Friday, February 10, 2017

Six Steps to Take After Your Email is Hacked


We use email and other online services so much that it's all but inevitable that our accounts will be hacked. Having your private accounts invaded can be confusing and inconvenient, but it's possible to control the damage and prevent future hacking attempts. Below, you will find out how to regain control of your account while minimizing future risk.

Go Into Your Account

Before you can do anything else, you'll need to see how much damage is done. Log into your email account; if the hacker changed the password, click the "Forgot Password?" link or its equivalent. Once you have access to your account, change your password right away. Use a combination of numbers, cases and characters. Instructions on password security are coming up later in this guide, but for right now, preventing hackers from re-accessing your account is the most important thing you can do.

Assess Other Accounts

Once you have changed your email password, you should make the change on other accounts that share that password - especially if you use your email address as a username on those accounts. Check your inbox and "trash" folder for password resetting emails that you didn't request; the hacker could have tried to change other sites' passwords using your email address.

Check For Sent Spam

Some hackers access email accounts to launch attacks on those on your contacts list, using your email address to send phishing or spam emails that trick friends into providing personal information. It can be hard to tell if your account was used in this way, but checking your inbox for replies can help you determine if any of your contacts were targeted. If you do find spam, let the person know that you didn't send the email.

Check Your Apps

Once your email account is secure, and you've dealt with the consequences of the hacking attempt, you should ensure that you can still access your account via the usual channels. If you use Windows Mail, Outlook or another similar program, you'll have to change the passwords on those apps. Every program is different, but for most, you'll have to get into the "Settings" menu to make the change.

Protect Yourself From Further Intrusions

The risk of email hacking is increasing, but there are preventive steps you can take. Choosing a strong password is one of the easiest ways to safeguard your account; generally speaking, the longer the password, the more secure it is. Use a mix of cases, characters and numbers to increase the strength and complexity of your password, and don't use real words. Above all, NEVER use the same password across multiple sites. Long, complicated passwords can be hard to remember, and services such as 1Password and LastPass can help you store your passwords securely. 

Add Extra Layers Of Security

Along with strong passwords, two-factor authentications are often used to secure email and other accounts. In addition to your password and username, you can use a code created by an app or a card reader at the time of each login. The code changes rapidly, and hackers cannot access it - which makes your account much more secure. Most email providers offer two-factor authentication free of charge, and it's worthwhile to use this security measure if it's available.


Your email account is an important part of your online identity, and you should protect it just as you would any of your other personal information. Cut your exposure risk by being discreet, smart and sophisticated in your approach to email security, and keep an eye out for things that may seem a bit odd. By knowing your damage control choices, it will be easier to control that damage when or if it occurs.

Bit by Bit can help with all of you technology needs. You can contact us at 877.860.5831

Tuesday, January 17, 2017

Working with a new security company!

https://www.esentire.com/

This will be a great addition for our clients.


Monday, January 9, 2017

Types of Cloud Computing Services

Cloud computing involves providing access to a shared pool of computing services. That access is via a proprietary network or the Internet. Providers deliver these services on a pay-for-use basis. The term "cloud" refers to data centers all over the world. These data centers provide the hardware that cloud services need.
 
The Three Main Cloud Computing Types

  • Infrastructure as a Service (IaaS)

In this model, the provider hosts the hardware and software. They also host other components of the infrastructure. The provider maintains the system and handles backups. The IaaS model is scalable and ideal for temporary workloads. Customers pay per use, which allows them to avoid the cost of buying their own hardware and software.

  • Platform as a Service (PaaS)

With the PaaS model, the provider offers the hardware and software that customers need to use an application. This means that the customer does not need to buy the necessary resources or invest in their upkeep. They will not replace their entire infrastructure when using the PaaS model; instead, they will use it for key services. Most PaaS platforms have a focus on software development. These platforms provide customers with certain advantages. The advantages include frequent  upgrades to features of operating systems. The PaaS model also helps development teams to collaborate more effectively.

  • Software as a Service (SaaS)

In most cases, SaaS refers to end-user applications. With this model, the customer no longer has to install or run applications on their own computers or other devices. This means that they do not have to cover the cost of licensing software or of maintaining it. Instead, they pay for a subscription, which replaces the cost of licenses.
 
 

Each type of cloud computing can deliver clear advantages depending on what the customer needs. The most obvious advantages include scalability, agility, and increased efficiency when developing prototypes.

Robert Blake
817.505.1257

Tuesday, December 13, 2016

What Encryption Can Do for Your Business

Your business doesn't have to handle top secret government files to need encryption.  You have a responsibility to your customers, vendors, stakeholders, and employees to keep their data safe, and you need to protect your business information from competitors.  To maintain your reputation, the people you do business with must have confidence in your ability to keep data secure and use it wisely. 

Consider all the ways encryption can protect you from loss of business and reputation:

Neutralize Hackers
Encryption can prevent the use of your information by hackers.  Even if they get into to your network, they won't be able to use the information they find if it is encrypted.

Note that encryption cannot prevent access like a firewall can, but by rendering your data useless to prying eyes, it can eliminate the use of stolen data by hackers.

 
Protect External Drives
If your company backs up data on external hard drives, that means information that you store is neatly packaged for an enterprising thief.  You could be subject to theft of those drives.  This includes USB devices. 

Encryption makes it impossible to read your data, so a compromised external drive will not harm your company.

Secure Internal Hard Drives

The drives in your computers are some of the most vulnerable access points in your entire information network.  Hackers can come in through email accounts or your internet connection and get directly into your hard drives. This makes any information a user has stored vulnerable to theft. 

Encryption can secure information while it is being stored.  This process is automatic, so that the user doesn't have to remember do it.  Such encryption provides timely protection as data is created.

Make Cloud Storage Safer
Storing data in the cloud presents some problems.  One of the most dangerous situations is sharing cloud storage space with other firms.  Any hacker who gets into other companies' data on a shared cloud server has access to your information.

Encryption is your best line of defense to these "back door" cloud hackers.  Your information remains unreadable, and hackers may move on to less vigilant prey.

Some cloud storage services have decryption keys, and if those are stolen, your information may be read by intruders.  This mean you shouldn't rely entirely on the cloud service's encryption.  You can add an extra layer of encryption on your own to help protect your stored data from stolen decryption keys.

Hide Internet Traffic

Using public internet access for laptops makes your data vulnerable.  The same applies to remote employees who use their home Wi-Fi connections. 

A virtual private network (VPN) encrypts all communications to and from a laptop.  The network is protected.  Requiring a VPN connection for all employees helps lock out criminals who use the internet to attack companies.

Guard Email

Email can be the biggest leak in your security system.  Employees may send sensitive information through emails, and if this information is intercepted, your company and your customers could be at risk.

Secure email applications can protect email communications not only while they are being sent, but also while they sit in inboxes. You receive an added benefit, because encryption means unauthorized recipients, such as friends and acquaintances of employees, will not be able to read company email.

Lock Lost Devices
Half of data breaches come from lost or stolen USB drives, laptops, phones, and tablets. Not only should you make sure that each of these devices is password-protected, but you also should have employees use encryption applications for sending, receiving, and storing data.

Neutralizing Employee Mistakes
Employees may grant access to a file by attaching it or giving a link to a non-employee.  Encryption will nullify the effect of this error.

Safeguarding File Transfers
When you send files through a file transfer service, data thieves can intercept them in transit.  Even a secured network can be vulnerable. Encrypting files before you send them ensures that if they are stolen, they will be unreadable.

Encryption technology is readily available and relatively inexpensive, especially when you compare the price of encryption to the cost of lost data and lost business due to thieves or error.   All businesses today have some kind of internet vulnerability, and enterprising data thieves are always seeking new access points to steal your data.  Make sure that if they get into your network or devices, the data they retrieve will be rendered useless by encryption.
 
if you would like to know more about how Bit by Bit can help please call us at 877.860.5831 x190 or email.

 

Monday, November 14, 2016

5 Signs You Need IT Consulting

With all the changes the world of technology is going through, it can be very difficult to stay on top of your business IT needs while effectively managing a team of employees. If you struggle with managing equipment and managing staff and you experience the following signs, it may be time to consider IT consulting.  

 

1. There's never enough time to manage staff - Are you always telling staff you'll get back to them later, or staying extra hours just to get things done? Does it feel like there are cohesion problems on your team because everyone is always waiting around for your input? All of these problems can be solved by outsourcing the IT to consultants. 

 

2. You have a knowledge gap - In the current cyber security landscape, threats and best practices seem to change every day. Many business IT professionals feel the need to constantly improve their skills to be competitive or simply fulfill the roles for which they were hired. By bringing in a consultant, you can access high-level knowledge you do not have. 

 

3. Your legacy equipment costs too much to maintain - If you're stuck with old equipment that's expensive to repair or replace, a consultant can help you save money. Look to an IT consultant to reduce your expenses through bundling, switching service providers, changing workflows, or leveraging economies of scale. In the long run, the expense of investing in consulting is more than worth it for what you'll save. 


4. Your productivity has dropped - When you are multitasking between managing people and troubleshooting equipment, your productivity naturally decreases. If you feel like you never get done the things you need to do, consulting can help you free up time to devote to pet projects. If you feel like there aren't enough hours in the day, free up time by using IT consulting services. 

 

5. You're not competing with your peers - If your company isn't competitive with peers, you will lose clients to them. An IT consultant can help you solve known problems to increase your competitive advantage over peers, retain clients, and grow the business. 

 

 If these signs sound familiar, begin screening IT consultants near you who have demonstrated expertise working with businesses in your industry. With IT consulting help, you can stop wishing things were better and do something about it.
 
Bit by Bit can help you evaluate your needs, if you would like to discuss your needs in more detail, please contact us at 877.860.5831 x190 or email