiding a breach doesn’t cost much at all…

The thing is, it’s not expensive to stay on top of it all and keep your business protected. For a low monthly fee, we can reverse the entire scenario and secure your systems against the unknown. That means no need to raid other department budgets in a panic, pay crippling fines, make embarrassing public announcements, or fight to retain your competitive edge.

We can help with making sure your systems have the latest security patches and your anti-virus knows the latest tricks to watch for. Our technicians can build a virtual fortress around your business that keeps the bad guys out while letting you thrive, and even monitor security with early warning systems. Whatever your needs are, both now and moving ahead, we’re here to help keep you safe while keeping your IT costs low.

Ready to secure your business against breaches? Give us a call today on 555-5555.

Filed Under: Uncategorized Tagged With: Cyber, IT, Managed Services, Security

Share:

How do I stop my computer from getting infected?

May 3, 2018 by Paco Lebron Leave a Comment


I get this question quite often. It is often thought as a computer technician we should be able to tell our customers how to keep from getting infected. So when I am asked this question I give the same answer, You can’t.

Now don’t me wrong, it’s all not. All though there is not a 100% chance of being virus free there are ways to better protect yourself from some of the pretty scary stuff out there. I’ve assembled the following free tips and tools that will help you prevent infections such as viruses and spyware:

Always keep your computer up to date:

This may sound easy enough but you would be surprised at how many systems have an outdated system. Whether it be not having the latest Windows updates or 3rd Party apps like Adobe Reader or Flash player plugin. These are notorious for having exploited flaws or “open doorways” that can potentially let in a lot of bad stuff in your system. First I would suggest running Windows Update on your control panel to ensure your system is up to date. For 3rd party applications, I suggest a program called PatchMyPC. Not only does this program highlight what 3rd party updates needs to be updated it gives you one button to update all programs that need to be updated. You can download it here:   Download

Backup your important files:

I can not stress this enough as it is the #1 savior to most users in a time of a computer crisis. You probably have pictures of your children, grandchildren or important events all on your computer. However, imagine one night a power outage causes your computer to shut down and never come back up again. To make things worse you have no backup of any of those photos. Often times I hear clients say “I have a hard drive which I’ll back it up when I can.” Then…they put it off for tomorrow, and then the next day. Until they find themselves a year later to no backup and lost memories. This is an everyday occurrence which often times price cost comes in the way of putting a solution in place. The following article discusses some great free alternatives for your backup needs: http://pcsupport.about.com/od/software-tools/tp/free-online-backup.htm

If you are able to invest a little bit in a solid backup program (we are talking about your irreplaceable memories here) Carbonite has been a leader in online backup space for quite some time. They currently offer a 30-day trial to kick the tires and see if it is a good fit for you. You can signup for your trial by clicking the signup button below: Sign up

Get the 2nd Line of Protection for your PC:

All Windows PC’s now have Windows Defender which is Microsofts built in Antivirus. However, that is not enough.  As viruses are now evolving to better hide from antiviruses you will need what we like to call a “2nd line of defense” Which we suggest the program Malwarebytes. It has voted Best Free 2nd Line of defense for PCs on tomsguide.com for 2016.  This tool is very effective in removing any nagging bug that may be in your system. You can find the download button below:  Download

BONUS:

More and More fraudulent websites are popping up in hopes to infect your PC and steal your data. This is why we love Adblock Plus. It is a pop-up filtering system to get rid of most annoying banner and pop-up ads. To  get your free browser plugin you can download it here:  Download

With these tools, you are now prepared to not only protect your PC’s health but your data as well. As mentioned before, nothing is 100% and are taking these suggestions at your own risk. Just one thing to keep in mind is constant maintenance is needed to be effective which is a commitment you will need to give.

Should you feel you’d prefer someone else to handle such commitment for your protection you can contact us on how we can take care of the protection for you to prevent infections most users are plagued with our protection plans. Contact Us

Filed Under: Uncategorized

Share:

Should You Buy A Consumer or Business PC?

June 4, 2017 by Paco Lebron Leave a Comment

 

Before buying a computer for work, it’s important to consider whether your best bet is to get a consumer model or one built specifically for business use.

You’ve probably seen business computers with the same brand name that you have at home, but that’s where the similarities end. Investing in the right system now will pay off long term, saving you time, money and a whole lot of frustration. Here’s what you need to know to make the best choice for your business and budget.

Business-class Features

When you invest in a computer, you want certain inclusions built-in and ready to go. For a business, those include features that will make your network more secure and staff more productive. For example, fingerprint readers, remote desktop software, and data encryption tools. The operating system that comes pre-installed on a business-class computer will also have features the consumer options don’t, including the ability to join corporate networks. Computers designed for home use come with Windows Home or Starter editions, which may require hours of expert assistance to link into a secure business network.

Usage Requirements

Work out how often you’ll be using the computer for business. If the computer is mostly for home use and only occasionally for work, then a consumer PC with the appropriate work software and settings will be fine. On the other hand, a computer that is mostly for business use should be a business-class computer, not just for security but also build quality reasons.

Durability and Reliability

It’s probably no surprise that consumer PCs don’t have the same build quality as business ones. In fact, consumer models only have an expected lifespan of around 2 years. They just aren’t built to last. Business-class computers are built to last several years, with higher quality components and rigorous testing at every level. Most parts (if not all) are name-brand with an emphasis on reliability and long term durability.

Warranty and Service

Unfortunately, when a consumer PC fails, the burden is on the owner to send it away for repairs. The terms of the warranty will usually state that any other attempt to repair it will void the warranty. Repairs can then take weeks and often involve a frustrating process of paperwork and following up. Contrast that with what happens when a business computer needs service – the technicians will come to you and fix it on the spot, often within hours. Business users enjoy a professional experience with priority status and a dedicated support line, all designed to reduce downtime and get you operational, faster.

Talk to us today at 312-600-8357 about choosing the right computer for your needs.

Filed Under: Uncategorized

Share:

Incredibly Easy Ways To Protect Yourself On Social Media

April 15, 2017 by Paco Lebron Leave a Comment

Social media networks have enabled people across the world to stay connected with their friends and family. However, social media networks rely heavily on personal communications and connections, something that encourages users to provide some amount of personal information. Consequently, scammers and other online criminals are now using social media networks to steal other people’s personal information, and thus you need to stay protected while using any social media network out there. Here are some simple ways to protect yourself on social media.

1. Don’t share your personal details

Posting or sharing your personal information on social media networks can make you vulnerable to scammers, hackers and other online criminals who are out to steal people’s private information. Therefore, refrain from sharing personal information such as your stress address, phone number or any other sensitive information that you don’t feel comfortable with strangers knowing. Again, be careful while posting and sharing information about your connections lest you end up giving out their private information thus exposing them to scammers and hackers.

2. Come up with strong passwords for your social media accounts

When it comes to social media accounts passwords, the best passwords are the hardest to guess. Having strong passwords for all your social media networks will help ensure that no one else apart from you can access your accounts. More importantly, keep your passwords secure and change them frequently to avoid being hacked. If possible, make sure you use different passwords for different social media networks.

3. Know the people you are connecting with on social media

Hackers, scammers and other types of online criminals are known to misrepresent their motives and identities on social media. Therefore, always know the people you are connecting with prior to allowing them into your network. Once you get a connection request, always check whether the connection is real to ensure you aren’t connecting with an impostor who is out to steal your personal data. To figure out whether a connection is real or fake, check how many connections they have and whether they have something in common with you. Above all, never accept connection requests from unknown parties or suspicious people.

4. Keep your social media accounts private

Use the default privacy settings on your social media accounts to keep your accounts as private as possible. Modify the privacy settings to ensure you are only sharing information with certain people or people already in your network, and to prevent the public from accessing what you post on your social media accounts.

5. Desist from accessing social media with wireless connections and public computers

Accessing your social media accounts on shared computers and public wireless connections can make you vulnerable to scammers and hackers. Therefore, try your level best not to access your social media accounts on shared computers and other public wireless connections to reduce your risk of getting hacked. But if there is no other way you can access your accounts other than using shared computers and public wireless connections, don’t forget to log out completely. Again, don’t leave your passwords and any other sensitive information since you can’t be sure who will use that computer after you are gone.

Conclusion

When using social media networks, always ensure you are well protected from scammers, hackers, and people with ulterior motives. With these tips on how to use social media networks safely, there is no doubt you will remain protected when using social media.

Filed Under: Uncategorized

Share:

  • « Previous Page
  • 1
  • 2
  • 3

ProdigyTeks

(312) 600-8357
159 N Sangamon Street Suite 262
Chicago, IL 60607

Get Remote Support

Services

  • Network Design and Implementation
  • Network Security
  • Email/Spam Protection
  • IT Support & Managed Services
  • Backup & Disaster Recovery
  • Cyber Security Services

FOLLOW US

Copyright © 2023 · ProdigyTeks · 159 N Sangamon Street Suite 262, Chicago, IL 60607