Employee Security Training: Your IT New Year Resolution

Happy New Year! What are you looking to do better in 2019?

The turn of the calendar tends to bring with it thoughts of personal growth and improvement.  But, for many business owners – their identity being tied directly to their enterprises – New Year’s resolutions often translate to things they can do better for their companies.

So, let’s restate the above question: What are you looking to do better for your business in 2019?

If you’re open to it, allow us to offer a suggestion: if you haven’t made cyber security a part of your company culture, make cyber security training for your employees a priority this year. Why? Because you’ll be shoring up the weakest part of your network defenses.

The Case for Initiating Security Training for Your Employees

It’s not a secret that employees are the weakest link in any organization’s security efforts. That doesn’t mean that your staff is going out of their way to jeopardize your network. They’re just either unaware of which actions leave the company vulnerable, unsure of what to do if they do encounter a potentially threatening situation, or simply don’t assign a great deal of importance to security concerns (this is sometimes called the “it’s the IT guy’s problem” syndrome).

In most cases, though, you really can’t blame the rank-and-file. Think about this:

  • 65% of companies have over 500 employees who are never prompted to change their passwords
  • 52% of business leaders don’t know what to do if cyber security is breached
  • 45% of employees don’t receive cyber security training at all
  • Microsoft Office applications (Word, Excel, etc) account for 38% of malicious file extensions
  • 91% of cyber attacks begin with a phishing email

What are these statistics telling us? First, that workers are routinely targeted – and via the communication methods (email) and business applications they rely on the most (Microsoft Office). Secondly, if/when things go wrong, management typically doesn’t empower employees to help in warding off the threats, and often has no plan of action.

Let’s take a look at a few more statistics:

  • cyber crime is expected to cause $6 trillion in damages by 2021
  • 61% of breach victims in 2017 were companies with less than 1,000 employees
  • average cost of malware attack is $2.4 million

If you’re a small business, a multi-million dollar mistake is hard to recover from. Encouraging your team to become more discerning digital users and an active part of your data security efforts is, simply put, the smart move. The best way to do that is with an active cyber security training program.

What Does Security Training Entail?

Education can cure a lot of ills. This is absolutely the case with cyber security concerns. But before you can teach, you much know where your subjects stand.

As such, the first part of training focuses on identifying what your trainees know and don’t know. At Beacon, we initiate our cyber security training program with real-world examples of cyber exploits. This is accomplished with a computerized test, where employees are asked to complete a few simple tasks, such as opening an email with an attachment.

The test serves two purposes. First, it exposes people to real life attack methods that they are likely to encounter. Secondly, it identifies the types of exploits to which your team is most vulnerable.

Once you know which types of tricks are most likely to work on your team members, you can arm them with the skills to shore up their vulnerabilities. That’s the second part of the training – teaching how to recognize when something is amiss and how to counter a suspected attack.

The training portion should be tailored to each employee, based on the results of their assessments. Focus on what they don’t know. You don’t want to waste anybody’s time going over concepts they already know well. Your team is more likely to retain information they find valuable and/or interesting – so, teaching them stuff they know is counterproductive. Each employee’s training should cover the exploits they did not handle well during the assessment.

At the end of training, be sure to remind your team of how valuable their contributions to network security are.

Beacon Knows Security Training

Want some professional help with your employee security training? BITS is here to help. We’re more than happy to get your team up to speed on the latest cyber threats.

By | 2019-01-28T07:57:23+00:00 January 28th, 2019|Computer Related, BITS News, IT Services|

What is Blockchain… And So What?

Let’s be honest… blockchain is a confusing concept. Even for people who understand exactly how blockchain technology works, providing an easy to understand explanation is challenging.

There are a couple of reasons for this. First, blockchain is relatively new tech, and new tech always takes a little while to sink into the public consciousness. We didn’t really know what the internet was for, or how transformative of a force it could be, back in the 90s. Mostly, because we didn’t understand how it could be applied.

Secondly, the technology itself – blockchain – is closely associated with its application – a cryptocurrency called Bitcoin. But they are not the same thing. The sometimes-negative association with Bitcoin specifically, or cryptocurrencies generally, tends to muddy the waters for many.

Before we confuse you further and tell you more about what blockchain isn’t, let’s outline what it actually is. There are three important elements of blockchain technology:

  1. large, peer-to-peer network of computers dedicated to processing and recording digital activity
  2. decentralized database of all recorded activity called a Distributed Ledger (there are several key aspects to this, including “decentralized” and “all recorded activity”)
  3. encryption

It’s definitely more complicated than that. There’s a lot that’s packed into the application of these three concepts. But, boiled down, blockchain combines these elements to provide a secure platform that allows any two parties to engage on the web without the need for a third-party authenticator. Blockchain cuts out the need for a middleman in any digital interaction (including financial transactions) by providing a peer-to-peer network that’s safe, trusted and transparent.

The first intended application of blockchain technology – Bitcoin – was financial in nature. The creator/creators set out to develop an entirely new currency – one that is not reliant on or backed by any government. But, it’s the system that was developed to enable a digitally-based currency that may be end up being much more transformative.

“The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value,” say Don and Alex Tapscott, authors of the 2016 book Blockchain Revolution.

If it sounds like there could be thousands of applications for blockchain technology, you (and a few dozen million people) are probably on to something.

Blockchain Application in IT & Data Security

So, can blockchain disrupt the IT and data security industries? It sure seems to have the potential to do so. In fact, it may already be doing so.

The following attributes and capabilities make the blockchain particularly appealing to data security professionals:

  • Decentralized and unhackable
  • Encryption and validation
  • Public or private

The data that’s stored on a blockchain doesn’t reside on any one computer (or, node) – it is distributed across all the nodes on a blockchain network. Once a record is added to a blockchain database, it is encrypted and cannot be accessed or altered unless the user provides the correct access key. This makes a blockchain pretty much impervious to hacking.

Because there’s no centralized location for the data, hackers would need to gain access to more than 50% of the network nodes in order to access or overwrite a saved record. Depending on the size of the network, that proposition falls somewhere between extremely unlikely to darn-near impossible.

Further, while blockchain was initially created to enable anonymity in a very public setting, a private blockchain network that restricts access to just a few users can easily be created.

All of this means that blockchain technology is highly amenable to the data security needs of businesses, large and small.

Beacon Knows Data Security

Not sure if you’re doing enough to protect your sensitive business data? BITS can help. A free audit of your network by our security experts can help put your mind at ease. Request one today.

For a deeper understanding of blockchain technology, check out additional information here, here and here.

By | 2018-11-29T09:21:50+00:00 November 27th, 2018|Computer Related, IT Services|

How Often Should Your Company Replace Its Computers

To say technology is a critical component in any small business today would be an understatement. However, there is an age-old question, “When should my company update its computer systems?” We all know the struggles we face using a computer that just isn’t quite up to snuff. We are all painfully aware of the early warning signs when a computer is on its way out. There is trouble running our favorite web browser, web pages load a bit slower and excel documents freeze up and crash altogether. We understand that as a small business you need to strike a balance between productivity while maintaining a budget. So, how can you tell when your company should look into replacing its computers?

First, let’s take a glance at the average lifespan of a computer.

It is important to draw a distinction between Business PCs and Consumer PCs. Consumer computers are built to be specifically priced for consumer outlets and use. The inner workings that make up the Consumer PCs are usually purchased from the lowest priced supplier with little to no emphasis on quality or reliability. Cheaper components cause instability, reliability concerns, and overall poor performance. Depending on the strain and demands on your Consumer grade PCs you can expect roughly a 2-3 year life expectancy.

Key takeaway: If your company is using Consumer grade PCs then you can expect around a 2-3 year life expectancy with a 1-year warranty on average.

Now let’s talk about Business Class. In general, these Business Class PCs are built to order. However, there are pre-built models that make use of common configurations. These types of computers have reliable components that are built to perform better and handle common business tasks. In addition, these types of computers have a more extensive warranty that ensures parts are quickly and easily replaced.

Key takeaway: Business class computers also outperform Consumer PCs and have a longer life expectancy. These computers have an average life span of 3-5 years with a much longer warranty on average.

Depending on the class of computer your company has will determine when you will need to replace your computers.

Early Warning Signs a Computer Is Failing

• Performance tapers off as new software or apps are added – all functions begin to slow down

• Issues with updating or installing the latest operating system

• Trouble or issues with running needed software apps

Generally, as computers age and as new software is installed on the systems it will gradually require more resources to run it properly. This will begin to have an impact on overall PC performance and slow down other various functions as well.

So to bring it around when do you purchase new computers for your company? If you have Business Class PCs you will want to replace them every 3 – 5 years as a rule of thumb. Additionally, we recommend reviewing program requirements to balance both productivity and costs. At a minimum when it comes to purchasing a new Business Class PC we recommend these basic specs:

• Intel i5

• 8G Ram

• Solid State hybrid or Solid State Drive

The Bottom Line When It Comes To Replacing Computers

Whether hardware failure or software obsolescence, eventually you will have to replace your company’s computers. Computer upgrades and improvements mean people in your company will spend less time doing more mundane tasks and more time on important activities. If your computer systems are currently 5 years or older it’s time for an upgrade.

By | 2017-05-30T10:59:59+00:00 April 4th, 2017|Computer Related|

BITS Blog – A Technical Blog for the Non-Technical

Welcome to the Beacon IT Services (BITS) blog.  My name is Ryan Bowles, Account Executive for BITS. This blog is intended to be a resource for small/medium sized businesses to help better take control of their IT.  You will notice that my title does not include any words like Network, Systems, Engineer, or Administrator (even though we have plenty of people here that do!). Although I do consider myself an IT Professional, my expertise comes from understanding how IT relates to a business and what can be done to ensure that technology is an asset to a business and not a burden.  This blog won’t be about speeds, feeds, and technical specs (although we will sprinkle in some technical “how to” blogs by the above mentioned specialists from time to time).  Rather, the majority of posts here will be directed towards the small business owners and managers. The goal being to help you better understand technology and how it relates to your business by answering questions that most companies have (or should have) about what to do with their IT.  Ever wonder when you should upgrade your PCs? How about determining if you should replace your old server or move to the cloud?  What is a firewall and do I need one?  These are the types of questions I will be helping to answer.  So as we move forward please share this post and continue to check back to catch up on all the Tips, Tricks, and How To’s of small business technology.

BITS is an IT services company located in Greensboro NC, dedicated to helping our clients improve business productivity.  We do this by offering a range of IT services, leveraging a team of experts to proactively manage our clients IT and ensure that technology is a consistent and reliable asset to their business.

 

By | 2017-03-21T13:43:56+00:00 February 29th, 2016|Computer Related, BITS News, IT Services|

3 reasons to give Microsoft’s newest browser more than just a second look…

EdgeIf you’re one of the many people that’s already made the switch to Windows 10, you’ve probably already gotten over your initial curiosity of Microsoft’s newest operating system. You might have even double clicked on the iconic blue E, surfed the web for a bit and then went back to your browser of choice. But what most people haven’t noticed is that blue e may not stand for Internet Explorer. It could be Microsoft’s new browser, Edge. It definitely deserves a second look and here are the 3 reasons why…

1. It will have Extensions

Although delayed from its original release in November, this overdue feature will help close the gap with Chrome and Firefox. It is definitely something to look forward to in 2016.

2. It’s fast

Compared to versions of IE, Edge is unrecognizable. And although back and forth testing with chrome hasn’t yielded a final winner just yet, the fact that a Microsoft browser is even in the running for the top spot is enough to make you do a double take.

3. It’s clean

Internet Explorer has been known for its clutter from the tool bar to seemingly every available option staring you in the face. Edge has changed all that with a clean but functional toolbar that hides all the controls and settings that distracted you from what’s most important, the page itself.

There are many more exciting features built into Edge such as Cortana, an integrated digital assistant, Reading List and Reading View which lets you read articles without the distractions of ads. It also features Tab Preview which drops down a small preview window of the tab when the mouse cursor is hovered over it.

It’s always exciting to see a software company like Microsoft listening to its customers and with its new Browser. It’s off to a great start with the updates coming in 2016 and should make the choice of a preferred browser that much harder.

 

By | 2017-03-21T13:46:43+00:00 February 3rd, 2016|Computer Related|