Keeping your network secure – this is a subject that should be carefully considered for any network whether business or personal. Technology is the main way that people communicate today and we increasingly rely on email communication. Cyber criminals are using this as an opportunity to send more and more scam emails, texts and phone calls. Often all very realistic. Making sure your network has the best security systems in place will help to keep your network and data secure.
Password Security and 2FA
When it comes to password security the one main rule is NEVER EVER share your password with anyone. Then next is to ensure that your password is difficult to guess. 123456 or password are sadly still often used despite them being so easy to guess. Making sure you have a password that is harder for criminals to guess is vital. Alongside using different passwords for each account. With so many passwords to remember for your work and personal accounts it is becoming harder to separate these out as well as remember them all. This is where 2FA( 2 factor authentication) is an advantage. Many on-line accounts now require 2FA, where you will enter your normal password and are then required to confirm the log in with an additional code generated by text, email or an authenticator app.
Finally if you are ever asked to reset a password via an email – check it is a genuine request. It is very unlikely that any organisation would ask you to reset a password unexpectedly. Many people unfortunately become victims of scams through realistic looking requests to update passwords.
Firewall – why do you need one?
In the construction industry, a firewall is historically the protection between two buildings to prevent fire spreading across adjacent buildings.
The computing equivalent works in a similar format. Acting as a security fence surrounding your network, a firewall observes and restricts information coming in via email or the internet. The firewall will only allow information from sources pre-determined by your firewall and can either be a network or host based security system.
In most homes and businesses, routers are used to enable the connection of various devices to the internet. Prior to routers, each individual device would need to be plugged directly into the modem. When connected directly in this way, a device has a public IP address a allowing information to be accessed by anyone on the internet. As technology has developed most devices will have their own firewall built in. However larger networks will have a separate firewall to protect the security of the network.
Antivirus Software – why do you need it?
Did you know that the first computer virus was released in 1971? The Creeper virus was not designed to be malicious or cause damage but was an experiment to demonstrate a mobile application. Today, it is believed that over 6000 new viruses are released each month.
Antivirus software, also known as anti-malware, is a computer program designed to prevent, detect, and remove malware. Antivirus software can protect users from: malicious browser helper objects, browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. There are various levels of protection available on the market. It is important that your choose the right anti-virus software for your network. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity, online banking attacks, social engineering techniques, advanced persistent threat and botnet DDoS attacks.
Security Awareness Training and Testing (SATT)
In addition to Firewalls and anti-virus software, MPR IT Solutions also offer SATT, Security Awareness Training and Testing. The purpose of this is to stop security incidents on your network, by providing your end users with Security Awareness Training and regular Testing. SATT is a fully managed service that is bespoke and tailored to every individual organisation. It takes up none of your time or resources, and is guaranteed to make a difference.
The SATT service combats the weakest cyber security link in any organisation – your end users – and is delivered in three stages over a 12-month service agreement. The total cost for the 12 month SATT service is far less than the cost of just one security incident.
Contact our team today
Supporting companies from a wide number of industries, MPR IT Solutions are experienced in the multitude of options across the markets and can tailor the right security systems to keep your network secure.
For more information on protecting and securing your network contact our team today on 0800 030 20 30 or email email@example.comRead more
by Nicki Dowsett in Anti-virus software, Audio Systems, broadband, CCTV, cybercrime, Disaster Planning, DNS Web Hosting, Domain Registration, Engineers, Exclaimer Cloud, fibre optics, Fire Alarms, General, Hardware, Helpdesk, Hosted phone, IT Support, IT Systems, Microsoft, Microsoft Teams, MPR, MPR IT Work, New customer, Office 365, Office Move, Password Security, Point to Point Wireless, Ransomware, Remote working, Server cabinet, Software, SQL Server, SSL Certificates, Structured Cabling, Training, TV Distribution, Web Hosting, Websites, Windows 10, Wireless networks
“What does IT Support look like to you?”
Often the simple answer is a helpdesk offering daily support to end users in a fast and reliable manner.
When considering your business as a whole, IT Support is usually much more complex. Have you considered these areas?
- Who looks after your phone system?
- Who provides your internet connection and leased lines?
- Where is your website domain registered and hosted?
- Do you have malware and anti-virus software?
- Is your office using a Wi-Fi network? Who maintains this?
- Where do you purchase new hardware? Is it under warranty and how do you manage an upgrade programme?
- Are your servers on site or are they cloud based? How are these monitored and supported?
If I was to ask the question again “What does IT Support look like to you?” Would the answer be the same? The chances are that answer has changed.
By choosing MPR IT Solutions, you can be assured that your business will benefit from all-round comprehensive support in all information technology aspects. With a dedicated Account Manager, simple straightforward invoicing and only one point of contact for any technical issues, MPR IT Solutions provides fast, effective and reliable IT Support to businesses throughout London and the South East. Working in partnership with our clients we believe enhances our understanding of their business needs and we always look to find the best and most effective solution. Our core products and services include (but not limited to);
- Comprehensive IT Systems Support
- Hosted/ Voip Telephones
- Website domain registration and hosting
- Internet connections and Leased Lines
- Wi Fi Networks
- Azure Server Support
- Office 365 & Microsoft Teams
- AEM Monitoring
- Malware/Anti-virus software
- Hardware purchasing and upgrade plans
- Security Awareness Training (SATT)
- Email Signature Management
Through the growth and continued development of MPR IT Solutions and increasing demands from clients, our sister company MPR Technical Services was born in 2019. A Technical Services Integrator, their highly experienced and qualified employees provide advice, design and installation services in residential and commercial developments.
MPR Technical Services and MPR IT Solutions will work together for larger projects, as necessary. With a collaborative relationship you can be assured of strong communication and enhanced understanding of the work carried out and on-going support required.
Extended Services through MPR Technical Services:
- Structured Cabling
- Wireless Networks
- Audio Visual and Digital IPTV Systems
- Electronic Security
- Office re-locations
For more information on the products and services from MPR IT Solutions contact our team today on 0800 030 20 30 or email firstname.lastname@example.orgRead more
Canterbury Archaeological Trust, one of the UK most famous Archaeology firms based in Kent, turned to MPR IT over 5 years ago looking for an outsourced IT company. They required a reliable company to provide day to day support, Office 365, Anti-virus and also support on any larger projects that may require IT services.
Included in the support that we offer to the Trust is an all-inclusive server support and AVG anti-virus software. Ensuring the charity is safe in the knowledge that the systems are monitored and support available 365 days a year, all for a set cost per month. No unexpected bills for when something goes awry on a weekend or holiday period.
This support became invaluable one weekend when something went wrong on the network. As 24 hours support was in place, an out of hour’s call was made to MPR IT. With the ability to remotely look at the network our engineer quickly identified that malware had in fact infiltrated the system, and he quickly made the decision to make his way to the site.
Within an hour of the initial call out the network on site had been shut down and all machines physically unplugged to avoid any further damage occurring. This is key with any malware attack, the sooner the network is detached from the outside world the quicker it will stop from spreading. Over the next few hours, the infected file was identified and removed whilst the remaining files were scanned. The network is backed up on a regular basis,which is something we recommend to all our clients. This meant that when restoring the network it was easy to revert to the most recent back up and limited data lost, especially as this occurred out of hours meaning that there had been limited access since the back up the previous evening.
What Canterbury Archaeological Trust have to say about MPR IT
Just a quick note to thank you and the team – and especially David and Mitch – for the fantastic response to the weekend viral attack on our computer systems, and for your sound advice in the first place which resulted in building such a resilient set-up. From your first response on Monday, which limited the damage, to the speedy and efficient disaster recovery, we could not have asked for more. Several of our staff have commented on their amazement at the speed with which you got us back up and running. Brilliant job, well done!
Personally, I can’t help contrasting it with what happened a few years back when the Raid Array blew, that really was a disaster. We’ve come a very long way since then, thanks to MPR-IT.
Commercial Operations Director
Canterbury Archaeological Trust
For more information on how we can support your business please do not hesitate to contact us and discuss your requirements.Read more
Cybercrime and you
The hot topic for the first half of 2016 has been all about cybercrime, hacking and ransomware. It seems that no company no matter the size is safe from attack. In this blog we will talk about some of the companies that have been attacked and how this can ultimately affect you. We will also talk about the steps you need to take to ensure your systems and network are secure.
Can you name a well-known organisation that has been attacked? Here are just a few that you will know and possibly use:
Talk Talk – 57,000 customer personal details accessed and 15,600 customer bank details taken. This caused uncertainty for many customers as to what had happened to their bank details and at what cost to them. This attack cost the company upwards of £35million in compensation and loss of customers. 4 people were subsequently arrested in connection to the attack.
Vtech – Over 5 million customers affected by this attack on children’s manufacturer. Accounts set up online to allow children to play games were hacked, leaving them vulnerable. Whilst it did not store any bank or credit card details, it did store personal contact information. The company were not even aware of the attack until contacted by a journalist. A 21 year old was arrested, he had carried out this attack from his home in Berkshire.
BBC News, The New York Times, MSN – One of the more recent occurrence. These news sites were unwitting victims to malicious adverts on their sites or malvertising. Tens of thousands of people were exposed to these adverts, which could deliver malware to your device, encrypting your files. This was a large attack on well-known news outlets and if they had been successful could have been devastating for millions of people, however all ads were removed quickly.
Ashley Madison – The chances are you don’t know the company by name, but will have heard this story. The company are an on-line site encouraging extra-marital affairs. The site was hacked and user details stolen. The information was then leaked on-line causing many spouses to be very unhappy. We can all guess how that ended up for many people.
FBI – Slightly concerning that the Federal Government of America are also at risk. The same hackers also accessed the CIA director’s personal email. Having accessed the FBI Portal the hackers were then able to view records on arrested suspects. These details were then leaked on-line.
Donald Trump – Now no matter your view on the Presidential candidate for the US, it is surprising that even businesses owned by one of the most successful businessman at are risk. Malware was put into the Trump Systems and stole credit card details from hotels across the US. It is not known how many people were affected by this, but expected to be in the thousands. The hacktivists Anonymous have also recently announced they are declaring war on Trump.
Now for some of the lesser known companies, some of which are in our own region, just to show you that it is not just the large companies in the world that can be vulnerable. Do not have a false sense of security that this cannot happen to you. Sadly everyone is at risk.
Solar UK – Based in Battle, East Sussex, this small business of just 11 people were hacked by the current largest terrorist organisation, ISIS. The company website was vulnerable to attack and unbeknown to them, the website had been taken off line. Anyone searching for them, would be horrified to see CCA or the Caliphate Cyber Army videos. This hack was apparently in revenge for a drone strike in Syria. It is believed that the company was targeted by a search Robot trawling through the internet to find unsecure websites.
Chatham Town FC – In January of 2015, this small part time football club had its page hacked and in place of the usual content an image was put up supporting the perpetrators of the Charlie Hebdo attack in Paris. Luckily all the content of the Football website was backed up and was back up and running after a couple of days with no data lost.
The list seems to go on and on of varying different business types that are vulnerable, we highly recommend that you review all your network and personal security. The Government Cyber Essentials scheme backed by the FSB is key to help win any government contracts and is good practices for all businesses. It is no longer something that businesses should think it would be nice to have in place, it is essential. The risks are extremely high, not just for your customer’s details, but also your business as a whole. If you are unfortunate enough to be attacked, it will be costly both in monetary value for custom, but also in getting it fixed and downtime for your staff.
These are the 5 key points on the Government Cyber Essentials scheme
Malware Protection – do you have a robust malware in place? This will stop viruses and ransomware from getting through to your emails and employees.
Access Control – encourage your staff to choose passwords that would be hard to guess and not simply change the number on the end each time it needs to be updated. Password or 123456 are not ever going to be good choices. Also ensure that admin passwords are only given out to members of staff that should have access to these.
Firewalls – investing in a high end firewall can prevent hackers from gaining access to your systems and to make certain there are no leaks.
Secure configuration – Is your system configured to ensure security for your organisation. Are all laptops, PC’s and phones password protected? Do files need to be password protected?
Patch Management – the likes of Microsoft and other operating systems regularly release new updates to their software. Ensure you are fully up to date as these updates will often include patches to ensure your systems are more secure. As hackers become more clever the software providers work hard to identify areas to increase security.
We also recommend you view the national cybercrime website or if you have any concerns about any of the issues raised in this blog – please contact MPR IT to discuss the current state of your network and if there is anything else we can help you with to improve security.Read more