LANConnect Systems, Inc. Blog

LANConnect Systems, Inc. has been serving the Massachusetts area since 2003, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Who Can You Trust to Keep Your Data Safe?

Who Can You Trust to Keep Your Data Safe?

I want to start by saying that I think we (as in, all local business owners) need to never put complete blind faith in something that our business relies on.

What Do I Mean by This?

Let’s start with an analogy. When you buy a car, you expect that the car will operate pretty well during its life expectancy. According to Consumer Reports, the average life expectancy of a modern vehicle is around 8 years or 150,000 miles. You expect that your new car, with proper maintenance, will last you at least that long, if not longer.

You might think, well as long as I don’t have a collision or have a deer jump out in front of me, this car is going to get me everywhere I need to be for the next several years.

Let’s look at cybersecurity for your business. You invest in a backup, in a firewall, in a security suite, and you perform audits with your IT company to get everything locked down. You are patching all of your software, your end-users are using 2FA for everything, and you are spending a good amount of money on protecting your data.

You might think, well as long as I have all this security infrastructure and keep it maintained, I’m good for a few years until this version of Windows Server hits end of life, or until it’s time to swap out old hardware and upgrade it with something new. Either way, you probably feel like you at least purchased some peace of mind.

The Problem; We are All Fighting an Uphill Battle Against Cybercriminals

I’m not trying to sound bleak. In fact, I have a lot of confidence in my techs, the solutions we use (both for us and our clients) and in the security of my data. When we work with a client and set them up with all of our security solutions and our business continuity device, I have confidence that these tools will operate as expected and when they don’t, my technicians will be made aware quickly and resolve the issue. We’ve done this time and time again.

Why am I worried that we are putting too much stock in trusting that, say, a firewall is infallible?

The Solutions That Exist to Protect Us are Being Targeted

More and more often I’m seeing news about different software providers disclosing attacks and breaches that they experience. Most recently, a popular antivirus company Avast and virtual private network service NordVPN were targets of data breaches. In either breach, it sounds like no end users were harmed, but these attacks are complicated. 

Another security firm, Comodo, was recently attacked by hackers who exploited a vulnerability on its user forums. The breach resulted in the theft of 245 thousand users’ personal data.

Back in August, Imperva, who provides high-end cybersecurity protection solutions, informed customers that it recently discovered a “security incident” that exposed the sensitive information of users utilizing one of their products over the past 11 months.

These cybersecurity businesses are doing the right things. They are disclosing the breaches and taking proper action to protect their customers and prevent further issues. The problem is that we are seeing more and more businesses like this getting targeted, and the threats then trickle down.

IT Companies are Now Center Stage for Hackers Too

Sure, it’s scary that these cybersecurity giants are being targeted by cybercriminals, but it’s much more relatable (especially for me) that managed service providers are in the crosshairs.

Last October, the U.S. Department of Homeland Security’s Computer Emergency Readiness Team issued an alert regarding cybercriminals attacking MSPs directly, and over the last year we’ve been seeing more and more cases where an MSP was the target of a data breach. 

I’m not saying that our clients are at risk simply because we are a managed IT provider. Again, I’m trying to avoid being bleak, but I do feel that a little paranoia is healthy when it comes to your data. We are extremely adamant about our own cybersecurity. We believe it is our responsibility to raise the bar when it comes to protecting data, especially the data of our clients.

The point is, it’s good to question your investments and not place total confidence in something.

Don’t Put Blind Faith in Your Security

No matter how comprehensive it is, you should always be auditing your cybersecurity. As a business owner, even though I want to fully entrust everything I’ve invested in to protect my network and my data, I know I NEED to run regular audits and penetration testing to make sure what I’ve bought and set up is actually doing its job.

If you aren’t having your network regularly tested and audited, it is time to start. If you are already working with an IT company and they are telling you with full confidence that your network is safe, get a second opinion.

We’re happy to be that second opinion, and we’re happy to be discreet. If you want to get started with a network audit, give us a call at (888) 907-6080.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

Even If You Don’t Hear About Small Business Breaches, They Happen

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones? The truth is, smaller businesses are breached just as often, with the consequences being just as severe. 

0 Comments
Continue reading

Cybersecurity Awareness in Retail

Cybersecurity Awareness in Retail

Cybercrime is at a record high and today’s businesses are the ones that take the brunt of the issues. For the retail business, cybersecurity has a couple of different faces. For Cybersecurity Awareness Month, we thought we’d talk a little bit about the retail space and how businesses are securing their customers’ information. 

0 Comments
Continue reading

Tip of the Week: Network Security Basics

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Passwords Hold Everything Together

Passwords Hold Everything Together

Passwords are often all that stands between hackers and account information; this is true for both personal and business data. However, passwords are often not enough to protect data from the clutches of hackers. We’ll walk you through how to ensure your organization implements only the most powerful of passwords, as well as additional security measures to guarantee maximum protection.

0 Comments
Continue reading

Protect Your Reputation with Solid Network Security

Protect Your Reputation with Solid Network Security

Your organization needs to take network security as seriously as possible. While it might seem tempting to just implement security solutions and hide behind them, thinking you’re safe, it’s much more important that you invest time and consideration into your organization’s culture. We’ll walk you through how you can minimize threats to your network, as well as provide a primer for what to expect from comprehensive enterprise network security solutions.

0 Comments
Continue reading