Author Archives: Anton Ruighaver

A Primer on Watering Hole Attacks

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through watering hole attacks. What are watering hole attacks? Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware. The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer. But how does … READ MORE »

How Good is Your Disaster Recovery Plan?

You may think you know all about disaster recovery plans (DRP) from attending conferences or reading up on the subject. But one of the best ways to learn is by example, and the following real-life case offers valuable lessons. Learn about the DPR audit of a state government office and the knowledge gained from it. Hosting certain types of data and managing a government network legally bind you to maintain DRPs. After an audit of the Michigan Department of Technology and Budget, several failures led to a trove of helpful tips for small- and medium-sized businesses attempting to create a bulletproof disaster recovery plan. Update and test your plan frequently What was one of the first and most obvious failures of the department’s DRP? It didn’t include plans to restore an essential piece of their infrastructure — the department’s intranet. … READ MORE »

A Smart Approach to Cybersecurity Investment

Cybersecurity is a threat to businesses across industries. Sometimes, organizations invest in security software without realizing the risks that come with it. Here are compelling reasons why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should run a risk assessment to evaluate its current cybersecurity infrastructure. Doing so is one of the easiest ways to identify, correct, and prevent security breaches. After discovering potential issues that cyberterrorists could exploit, rate them based on probability of occurrence and potential impacts on your business.Keep in mind that risk assessments are specific to every business, and there is no one-size-fits-all approach for technology that will work for small- and medium-sized businesses (SMBs). Variables like your line of business and operating environment will account for differences in needs and risks. For instance, manufacturing companies and insurance groups have … READ MORE »

Work Smarter in Outlook With These Tips

People are constantly searching for an easier way to keep their email inboxes in order, customize their email signatures, and improve group communications. The good news is that Microsoft Outlook has these features built in, you just need to know where to look.     Clean Up your inbox No matter how meticulously organized your Outlook inbox is, there’s always room for improvement. For a little computer-assisted help, try the ‘Clean Up’ feature. From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options: Clean Up Conversation – Reviews an email thread or a conversation and deletes redundant text. Clean Up Folder – Reviews conversations in a selected folder and deletes redundant messages. Clean Up Folder & Subfolders – Reviews all messages in a selected folder and any subfolders, and deletes redundant messages in all of … READ MORE »

Why You Should Care About HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it.   HTTPS Encryption When you visit a website that doesn’t use HTTPS, which is common with older websites that have been left on its domain with minimal intervention, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be decrypted by anyone with even the most basic tools. HTTPS Certificates The other thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, … READ MORE »

The Dangers of Autocomplete Passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users in the world. This means users have to create dozens of passwords, either to protect their account or simply to meet the password-creation requirements of the platform they’re using. Unfortunately, only 20% of US internet users have different passwords for their multiple online accounts. Certain web browsers have integrated a mechanism that enables usernames and passwords to be automatically entered into a web form. On the other hand, password manager applications have made it easy to access login credentials. But these aren’t completely safe. Tricking … READ MORE »

Office 365 Add-Ons That Boost Productivity

Microsoft’s Office 365 has made everyday business operations more efficient with programs like Word, PowerPoint, Excel, OneNote, and Outlook. As if that’s not enough, it also offers these add-ons that streamline users’ workflow. #1. Teams Teams is ideal for organizations that collaborate frequently. It’s an instant messaging and document-sharing platform which seamlessly integrates with Office 365 programs and services. Users can create channels to work on projects, discuss topics, hold meetings, and more. And like similar programs such as Slack and Google Hangouts, Teams is customizable and accessible across mobile devices. #2. Office Tabs Office Tabs allows you to open multiple files in one window, which saves you from having to go through each opened document until you find the right one. It also lets you save or close the list of tabs in a single click, with an additional … READ MORE »

VoIP and Remote Work: The Perfect Combination

Voice over internet protocol (VoIP) phone systems give employees the freedom to make and receive calls from any location. More importantly, a good VoIP solution allows you to enable work-at-home arrangements that will keep your workers happy and your company productive. So how exactly will VoIP and working at home equal to a more successful business? Let’s find out. It’s good for business Many businesses have misconceptions about their employees who choose to work from home. They assume that their employees will be less productive if they are not within the office environment, but this could not be farther from the truth. VoIP services can empower your small business and work-at-home employees in a number of ways: VoIP technologies allow you to keep your employees on track with an array of management tools like barge, monitor, and whisper, which allow … READ MORE »

Should You Adopt the Cloud During COVID-19?

With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently.   Ensuring continuity and efficiency with the cloud The need to stay at home and practice social distancing have changed the way many businesses operate. With their employees unable to come to the office, organizations are forced to function with a remote team whose members are often miles away from each other. This is where cloud technology helps. When you migrate your data to the cloud, your files are stored in a centralized server that can be accessed via the internet. So as long as a user has an internet-connected … READ MORE »

The Cloud and Virtualization Explained

Cloud computing and virtualization are similar but that doesn’t mean that one can be substituted for the other. Each has its own benefits, so it pays to know how both work, so you can take advantage of them. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, it would overwhelm the email server, causing it to slow down. Adding another server would solve this problem, but it would be expensive and inefficient on days with less traffic. With virtualization, you can combine the resources of all five servers in our example. So if the email server gets bogged down, it can borrow resources from any of the other servers with extra capacity. The process is not as simple as it sounds, and businesses often … READ MORE »