Sales: 678.967.3854
Support: 866.252.6363

An understanding of our Strategic Technology Plan and how it works will provide you with a tremendous amount of technology knowledge, in layman’s terms, that every C-Level executive needs.

Part 1 of this series (click here) dealt with servers and the computers that host them, and how and why we keep them running at maximum performance. In Part 2, (click here) we discussed “virtualization” and the “physical hosts” that contain “virtual machines”, as well as Data Structure and Storage. This final piece deals with hardware including mobile devices, applications, email messaging and physical security.

Desktops & Laptops

Group/Machine Policies

Screen Locking – Are your machines set to lock after a certain period of inactivity? This prevents people who are not authorized from using computers and possibly exploiting them.

USB Storage – You should be restricting USB storage devices from being connected to your workstations. Two reasons: Attaching USBs to a workstation is one way for viruses to get into the computer, then possibly into your entire environment. Second, this is a way for proprietary information to be copied and stolen.

Power Settings – Your workstations should go into sleep or hibernate mode after a certain period of inactivity. This conserves power and may extend the life of the unit. (Updating and patching can still be done when the workstation is in this state.)

Hardware Protection & Replacement

Specifications – By now, you should have replaced all hardware that has less than a 2GHz processor or 4GB of memory. This is what we consider baseline right now. However, when buying new equipment, even higher standards should be considered because as technology continues to evolve, current standards may not run updated applications.

Warranties – All your hardware should be under warranty. If any piece is not, extended warranties should be investigated. Machines not under warranty may be problematic if parts are needed and may be costly to replace if not readily available. We have tools that can check this factor, or you can check online at the manufacturer’s website by entering the service tag into the warranty section.

Surge Protection – Power surges are still a problem and hardware not plugged into surge protectors are at risk.

Acceptable Use Policies

Do you have one? – This should cover employees’ use of personal email, Internet usage (surfing), and remote access for laptops. Most cyber intrusions start with employees.

Endpoint Protection

Endpoint protection refers to a system for network security management that focuses on network endpoints, or individual devices such as workstations and mobile devices from which a network is accessed. The term also describes specific software packages that address endpoint security.

Endpoint protection may also be called endpoint security.

www.technopedia.com

Administrative Rights – Administrative rights should be carefully considered and only necessary levels should be granted to users. Most software needs administrative access for installation and by restricting these rights, you are also lessening the opportunity for people to install personal applications, which may affect workstation performance, licensing, or employee productivity.

Anti-Virus – In today’s world, active and centrally managed antivirus, with provisions for both scheduled and real-time updating is crucial. This is the backbone of endpoint protection. While there is no single answer to complete protection on all your devices, this is an important part of network security and is highly recommended.

Anti-Malware – As above, a centrally managed anti-malware is very important and today’s malware has increasingly become a productivity killer. And as above, while there is no single solution, this is another important part of your protection.

What is the difference between Virus and Malware? In simple terms, a virus is a piece of code that can replicate itself and travel from computer to computer, much like a flu virus can replicate itself and travel from human to human. Malware is more of an umbrella term that refers to a wide variety of malicious software, including viruses, as well as Trojans, adware, worms, and ransomware. In other words, all viruses are malware but not all malware are viruses. Exactly how each of these performs is beyond the scope of this piece, but the most commonly known of these recently is ransomware, with which a cyber-criminal will encrypt, or lock down, a company’s data files, demanding a ransom before releasing them.

Web Filtering – Another part of an overall security suite. This prevents a workstation from becoming infected by being redirected to a website that installs malicious software.

Patching – Patches are applied to fix bugs, remediate security risks, and make use of applications easier. It is important that this is centrally managed so that all applicable machines are updated.

Authentication – We believe in two-factor authentication. An example of two-factor authentication that we use every day is the use of both an ATM card (one factor) and a PIN (second factor) at the bank’s ATM. For computer use, an example might be the use of both a password and PIN. This provides an enhanced level of security.

Remote Management – Workstations can often best be managed by use of a remote management tool. For example, DynaSis’ client's devices need to be accessible by our management tool to take advantage of our endpoint security functionality.

Thin Clients

Definition: A Thin Client (or “lean client” or “zero client” or “terminal”) is a small computer that relies heavily on remoting into a server for processing. Unlike a “fat client” which is a typical desktop PC and if necessary can handle all required functionality, the thin client is limited to essential applications.

Spare Terminals: because of the low cost of these units, it is suggested that spare terminals be kept on premises in the event of failure.

Firmware: Many problems can be corrected through the use of the latest firmware. This is particularly true of devices such as these because of their basic nature.

Why An IT Assessment

Whitepaper: Strategic Technology Review

Whitepaper: Strategic Technology Review

Mobile Devices

This is a significant topic unto itself. If you want to learn more, you can watch our video, or read one of our recent blogposts.

Device Policy – Do you have a mobile device policy that clearly outlines screen locking, password protection, email, etc., as well as use of employees’ own devices?

Applications

Installation Documentation: Are step-by-step installation instructions readily available for all of the applications used in your business? This is important when building a new work-station, or reinstalling applications. This is particularly important if your company uses a large number of applications, or applications that have been developed for and/or by your business.

Licensing: Are licenses easily available when installing for new employees? Is someone familiar with the licensing process?

Support

Support Contracts: Are valid and active support contracts in place with all 3rd party vendors? This can be important if you require direct support from a vendor, particularly in emergency situations. Vendors are more likely to respond to regular clients than they are to companies that only call them in emergent situations.

Version/Release: All your applications should be up-to-date with the latest releases as this makes trouble shooting easier, as well as providing you with the latest improvements and security updates.

Approval Policies: Employees should be well-aware of which applications are allowed and which are prohibited. (You may prohibit all applications which have not been specifically approved, however, some there should be a policy on asking for approval of apps that may not be in wide usage throughout your company. Some employees may want/need other applications that make them more efficient in their work.)

Automated Policies: An automated policy can restrict the installation of applications that have not been approved.

Messaging

Email platform: The Microsoft Exchange platform provides a high level of business class collaboration as well as security features that may not be available in other platforms. If your company is not using Exchange, you should consider migrating.

Archiving: Emails should be archived. It is not uncommon for a company to have need to retrieve emails that are several years old, whether to enforce contracts, show time sequence, or satisfy government or civil subpoenas.

Encryption: This provides a significant level of cyber-protection.

Continuity: In the event of an outage, there should be a plan in place for email continuity.

Security – Physical

Environment

Dedicated Area: Best practices dictate that a dedicated room should be set up for your servers and networking equipment.

Temperature Control: Properly controlling the temperature of your server room can prolong the life of the equipment. High temperatures can be very destructive.

Physical Security: This should be a secure room with very limited access. There should be a door as opposed to an open entrance, and we prefer that there be no windows to the exterior.

Fire Suppression: A fire suppression system that can cause minimal damage to the equipment is highly recommended.

Electric: Your server room should have a dedicated electrical circuit so that electrical issues in the server room cannot be causes by problems elsewhere in your building.

Monitoring and Alerts: When server/equipment rooms are properly monitored and alerts properly functioning, reaction times are faster in the event they are needed. We recommend:

Labeling: This may seem rather basic, but proper labeling helps your onsite people work with third parties in identifying troublesome equipment, especially when working with third parties.

So, we have come to the end of Part 3 of our 3-part series. In it, we have covered a wide range of topics and we hope this was a valuable educational adventure for you.

That said, you should understand that this was a broad look at our STR – Strategic Technology Review. There are many topics that are covered in our real-life review such as Power Management, Rack Management, Backup, Disaster Recovery, Business Continuity, Networking, Telephony, Remote Users, Password Protection, and others, that we have not mentioned. Below are links to white papers we have written on some of these subjects:

Data Backup & Disaster Recovery

Email Security

Your Telephone System as a Business Building Asset

Mobile Device Security & Employee Training

Co-Managed / Co-Sourced IT

Multi-Factor Password Authentication

Here are links to Part 1 and Part 2 of this series.

Questions? Please feel free to contact us at 678.373.0716 or www.DynaSis.com.

An understanding of our Strategic Technology Plan and how it works will provide you with a tremendous amount of technology knowledge, in layman’s terms, that every C-Level executive needs.

Part 1 of this series (click here) dealt with servers and the computers that host them, and how and why we keep them running at maximum performance. In this article, we continue on and discuss “virtualization” and the “physical hosts” that contain “virtual machines”, then we will discuss Data Structure and Storage. Let’s start with some basic definitions (there will be other definitions throughout this piece, formatted like the two below.

Virtualization / Virtual Machines

Virtualization & Virtual Machines: Virtualization in I.T. terminology means effectively creating “virtual machines (aka virtual computers)” by splitting the resources of a single computer into multiple sets of resources that function independently of each other. For example, we can take the resources of that single “machine” and divide them into three separate units, each functioning independently of each other, and we have three “virtual machines”, aka “VMs”. Why would we do this instead of buying three separate computers? Primarily the cost. It is much less expensive to buy a single large computer than three separate smaller ones. This savings is magnified by the fact that for some operations, the three VMs can share resources, plus the configuration can be changed as resource requirements change, meaning that the requirements for the three VMs is less than for three individual computers.

Physical Host: The computer that has been virtualized into two or more VMs is called a “physical host”.

VM Sizing: The first thing we look for relative to virtualization during the STR is the sizing of the VMs. In other words, have sufficient resources been allocated to each VM? If not, this can lead to poor performance or even server failure. We do this by observing the utilization of the resources and the performance of the applications. This is a high priority.

Warranties: Are the servers used in virtualization under current warranty? Having active warranties is essential when we need to obtain parts or speak with the manufacturer for support. If out of warranty, we determine if extended warranties are available. If not, it is often a good time to consider retiring the older machine in favor of a newer version. (If it has reached this state, it is probably pretty old.)

Hypervisor: The term “hypervisor” comes from the word “supervisor”. The hypervisor is software that runs (or supervises) the virtual machines on the host computer. This hypervisor software also creates the ability to simultaneously run multiple types of operating systems. For instance, with a hypervisor, you can run Windows, Linus and MacOS on a single physical host. Each VM could use any of them.

Operating System: The main program in a computer that controls the way the computer works and makes it possible for other programs to function. (Merriam Webster)

Operating System: Is the operating system being used licensed and is it still being supported by the manufacturer?

Software Licensing & Support: Again, we want to know that the licensing is up to-date-and support is still available.

Specifications: Have the VMs been appropriately sized for the applications that are being hosted on them. To determine this, we observe their utilization and performance. We are then able to determine what, if anything, needs to be improved. This is important because if the VMs do not have proper resources available, it can seriously affect performance.

Monitoring & Management: We believe all servers need to be monitored and managed to ensure that patches and anti-virus software are always up-to-date. As you can imagine, in today’s cyber-crime environment, this is highly important.

Administrator Accounts: We want to see that all administrators have their own dedicated accounts and that each has a unique login. When accounts are shared, it is often impossible to determine who was responsible for errors or omissions, hence, corrective action and retraining becomes more difficult.

Web Security: We want to see that Internet security has been properly installed and is up-to-date. This includes items such as Internet Explorer Enhanced Security, OpenDNS, and browsing policies. Servers should never be used for accessing the Internet except for legitimate admin purposes such as downloading new software or updates.

DNS (Domain Name Server): An often-used analogy to explain the Domain Name System is that it serves as the “phone book” for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the IP addresses 93.184.216.119 (IPV4) and 2606:2800:220:6d:26bf:1447:1097:aa7 (IPV6). Unlike a phone book, DNS can be quickly updated, allowing a service's location on the network to change without affecting the end users, who continue to use the same host name. Users take advantage of this when they use meaningful Uniform Resource Locators (URLs), and email addresses without having to know how the computer actually locates the services. (Wikipedia) (Note: IPV4 and IPV6 are the protocols under which IP addresses are created.) Think of it this way: would you rather email your friend Joe by sending the message to his email address: Joe@hiscompany.com, or by sending the message to his email address: 2606:2800:220:6d:26bf:1447:1097:aa7? Try remembering a few of those!

OpenDNS: OpenDNS is a company and service which extends the Domain Naming System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.

The company hosts a cloud computing security product suite, Umbrella, designed to protect enterprise customers from malware, botnets, phishing, and targeted online attacks. The OpenDNS Global Network processes an estimated 100 billion DNS queries daily from 85 million users through 25 data centers worldwide. The company was acquired by Cisco in 2015 for $635 million in cash. (Wikipedia)

There are a number of other items for which we check that are the same or similar to those covered in Part 1 of this series: Redundant Power Supply, UPS, Hardware Naming & Labeling, so see Part 1 for this information.

Why An IT Assessment

Whitepaper: Strategic Technology Review

Whitepaper: Strategic Technology Review

Data Structure & Storage

Structure – Location: We check to make sure all data storage is properly configured, meaning they are centrally located and each location has been properly named. This is important for proper backup and becomes important in the event of recovery. Instead of digging around and trying to figure out where sets of data are, or where they belong, everything is in its proper place and easy to locate and/or restore.

Structure – Shares: We are always concerned with permission management. In other words, we want to make sure that the right people have access to the data they need…but only the data they need. We check to see that data is segregated into company-wide, department-wide, and individual-only compartmentalization. This way, everyone in the company from the CEO to the newest entry-level employee has access to all the information they need to do their jobs, but only that data.

Structure – Permissions: Once we have determined that data is properly segregated, we check to make sure that permissions are properly structured and disseminated so that effective data protection and allowed sharing is achieved. Every company must decide who has access to what data. This varies greatly in importance depending on the industry. For example, organizations that work with personal financial information, or health records, are under strong legal obligations. While the legal obligations may not be there for other companies, they may still have sensitive customer information, or internal trade secrets, or their own financial data that should not be available to all who work there.

Storage – Data Location: All too many companies, often unknowingly, have end-users (employees) whose data is stored locally rather than on a server. This means that the data is stored on the desktop, and, thereby, subject to loss in the event of a hard-drive crash or virus. If the desktop computer goes bad, files, often many years of work, can be lost forever, since these files have not been backed up on a server. We have seen situations where people assumed their data was being backed up, only to discover too late that it was not. As an alternative, individual work stations can be backed up, but this is a “second best” solution.

Storage – Configuration: We check to see if the RAID configuration is appropriate. RAID is in place for redundancy of file storage and different situations require different redundancy levels. We want to make sure that the level we find works for that business and, if not, make adjustments.

RAID (redundant array of independent disks; originally called redundant array of inexpensive disks) is a way of storing the same data in different places on multiple hard disks to protect that data in the case of a drive failure.

In our next article, we are going to continue discussing servers and our Strategic Technology Plan.

Part 3 of this series will cover hardware such as desktops and laptops, “thin clients”, and mobile devices. In addition to this series of articles, you can find a wealth of I.T. knowledge and information at www.DynaSis.com/the-latest, where we have posted White Papers, Articles, Case Studies and Blog Posts on a wide variety of technology related subjects designed for the C-Level executives of small to mid-sized companies. For more technology information that we find and share, follow us on Twitter (@DynaSisIT) and LinkedIn (DynaSis Technologies).

An understanding of our Strategic Technology Plan and how it works will provide you with a tremendous amount of technology knowledge, in layman’s terms, that every C-Level executive needs.

About 18 months ago, our DynaSis team put together an extensive system review/planning program for our clients that we call our Strategic Technology Plan, or STP for short. We have always performed, and still do, complementary IT assessments for potential clients, but while these are extremely effective in determining weaknesses in a company’s IT network, the STP goes much deeper in highlighting very specific items that need to be addressed, and ranks them in order of priority: high, medium and low.

Over the next couple of months, we will be releasing a series of articles designed for the layman that are intended to provide a great deal of necessary education about today’s information technology, and we will do it in language the average C-Level business executive can understand.

Those of us involved in providing technology solutions to the business world are very often guilty of seeming to intentionally make everything related to technology very confusing. Some people in the technology world believe that this level of confusion helps their own business interests, assuming that if the prospect can’t understand it, he will feel more pressure to hire someone who does.

We don’t believe this. We do agree that technology today is extremely complex, but we feel that if we explain it in terms everyone can understand, the typical business-person will be more inclined – not less – to take appropriate actions to protect their businesses. We don’t expect the typical layman to intuitively know what a DRAC/iLO card is for, or why they should be using “virtual machines” or what a “RAID configuration” is all about. Similarly, if you had never seen a baseball game, would you understand the terms “slider”, or “squeeze play”, or “balk”, or “fielder’s choice?” So why would you understand technology terms when hearing them for the first time?

Each article will also include examples of actual STR reports showing how findings are displayed.

The topics we will be covering include:

Our goal is to make our clients and other readers aware of how and why we believe frequent checking and possible upgrading are necessary, and what the potential downsides can be for failing to do so. We are also going to break everything down into language that is understandable to most. One caveat: there can be many, many variations within each category and sub-category we are going to discuss, so to keep the information manageable, there will be times that we give you only the basics.

Why An IT Assessment

Whitepaper: Strategic Technology Review

Whitepaper: Strategic Technology Review

Let’s start with the STP as it relates to servers.

First, let’s understand what a server is. Many people think of a server as a large computer, but don’t really understand what it accomplishes. A “server” in fact, is not a computer, but rather a program that resides in a computer, and, yes, the computer hosting the server program is generally larger and more reliable than the typical desktop or laptop computer. A single computer of the right size can host multiple server programs. The server “serves” multiple “clients”, a client being the actual desktop or laptop computer. The server serves its clients by providing functionality, such as sharing data and performing calculations. The advantage is that all the files that would be used by the client are more safely stored in the server computer, plus the sharing of data, including the results of calculations, means that many people can benefit from colleagues’ work.

Here are the things we check on relative to servers during the STP:

Are the servers properly spec’d for the applications they host? We observe the utilization of the servers’ resources as it affects the applications and estimate anything that may need to be resized. Key factors are the processor, RAM and disc utilization. We do this because if the servers do not have sufficient resources for the applications, or for the number of users, it can adversely affect performance.

Is the warranty current and is the SLA acceptable? The SLA – Service Level Agreement – states the obligations of the manufacturer for replacement or repair in terms of guaranteed time for repair or placements, and for parts that may be necessary. We consider next business day the minimum acceptable for critical parts. We consider this to be of high priority.

Do all servers have redundant power supplies and are they plugged in? (We do find unplugged devices. Don’t confuse this with the UPS, or uninterruptable power supply – next topic.) The redundant power supply is internal, in other words, two power packs within the unit in case one fails.

UPS – Uninterruptable Power Supply. This is the box into which the computer is plugged and that then gets plugged into the wall. This is the device that provides temporary power when electrical power to the building goes out. Also to be noted is that the batteries in these units have a defined life span and need to be replaced periodically. This is a high priority item.

DRAC/iLO card installation and configuration. This may be a term with which you are unfamiliar, but this card provides your IT service the ability to log in and reboot a frozen server, which can result in faster problem resolution, the avoiding of dispatching a technician, and significantly reduced downtime.

Are the partitions set up in proper sizes for the operating system? This is important for maximum operating efficiency.

 

Is the version of the operating system that is installed on the server current? It is not necessary that the OS be the most current, but it is important that the version is still supported by the manufacturer in case support is required. We consider this high priority.

Are operating system licenses current? Microsoft does perform audits and can charge penalties for non-compliance, as do a number of other companies. Additionally, as a business executive yourself, you are aware that companies that develop the software upon which you depend have invested a great deal on time, effort and capital in the development of this software and are entitled to continuing revenue from its use.

Does each administrator have his/her personal login? We sometimes find that administrators share a default admin account. When this happens, it often becomes impossible to determine who is responsible for certain changes or for permissions that have been granted. As a security matter, we consider this to be high priority.

Is the company using security screen locks? The screens on all computers should lock if the device has not been used for a certain period of time so as to prevent unauthorized use. Computers left unprotected can be used after hours, before work, or during breaks when no one is around.

Is proper up-to-date web security in place? This includes Internet Explorer Enhanced Security, OpenDNS, as well as a company policy to not permit browsing from servers. Servers should never be used to access the Internet except for specific purposes such as software updates.

Are the company’s servers managed and monitored for patching? Servers that are managed have been shown to have better uptime and be less likely to be infected with malware.

Have the servers been patched with the latest patches? Patches fix vulnerabilities that enable cyber criminals access to your computers. The patches also solve problems with the software’s functionality, or add new functionalities. We are sometimes asked why software is released before it is “perfect”. Simply put, modern software is incredibly complex. It is estimated that Microsoft Office is made up of 40+ million lines of code. Although most software is tested and retested before release, it is impossible to test every possible situation that may arise when 100s of millions of people end up using it, along with thousands of very smart cyber criminals. This is a high priority item.

Is patching managed centrally? This allows for much more consistent and rapid updating, and, thereby, not letting the systems fall behind.

Are all anti-virus software and definitions up-to-date? It is critical that the latest versions of anti-virus software be installed as the newest versions contain the latest and best defenses against all types of malware, including ransomware that has become so widespread.

In our next article, we are going to continue discussing servers and our Strategic Technology Plan.

In it, we will cover virtualization, plus we will take a look at Data Structure and Storage, again, in layman’s terms.  We will also discuss how we examine individual desktop and laptop computers to make sure they are secure, providing top performance, and lasting as long as possible.

The intention of this series to educate you so you can fully participate in important technology decisions for your company. If there are specific topics you would like covered, or if you have any questions on topics covered in this piece, please contact us at Info@DynaSis.com.

At DynaSis, we have been working with small to mid-sized businesses in the Metro Atlanta area for the past 25 years, so we speak with a lot of businesses about their technology needs. When we are asked to recommend new hardware, we always recommend business-grade computer equipment. Why? The equipment you would buy to use at home is simply not the same equipment you should buy for your business.

Is it tempting to buy the less expensive home-grade equipment? Sure. It seems to do exactly the same things and appears to be just as good. It’s not. The equipment you can buy off the shelf at your local retailer or big box store, or online at Amazon, etc., is designed for home use, not your office, but let’s look at the differences.

Operating Systems: A business-grade computer will come with a business grade operating system that will be better for business use because it will provide better security, better account control, and encryption tools that will do a better job of safeguarding your company’s data. A consumer-grade unit will also come loaded with “bloatware” that may take hours to remove. That cost of that removal can easily offset the cost of the higher-grade piece of equipment. But why not let the bloatware just sit there? (Some of it cannot be removed, anyway, due to manufacturers’ agreements with bloatware providers.) Much of this bloatware provides employees a great opportunity to waste time…and time is money.

More Robust: A business-grade computer, as well as firewalls and routers, are generally more robustly built, making them more durable, allowing them to be used for a longer period of time. Failure rates of business-grade computers is generally much lower than that of consumer units.

Support: Better quality machines generally come with better support, both from the manufacturer and from your IT support company. Spare parts are generally more available so, for all these reasons, and some of the above, downtime is usually considerably less.

Longer, Better Warranties: While home computers often come with 90-day to one-year warranties, business grade equipment generally come with three year warranties. You can add several years to your home-type computer, but that will offset most or all the cost differential.

Faster Repairs: If you buy a home-grade computer, you may find that you actually have to mail it in for repairs. Imagine the time that takes, not to mention the gigantic pain in the you-know-what. Some big box stores have on-site repairs, but that usually requires buying the longer warranties mentioned above.

Security: Many home-grade pieces of equipment, particularly firewalls and routers, have factory installed default passwords, which many people fail to change. These default passwords can often be found simply by Googling “default password” for the type of equipment and the manufacturer.

So, you may save yourself $100 to $300 by avoiding the business-class computer (which, admittedly, can add up when you are buying 10 or 20 or more), but our 25 years of experience as an Atlanta IT support provider has taught us that the extra cost of the better piece of equipment is money well spent.

DynaSis is in its third decade of helping small to mid-sized businesses with a wide range of IT support, from 24 x 7 x 365 help desk, to monitoring, managing and maintaining entire IT networks. We are also offer the DynaSis Business Cloud IT Solution, along with Microsoft Azure Cloud. For more information, please call us at 678-373-0716 or look us up at www.DynaSis.com.

“If it ain’t broke, don’t fix it!” Sound familiar? As an Atlanta IT support team, these days what we more commonly hear is, “If it’s working fine, why bother with patches (also known as updates)?” Computer hardware doesn’t seem to have a lot in common with the internal combustion engine and other working parts in your car. Changing your oil makes sense; replacing worn out tires makes sense; even vacuuming your car floor makes sense. But updating a software program or operating system that’s working just fine?

Yes, computers are very different from other chunks of machinery in our homes and offices, but think of this: the patches that your software vendors want you to install can be critical to the longevity of your software, the security of your data, and the productivity of your employees. Why, you may ask, are your operating systems not perfect when they leave the factory so that it is not necessary to constantly install these updates? 

Consider this: The Windows 10 operating system consists of 50 million lines of code. How much is that? Well, if these lines of code were converted to a book, that book would have about two million pages. That would keep you occupied for quite some time. What happens is this: before a new version of an operating system is released, is it tested and retested extensively, but, simply put, until it is out there in the real world, it is just impossible to put it through every conceivable situation. 50 million lines of code and a single error in any one of them could lead to crashes and/or security vulnerabilities. Add to that (and this is a biggie) the fact that from the day the new operating system is released, cyber criminals are hard at work trying to figure out how to break in, so every time a new vulnerability is discovered, a new patch must be created and applied either by your in-house IT team or your IT support provider.

Network security is a big deal.

So is stability. Operating systems do not live in a world of their own. They share resources with many other programs and each has its own requirements and demands. Generally speaking, the needs of the operating system and each program are met with little difficulty…but not always. Sometimes programs conflict with each other. For the operating system to function properly, it must be able to deal with thousands upon thousands of different software programs (of course, not at the same time!) Sometimes the operating system and an application just don’t fit together just right and either the program won’t open, or data can’t be saved, or is lost, etc., etc., etc. This usually triggers an error message appearing on your screen.

Have you ever been asked if an incident that occurred on your computer can be reported to Microsoft? This is how Microsoft discovers these problems. When they learn of the problem, they create a patch to fix it.

Patches installed by your IT support team are also needed for the software that is running on the operating system. It’s hard to know exactly how many lines of code are in a program like Microsoft Word for two reasons: first, Microsoft doesn’t release this information. Second, there is a lot of code that is shared between applications. That said, it was estimated that the 2006 version of Word had 30,000,000 lines of code. Add in Excel, PowerPoint, and the other MS apps, and you can see how daunting keeping everything at 100% can be.

One more word – patches (updates) are different from upgrades, such as switching from Windows 8 to Windows 10, or from Office 2013 to Office 2016. Upgrades will include previous patches but will generally also give you more functionality.

At DynaSis, we have been providing IT support for small to mid-sized companies since 1992. Today, we monitor, manage and maintain computer networks 24 x 7 x 365 including the installation of critical patches. We also provide live help desk support around the clock and work closely with our clients’ in-house IT teams with co-managed support. Check us out at www.DynaSis.com or call us today at 678-373-0716.

Watch the video to learn more about our managed and co-managed IT Services.

You are Going to Be Hacked – It’s Not “If”, It’s “When”

Cloud computing in Atlanta and the rest of the world has spread extensively and now more than 90% of small to mid-sized businesses either are already using the cloud for some aspects of their business, or expect to be in the near future. Frankly, most of these businesses are realizing that it is difficult to remain competitive today without the cloud. The downside, however, is that while the good guys (“white hats”) continue to make positive advances for their client businesses, the bad guys (“black hats”) are rapidly progressing, as well.

But before you go off and determine that your company is more secure in the technological middle ages (2000 to 2010?) and give up entirely on cloud computing, consider two things. First, there were hacked security breaches of all types even before the cloud and statistically speaking, the ratio of before and since seems to be about even. So, the question doesn’t appear to be “to cloud or not to cloud”, but rather, how do we use the cloud as securely as possible? Second, you are probably using the cloud right now, way more than you realize.

Do you synch your photos from iPhone to your computer? Do you use Facebook or Uber? If you do any of these things, or thousands of others whether personally or for business, you are using the cloud. In fact, as early as the 1990s ADP’s payroll service was using the cloud on a large scale, and today, if your paycheck comes via ADP, PayChex, Intuit, or any of hundreds of smaller payroll/HR companies, you are using the cloud.

Cloud Computing Security

Cloud computing in Atlanta, or anywhere else, when done properly, utilizes a lot more than just “systems” to overcome being hacked. It uses real people, on duty and monitoring, managing and maintaining your system 24 x 7 x 365. Cyber criminals don’t take off overnight. In fact, many of them who want access to your data are halfway around the world, so your midnight is their noon. This real-time live monitoring, combined with an advanced crypto-containment system and other advanced algorithms and processes, can instantly pick-up on early warning signs of a potentially successful attack and shut it down while it is still an “issue” and not a serious problem. The software can detect when something out of the ordinary is happening…something that deviates from normal operating functions and patterns, it shuts down the infected files and alerts your IT security incident response team.

A Better Raincoat

Someone recently compared using older methodologies of data protection versus using the cloud to trying to protect yourself from the rain by wearing animal skins versus today’s raincoats made of 100% water repellent fabric. Both will keep you dry…for a while…but one will give you way better protection than the other.

Either way, you will be hacked. Count on it. The question is, how will your IT support team and your IT security network respond? We have seen networks “repel” literally tens of thousands of attack attempts, until one brand new piece of malware, that no one has seen before, breaks through. Is your system being monitored, managed and maintained in a way that will detect this intrusion and lock it out before any damage is done, or will it be allowed to run rampant through the night so that when your staff shows up one morning they find their files locked or, even worse, totally lost forever. It happens to someone every day.

For the past 25 years, we at DynaSis have been at the national forefront of Cyber Security…long before most people even heard of it. Our team of more than 55 IT professionals based in Atlanta have always focused on the IT support needs of small to mid-sized businesses. We still do. We also offer complimentary IT and Cyber Risk assessments. Give us a call today at 678-373-0716.

 

As workplace mobility becomes both more widespread and more accepted, the importance of employee awareness of mobile security increases. To be effective, mobility, the ability of your employees to carry on their workplace duties outside the office, must be properly managed to be secure. Unfortunately, this is not always the case. There are more and more cases of valuable and sensitive data being compromised, either from lost or stolen devices, from improper downloading of apps available online, or simply failing to practice effective password procedures.

The reality is that mobile security is not high on the radar of many workers. It may also surprise you to know that the most technologically sophisticated generation, the millennials, are also those most likely to engage in risky behavior. In a study conducted not long ago, it was discovered that a full 60% of millennial workers regularly share both their work and their devices with others, and 20% don’t even use password protection on their devices, whether company supplied or their own that they use for work. In fact, a good percentage of them intentionally don’t use protection to make it easier to share their devices.

It is not that the millennial generation is not concerned about security. They are. But almost 90% assumed that the IT departments of the companies they work for are keeping their devices, company data, and themselves safe and secure. They are expecting that if a behavior is unsafe, they will be restricted from engaging in it and, therefore, anything they are able to do is safe. As a managed IT service provider, we can tell you that one of the first orders of business when we are engaged by a new client is employee training. The fact is that the weakest link in network security is the untrained employee who unwittingly violates security protocols and opens the entire company network to cyber attack.

But is employee training enough? As important as training is, we also know that managing the devices used by a company’s employees is just as important, and as the use of personally owned laptops, smartphones and tablets increases, the task becomes ever more daunting. It’s hard enough to manage company owned devices, but adding employee owned devices used for company business magnifies the situation.

So the question is: how can a small to mid-sized business (SMB) best handle these mobile security concerns? This is a project that the IT department of a typical SMB (if there is an actual IT department) can find overwhelming. From a dollars and cents perspective, adding to the cost of the IT personnel are the cost of servers, licenses and maintenance.

We believe that a much better solution is the use of a cloud-based mobile device management system (MDM), with the provider, such as a managed IT service company, handling all the background IT management functions. The SMB realizes the same benefits as an enterprise system, such as updating all devices in a single push, instead of an IT team member having to update each device individually. Built-in security that assures appropriate password creation will also be part of the package, and you will have the ability, if you choose, to add encryption, plus you can track all the devices connected to your system, greatly eliminating the risk of unauthorized devices undetected devices operating on your network.

Simply put, we believe mobile device management is one of the most important elements of a secure IT network.

DynaSis is an Atlanta IT services and cloud computing provider for small and mid-sized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

Recent studies show that as many as 93% of companies today are using at least some sort of cloud-based technology, although certainly some way more than others. Because of this, you may be thinking that these companies are also moving away from on-site servers and hardware, but this is not happening anywhere as quickly as you might expect. Many companies still keep their servers on-site, often running them as virtual machines. (Virtual servers: partitioning the servers into highly segregated segments and using each segments as if it were a separate server.) While keeping your servers on-self may not in itself be problematic, although there are certainly advantages to off-site storage, the problem we often see is that this equipment is aging, what we call “legacy hardware” – a nice way of saying it’s getting older and older.

There are a number of reasons why people hold on to legacy hardware from budget, to compatibility with older versions of software, to “it’s working fine.” While it has never been a good idea to hold on to aging equipment from productivity and uptime perspectives, today, such a decision could actually be catastrophic.

Even with all the discussion going on in tech circles about the necessity of multiple back-ups and off-site storage, estimates show that as many as 77% of companies are not actually prepared to completely restore their data in the event of a crash…and this includes companies using IT service providers. Smaller companies, which make up the majority of US firms, are more at risk than larger companies simply because they don’t have adequate personnel resources to manage, monitor and maintain.

Some of the lowest hanging fruit for cyber-criminals are legacy servers running legacy applications. In one survey taken just a few years ago, 96% of all the applications that were tested had at least one major security vulnerability, with a median of 14 vulnerabilities per application. While a company may save some money today by putting off upgrading to newer,  safer hardware and software, this could end up being a very expensive decision. Ransom ware is a major threat these days, and the vulnerabilities presented by legacy hardware and software often open the door to these attacks.

Legacy hardware also runs slower than newer ones. This decreases productivity by increasing response time. This affects competitiveness as well as employee frustration. Your older system doesn’t have the computing power of newer ones, which limits your ability to take advantage of powerful applications such as data analytics or collaboration tools.

A scary scenario: many companies believe they have been upgraded to newer versions of hardware and/or software, and only when there is a serious problem do they find out that many important functions are still being handled by an old server in the back of the office. If your company hasn’t had a recent IT assessment and risk analysis, you should speak to a managed IT support company that provides this type of comprehensive review free of charge. If serious vulnerabilities are discovered, this same managed IT services provider can outline short and long-term plans that can protect your company and your budget.

Selection of an outsourced IT company is a very important business decision. For more than a quarter century, Atlanta’s small to midsized businesses have relied on DynaSis’ for managed IT services, Internet security, IT assessments and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.373.0716.

 

If you have heard of ransomware but are not exactly sure what it is, here is a quick explanation: essentially, ransomware attacks start when cyber criminals hide links in what seem to be normal everyday emails or website pages. When these links are clicked on, a malicious virus is unleashed that encrypts your files so you cannot access them. The only way to decrypt these files is with a “key” that is sent to you by the cyber-criminal once you have paid the ransom.

If your personal files are encrypted, you may be asked to pay $300-$500. (There are no rules; it’s the criminal’s choice.) A small business may be asked for several thousand dollars up to tens of thousands. Large businesses and government have sometimes been asked for millions. Ransoms are usually paid in bitcoins, which are completely untraceable. When the ransom has been paid, the key is sent, and the owner of the encrypted files can unlock them. Most of the time.

There have also been cases where the key has not worked. Why? We don’t really know, but we do know that the criminal vanishes, leaving the business owner’s records forever locked and totally useless. Hopefully, there were back-ups that can replace the locked files, but often, the backups get encrypted as well. In fact, in 2016, only 42% of companies that were attacked were able to fully restore their files and avoid paying ransom.

When we say that ransomware has hit the big time, consider this: in the latest report published by the SonicWall security team, ransomware attacks have grown:

2014:                3,200,000 attacks

2015:                3,800,000 attacks

2016:           638,000,000 attacks

No, that’s not a typo. Yes, attacks increased 167 times or approximately 20,000% in one year!

The obvious question is “Why?” The answer is that committing ransomware crime has become very easy. While it used to take advanced programming skills and sophisticated hacking to commit cyber-crime, today the kid down the street can easily, quickly and cheaply search for ransomware software online and for a few hundred dollars buy the software tools he needs to attack businesses all over the world. No experience required.

Another reason: Studies have also shown that 91% of these attacks start with employees who are tricked into opening email that they should have left alone. Advanced ransomware programs now are also able to rapidly spread the infection from computer to computer within an organization, quickly spreading to servers.

What can you do? We have found that in most cases, cyber-attacks get through because the proper precautions have not been taken. We have seen computers upon which tens of thousands of attacks have been attempted, with not a single one getting through. Here are some suggestions:

1: Ongoing employee instruction in cyber security, particularly concerning email.

2: Advanced business-grade security against all forms of malware

3: Crypto-containment software (isolates and shuts down encrypted files, preventing spread of virus.)

4: 24 x 7 x 365 network monitoring

5: Off-site (cloud) back-up

Call if you have any questions.

DynaSis has been serving the small to mid-sized business community for 25 years and is a national leader in development and deployment of crypto prevention and crypto-containment solutions. 678-373-0716. www.DynaSis.com/managed-security.

If you think of 2016 being the “mainstream” year for hackers, then 2017 will be their year of creativity and innovation. We are sometimes asked why, with all the brilliant minds working on cyber security, how can the hackers keep developing new methodologies and always seem to be one step ahead. The answer: the people developing these new tactics are pretty darned smart, too, and they have the advantage of being able to go off in different direction directions, while we have the task of constantly being on the alert so we can figure out where they are going.

Stephen Gates, a leading research intelligence analyst, tells us that the rates of ransomware and the following extortions will increase. In fact, the next generation of self-propagating worms paint a rather gloomy scenario. Unlike their earlier versions, these worms can infect hundreds of devices very quickly. You may be familiar with the attack on the San Francisco Municipal Transit Agency that encrypted 2,000+ computers, most likely through this type of self-propagating worm. Gates expects this type of attack to become more commonplace.

Norman Guadango, a cyber security specialist at one of the country’s leading consumer-grade data storage solutions, says that almost 20% of small businesses have suffered a data loss in the past year and that the costs associated with these attacks often run between $82,000 and $256,000 each. This can include ransom payments, lost productivity, time spent recreating data, forensic cyber teams, and lost business.

Adding to the complexity is the fact that new versions of the viruses, ransomware and other forms of malware are constantly being mutated by their developers. They are also becoming more sophisticated in their methods of deployment. For example, one of the scenarios common today is, after gaining entry into your system, placing a snippet of code somewhere in one of your files and just let it sleep there for a while, eventually "phoning home" and letting its owner know it is there are ready for action. This vulnerability is then sold online to both amateur and professional hackers who are then free to cause all sorts of harm. Of course, only a small fraction of these attacks actually break through the security systems generally in place, but it only takes one.

A recent ransomware attack on one of our clients showed that they withstood 65,000 attacks over a two-day period, including cyber-attacks from Russia, China, Bulgaria, India, Israel and five other countries. But, again, all it takes is one. This company will be the subject of a case study that will be released over the next week or two, so keep an eye out for it.

At DynaSis, we work with a national team of cyber security professionals and together we have created some of the most advanced, effective, unique and proprietary cyber security software available today. Whether you are a DynaSis client or not, please consult with your managed IT service provider to make sure your defenses are secure and up-to-date. Learn More

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram