Wednesday, September 6, 2017

Why Managed IT With a Good MSP is Superior to Break-Fix


Most small and medium-sized businesses (SMBs) have some relationship with an outside IT services provider that they call on to help keep their internal IT operations running smoothly. In fact, according to a survey conducted by CompTIA, more than two-thirds of companies have such a partner. In many cases, the way businesses make use of their IT services vendor is counterproductive.

That's because many SMBs operate in break-fix mode; the only time they call in their IT services partner is when their network or a server or a storage array breaks down. It may seem the most cost-effective way of doing things. After all, you only pay for service calls made. The opposite is true, however. Waiting until something breaks to call in your IT services vendor to fix it likely costs you far more than you may be aware.

Problems with the Break-Fix Approach

The primary issue with break-fix is that it is reactive rather than proactive. By definition, nothing happens until something breaks, and you have to make a call for help: "Our network has been down for two hours, and we haven't been able to get it running again. Please send someone over to get it back up."

What SMBs often fail to take into account is that even before they make that call for help, they have already lost a substantial amount of money. According to IDC, the cost of IT downtime for small businesses is between $137 and $427 per minute. So, when something breaks in a company's IT operations, the cost to get it fixed is far more than just the fee the IT services provider will charge.

Think about that fee and what it means to your IT service partner. They only get paid when you have problems, so they have little incentive to suggest proactive ways you can avoid problems in the future. Plus, once they are called in, the more time and resources (in parts and labor) they expend in getting you back online, the greater their fee is likely to be.

In other words, with the break-fix approach, the incentives you set up for your IT services provider run directly counter to the interests of your business.

The Alternative to Break-Fix: Managed IT Services

A much better option than the break-fix approach is to partner with a managed IT services provider or MSP. By doing so, you'll move from a reactive to a proactive stance that will result in fewer problems, less downtime, and an overall reduction in costs.

Employing a top-flight MSP realigns the incentives in the relationship in your favor. Rather than being paid for problem resolution on a per-issue basis, the MSP contracts with you to provide 24/7/365 support for your IT operations. Because they are continuously monitoring your network, servers, and storage, a good MSP will often detect potential problems long before they result in a complete breakdown. In fact, in many cases MSPs can identify and correct issues before the client is even aware of them.

The MSP takes on the responsibility for keeping your IT shop running smoothly. Since you are paying a set monthly amount rather than a per-incident fee, it's in the MSP's interest to ensure that as few incidents as possible occur. Therefore, they are likely to be very diligent about suggesting operational improvements and best practices, as well as technology upgrades, that will minimize the amount of downtime you experience.


If your company has been operating in break-fix mode, now would be an excellent time to consider how a top-notch MSP can reduce both your downtime and your maintenance costs.

by:

Regards,

Robert Blake
Bit by Bit Computer Consultants
721 N Fielder Rd. #B
Arlington, Texas 76012 
Direct 817.505.1257
Mobile 972.365.7010

The 2017 U.S. Government Cybersecurity Report



SecurityScorecard
The 2017 U.S. State and Federal Government Cybersecurity Report 
Download The 2017 U.S. Government Cybersecurity Report

Government Agencies Struggle to Establish Good Cyber Health
SecurityScorecard analyzed and evaluated the security posture of more than 500 U.S. State and Federal government agencies. A breakdown of the data by IP footprint size and security category, revealed the following key insights about the state of government cybersecurity programs today:
  • How government agencies fail to follow security best practices.
  • Which government agencies scored the best out of all 552 government organizations.
  • Where Government ranks in security amongst 18 industries including Finance, Healthcare, Technology, and Retail.

Download the Report




Friday, July 21, 2017

Scam Of The Week: Phishing Moves To Smishing



KnowBe4

Scam Of The Week: Phishing Moves To Smishing
Alert your users...
Hi Robert,
Smishing  PSA Video by USA TodayInternet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with Smishing attacks, which are hard to stop.
The practice has been around for a few years, but current new scams are mystery shopping invitations that start with a text, social engineering the victim to send an email to the scammers, and then get roped into a shopping fraud. 
These types of smishing attacks are also more and more used for Identity theft, bank account take-overs, or pressure employees into giving out personal or company confidential information.  Fortune magazine has a new article about this, and they lead with a video made by USA Today which is great to send to your users as a reminder.
I suggest you send employees, friends and family an email about this Scam Of The Week, feel free to copy/paste/edit:
"Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interest. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into the scam. 
Always, when you get a text, remember to "Think Before You Tap", because more and more, texts are used for identity theft, bank account take-overs and to pressure you into giving out personal or company confidential information.  Here is a short video made by USA Today that shows how this works: https://www.youtube.com/watch?v=ffck9C4vqEM
Obviously, an end-user who was trained to spot social engineering red flags (PDF) would think twice before falling for these scams. The link goes to a complimentary job aid that you can print out and pin to your wall. Feel free to distribute this PDF to as many people as you can. 
Let's stay safe out there,
Warm regards,
Stu Sjouwerman
Founder and CEO, KnowBe4, Inc.
NewStu.png


Monday, July 10, 2017

What is Spear Phishing and How Can You Stop It

If you have spent any time online, you have probably seen your fair share of fraudulent emails. From free offers on the latest wonder drug to information about the newest miracle diet, these emailed come-ons are everywhere, and clicking on them could compromise your security, or even your identity.

These phishing attacks have been around for quite some time, so long that many users have learned how to tune them out. With so many online users deleting, or simply ignoring, these run-of-the-mill phishing emails, scam artists have ramped up their efforts even more, and the result is an emerging threat called spear phishing.

As the name implies, spear phishing is a form of phishing attack, but it is highly targeted and can be much harder to detect. Instead of sending out millions of identical emails touting the latest miracle diet, spear phishing attacks target a much smaller audience.

Using emails that appear to come from a reputable source, like an employer or trusted friend, these spear phishing attacks seek to evade spam filters and jaded internet users alike. Even savvy computer users have been fooled, and if you do not know what to look for, you could be the next victim.

One of the things that distinguishes spear phishing from its less sophisticated counterpart is its level of personalization. Instead of the standard Dear Sir or Dear Madam, the scammer on the other end of the spear phishing attack calls you by name. The attacker may even know where you work, or the names of people in your network.

That personalization can throw even the sophisticated user off guard and cause them to lay down their defenses. That is why it is so important to review any incoming messages carefully, looking for signs that the person or organization on the other end is not who they claim to be.

From obvious mistakes like spelling errors and grammatical problems to company logos that just do not look right, there are a number of things to watch out for. Users should also be wary if the message asks for personal information like account numbers of Social Security numbers - these are things that should never be sent via email.

Last but not least, if you have even the slightest suspicion that a genuine-looking email is actually a spear phishing attack, contact the supposed sender to verify its authenticity. You can never be too careful in this world of rampant identity theft, ransomware attacks and other online dangers.

As with any online threat, prevention is the best defense. Spear phishing scams often use the information people post online against them, creating convincing messages that can fool even the most vigilant. If you want to protect yourself, take a few minutes to review your online presence, including information you have already shared. Sharing your email address, or the email addresses of friends and family, online can be quite dangerous, as can revealing personal details, like pet names, birthdates and the names of your children. Since these details are often used as challenge questions and in online profiles, sharing them on social media could put you at risk and open you up to the threat of spear phishing.

Spear phishing is not going away any time soon, and the best defenses are vigilance and common sense. Be wary of requests coming in through email, watch what you share and trust your intuition. Think before you click, and use your own common sense to protect yourself, your identity and your data.

Robert Blake
www.bitxbit.com
800.860.5831 x190