Friday, December 25, 2020

Adobe Flash Will Soon Be Unsupported Software

 Flash Player is going to be going out of support, the 24-year-old software being retired at the end of this year. That's a pretty big deal: Flash Player, at least initially, was a solution that most users have used at one time or another. What will this loss mean for your business’ processes?


Hopefully, Not Much at All

Flash hasn’t been the most reliable solution out there lately, and has even caused a few difficulties. However, the actions taken by Adobe have made Flash Player a thing of the past.

Adobe has pulled the plug, and Microsoft and Apple alike have also taken steps to distance themselves from Flash by removing it from many Internet browsers, as well as from their mobile operating systems and devices.

You probably haven't used Flash Player for some time, but that doesn't mean you don’t still have it installed. We would like to remind you to remove it from your system before it contributes to significant security risks.

A system that has the solution installed has active security vulnerabilities that could be exploited by cybercriminals to their advantage. As a result, it could soon and easily be used as a means of attacking employees. Whenever a software solution of this kind is no longer supported, it does not receive any security updates of any kind. This not only enables cybercriminals to take advantage of the lacking security in the software itself, it opens up the possibility of cybercriminals posing as Adobe and offer to “update” the solution further, if only to gain access to your infrastructure.

Keep in mind, if you have older software that uses Adobe Flash (as a lot of software from the late 90’s and early 2000s sometimes did), it might not work as intended moving forward. There isn’t much anybody can do for you—it’s just time to update to modern software as this nearly 30-year-old technology is going away.

To avoid this, it is crucial to fully update all solutions in your company's infrastructure and, when the time comes, to remove unused or unsafe ones. Make sure your entire IT environment is optimized and secured so you can work productively with your team without worrying about the reliability of your tools.

Friday, December 18, 2020

Is Remote Work a Bigger Risk with Certain Employees?

 Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.


As it happens, many business owners hold some preconceived notions as to which of their users constitute the biggest risks while working remotely. Let’s turn our attention to some statistics to see if these notions have any merit.

Cybersecurity in the Home Versus in the Office

Before we begin our review, it is important that we start off by acknowledging one thing: your employees probably aren’t used to subscribing to the same cybersecurity standards at home as they do in the office. While there will be exceptions, your team is generally going to be somewhat lax in their at-home security precautions.

This could easily cause remote work to become problematic. Consider it: when working remotely, your team isn’t operating within the protections installed on your business’ network. As a result, they could unwittingly allow in a threat and thereby give it access to whatever data or resources the individual responsible is privy to. Not only does this reinforce the importance of general access permissions, but it also makes it crucial that you encourage your employees to maintain high standards of security whenever and wherever attending to business matters.

According to a survey taken by the National Cyber Security Alliance, personal security standards are a mixed bag in more ways than one. Compiling the responses of 1000 American adults, with the sample split evenly between those aged 18 to 34 and those from 50 to 75 years of age, this survey helped to identify a few differences in behavior between these two cohorts.

The Survey’s Findings

Many of the insights that this survey presented were somewhat predictable. For instance, the younger cohort were more likely to put multi-factor authentication in place, 89 percent of respondents doing so compared to the elder cohort’s 70 percent. Similar numbers came up when it came to whether a user regularly applied software updates—83 percent of the younger group did, while 63 percent of the older group would.

Having said that, many of the data points generated through this survey told a much more two-sided story… one in which security practices were inconsistent across the board. While the younger cohort would more often use MFA, they would also neglect to update their basic security solutions, would connect to public Wi-Fi far more often, and didn’t reinforce their security when working remotely.

So, in this way, every age group can be a risk to cybersecurity while they work remotely… it just comes out in different ways.

How Does This Impact Your Business’ Security?

Here’s the hard truth: assuming that one group of users is inherently more or less secure than the other is a recipe for disaster, whether your team is working remotely or coming into the workplace each day. This means that your business’ security lies in your team’s awareness as a cohesive unit, which in turn means you need to do everything you can to keep them vigilant.

To do so, you need to clearly establish rules and procedures for everyone to follow as they’re working, wherever they happen to be at the time. Giving them different materials and exercises to use and evaluating their preparedness can help keep them accountable, as well as reveal to you where your potential vulnerabilities lie and what you need to do to resolve them.

Friday, December 11, 2020

Tip of the Week: Maximizing the Value of Your IT Investments

 Businesses are in a tough spot right now, which makes their costs an even bigger issue for them to keep in mind. Luckily for businesses everywhere, however, many technologies are available now that can greatly benefit their operations—without being unattainable due to their price. Let’s consider five such technologies and strategies that can bring productivity and efficiency without sending you into the red.


Software as a Service (SaaS)

With them being a tool used daily, your business can’t really afford to skimp on its software solutions. Once upon a time, this meant that a business was bound to be on the hook for an expensive and temporary investment that they would have to re-up later to keep up with the updates.

SaaS helps to remedy this. Instead of the above methodology, Software as a Service gives you access to the most up-to-date version of a software title that is available, for the number of employees that work best for you. Does a small team need a particular tool that nobody else does? SaaS allows you to equip those employees with the appropriate software on a monthly subscription basis.

As a result, SaaS enables you to transition a capital expense into a sustainable operational expense, simplifying your budgeting. This, paired with the innate scalability of SaaS, allows practically the smallest businesses to enjoy the benefits.

Stopping the Binge Spending

It isn’t unheard of that, just as they try to pull the most ROI out of their solutions as possible, many business owners will then try to change everything at once. This strategy isn’t the most practical one to follow, never mind the fact that implementing these changes at all is going to be a challenge.

Instead, businesses should prioritize and focus on individual improvements, ensuring that each is effective and scalable before adopting another. This will help reduce the chance of overinvesting in a solution or investing in one that isn’t effective.

Education

Something else to keep in mind, concerning your software: it is only as capable as the user putting it to use. If the user is unaware of its potential, you simply won’t see the returns you could otherwise. That’s why you need to make sure that you properly train your team on what they can do with the solutions you’ve provided them. If you don’t, you could find yourself pushing a frustrating hassle on your team—instead of a beneficial new means for them to accomplish their objectives—potentially frustrating them and leading them to push back.

This kind of training will need to be ongoing to get the most out of your solutions, especially as they improve over time. Make sure you leave yourself open to questions and offer your support to your team as they work.

Price Compare

Prices for anything can rise and fall, which creates more opportune times to invest in the solutions you need. Naturally, many solutions will be introduced at a high price and become less of a financial burden over time as the technology improves. Just consider it—video conferencing once required businesses to invest a ton of money into the infrastructure it demanded, and now it’s built into every smartphone available. Being an early adopter can sometimes be beneficial, but it often pays off to wait a little while for demand to settle and prices to level out.

Invest Prudently

Finally, it’s important that you streamline your investments by focusing on those investments that can benefit your operations the most. Consider what could come from each of your potential improvements and which would do the most for your business. That should be the first thing you invest in, and what you build your later investments upon. While this may be some basic advice, it is no less effective for it.

Friday, December 4, 2020

How to Ensure Your Remote Workforce Isn’t Making You Vulnerable

 Considering the current popularity of remote operations, the security of your business’ resources should be one of your greatest concerns. While this process isn’t necessarily easy, it isn’t something you can afford to neglect. Let’s take a few moments and walk through some of the most critical considerations to your office and its data security.


Acknowledging the Threat

First off, it is important to recognize that chances are good that your business will be attacked in one way or another, particularly when people are working remotely. Consider how well you’ve secured your business’ network infrastructure—what are the chances that your team members have done the same in their homes? There are also many threats that specifically target many of the applications that are commonly used for remote work.

When implementing remote work, the most important thing is to acknowledge that your team members are at a greater risk than otherwise. This makes it even more vital that they are prioritizing the best practices that will help keep them secure.

Insulate Sensitive Information

Some of your business’ data is bound to be of a more private, personally identifiable nature. This kind of information needs to be particularly protected, denying any without authorization access to things like passwords, payment cards, or email addresses. Applying role-based access requirements and similar prerequisites helps to limit the data an employee can see; and by extension, a cybercriminal can access through them.

It also doesn’t hurt to require your team to connect to your infrastructure, rather than pulling data to their own devices. That way, any changes they make will be stored centrally, not on their individual device.

Use a Virtual Private Network

Speaking of connecting to your infrastructure, a virtual private network helps to protect your data from spying eyes as your team members work remotely. While it isn’t a cybersecurity cure-all, you can at least know that the encryption of the VPN is keeping your data safe in transit.

Require Multiple Forms of Authentication

Hearkening back to the access controls we discussed earlier, you should always have your data storage protected with the most secure solutions available. Multi-factor authentication—or requiring more than just a remembered password along with their username—has become a popular choice, with options ranging from one-time generated access codes to biometrics. This helps you keep your data locked down and inaccessible to all except those whose roles call for it.

Does remote work make your security a little more challenging to ensure? Sure, but during a time when the safest way to operate is remotely, the little extra effort now will be well worth it in the long term. If you would like assistance in implementing any of these security features into your remote operations, or any other IT business utility, make sure to call Net It On at (732) 360-2999. We’re happy to help.

Monday, November 30, 2020

The Four Corners Your Network Security Needs to Cover

 Network security is paramount to a business’ success with the number of security incidents and data breaches that could potentially upend it. While this sounds like a task of marginally epic proportions, managing your security can be greatly simplified via a few basic activities. Let’s go over four such security-boosting actions that you should direct your attention to.


Patch Management

Despite being an essential tool for business use, software can always be improved… as evidenced by the endless stream of updates and patches that software developers release. Cybercriminals have taken notice and will try to use these software issues to their advantage. This is what makes it so important to promptly install the update packages that will resolve these vulnerabilities and prevent them from causing any ill effects.

While many businesses will test the update before implementing it—assuming that their patches are managed at all—these tests need to be completed expeditiously to avoid as many risks as possible.

Device Control

If a device connects to your network, you need to have some say over its security. This needs to be a universal policy with both company-owned devices and those that belong to your employees. This will enable you to prevent any vulnerabilities from gaining access to your business by coming in on devices that have connected to an insecure network in the past.

With more people than ever before now working remotely, you need to make sure that all your team members can complete their responsibilities without undermining your security. As their home networks are likely far less secure than your business one should be, implementing a virtual private network should be seen as a priority.

Benchmarking

You need to keep track of the solutions you are using, and how well the security you have implemented is protecting your solutions. Accomplishing this is as simple as comparing your own performance with that which should be expected with the protections you’ve put in place. These evaluations can provide the data you need to inform your security improvements so that the largest vulnerabilities you possess can be resolved expeditiously.

Identity Management

Finally, we need to discuss how well your users and their permissions are managed. Controlling access to different data by virtue of an employee’s need to access said data can offer considerable benefits to your overall security.

As for how these permissions should be granted, many security professionals will recommend that you require multiple authentication measures to be provided before allowing access, rather than a password requirement alone. Shifting to multi-factor authentication will help keep unwanted visitors out of your systems by making it far more difficult for them to obtain and input the proper credentials in time. Some common MFA approaches include the use of time-sensitive generated codes also being required for account access, or the use of a physical security key or biometric pattern.

Let’s Look at Some Inexpensive Smartphone Options

 Two weeks ago we had a look at the flagships. Last week, we took a look at the new foldable and flippable smartphones, but what if you don’t have $1,000 to buy a device? Are your options severely limited? Let’s take a look at some of your options.


Samsung Galaxy A51

Samsung’s Galaxy A-series devices span the entirety of specification options, but we’re going to look at the moderately-priced Samsung Galaxy A51. The Galaxy A51 has a 6.5-inch Super AMOLED display and features a Exynos 9611 processor. With options between four-and-eight gigs of RAM, the expandable storage, the in-display fingerprint readers, the 3.5mm headphone jack and the largeish 4,000 mAh battery the Galaxy A51 presents users a good option if they are looking to avoid spending the big bucks. Available in Prism Crush Black, Prism Crush White, Prism Crush Blue, or Prism Crush Pink, the Galaxy A51 can be found on most major carriers and unlocked online.

Samsung Galaxy A51
Body: Plastic with Gorilla Glass 3 front, plastic back
Display: 6.5-inch Super AMOLED (~405 ppi)
OS: Android 10
Chipset: Octa-core Exynos 9611
Memory: 4-8 GB RAM
Expandable Memory: microSDXC
Cameras: Rear - 48 MP (wide), 12 MP (ultrawide, 5 MP (macro, 5 MP (depth); Front - 32 MP (wide)
Sounds: Loudspeaker, 3.5mm headphone jack
Battery (endurance rating): 4,000 mAh (86 hours)
Security: In-display fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant
Other versions: Samsung Galaxy A-series

Apple iPhone SE

If you think you’ve seen the 2020 version of the iPhone SE before, it’s because you probably have. It has the body of the iPhone 8, the chipset from the iPhone 11, and a new camera setup that will outperform the lion’s share of devices in the budget category. If you take away the 4.7-inch Retina display, the iPhone SE may bring more value than any other budget phone.

The iPhone SE only comes with two cameras, one front and one selfie, but the optics on the 12 megapixel lens, combined with iOS optimization, users will get a solid performing camera experience. Available in black, white, and red, the iPhone SE is great for the smartphone user that doesn’t need a huge screen to accomplish what they need to accomplish. 

Apple iPhone SE (2020)
Body: Aluminum with Gorilla Glass front and back
Display: 4.7-inch Retina IPS LCD (~326 ppi)
OS: iOS 13
Chipset: Apple A13 Bionic 
Memory: 3 GB RAM
Expandable Memory: No
Cameras: Rear - 12 MP (wide); Front - 7 MP
Sounds: Stereo Speakers, No Headphone Jack
Battery (endurance rating): 4,500 mAh (87 hours)
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Compass, Siri assistant
Other versions: none

Google Pixel 4a 5G

The Google Pixel 4a 5G sits firmly in budget smartphone territory. It features an impressive 6.2-inch OLED display, 5G capability and the same amazing camera setup as the Pixel 4, which was renowned as the best on any device in 2019. The Pixel 4a brings flagship-level experience to the budget smartphone. Available in Just Black and Clearly White, the Pixel 4a 5G is available in the Google store or from many major service carriers.

Google Pixel 4A 5G
Body: Plastic with Gorilla Glass 3 front and plastic back
Display: 6.2-inch OLED, HDR (~413 ppi)
OS: Android 11
Chipset: Qualcomm Snapdragon 765G
Memory: 6 GB RAM
Expandable Memory: No
Cameras: Rear - 12.2 MP (wide), 16 MP (ultra wide); Front - 8 MP (wide).
Sounds: Stereo Speakers, 3.5mm Headphone Jack
Battery: 3,885 mAh
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Google Assistant
Other versions: 4G LTE version

Past Flagship Phones

Before we finish our brief look at smartphones for the year, we should mention that one of the best ways to get value out of your smartphone is by buying new or refurbished flagship devices that are a cycle or two old. In fact, some smartphone companies release two iterations of their flagship phones each year and getting a mobile that is 18 months old isn’t going to deny you many features. Flagship smartphones tend to be built from better materials so they are more durable, and they tend to come with specs that will outpace many mid-level budget smartphones. 

If you consider buying a device that is a couple of years old, here are some great options: The Samsung Galaxy s9 and s9+, the LG V50 thinQ, or the iPhone X. One detrimental characteristic is that they probably won’t get as many software updates, and if they are refurbished or used, they could have issues that new devices wouldn’t have. Regardless, it is something that you should consider when weighing your options if you only want to spend a few hundred dollars on your next phone.

Windows 10’s Over 70% Market Share is Still Too Low

 Windows 10 has seen a slow growth in its market share since it first appeared in July 2015, still rising throughout 2020 to now. As of this October, the operating system had finally reached a 72.2 percent market share. Let’s discuss why this benchmark matters, and why you need to update any devices in your organization to bring that share up even more.


The Stats

As reported by Net Applications, Windows 10 is now installed in over 70 percent of all Windows-based desktop and laptop computers, with the Windows environment powering 88 percent of these devices in general. This massive market share isn’t surprising, given that most businesses prefer to work in Windows.

As this year has passed, Windows 10 specifically has seen an increase of 20 percent, accumulating an additional 10.7 to its total market share. At the same time, Windows 7 is now on 20.4 percent of computers and 23 percent of all Windows-based devices. While this accounts for a loss of about 31 percent of its total market share, these values remain too high, considering that Windows 7 reached its end of support back in January.

Why This Trend Needs to Continue

Here’s the situation: Microsoft has come out and said that—at least for the time being—Windows 10 is the de facto Windows operating system, and all further updates are going to be improvements to Windows 10 and its security. Meanwhile, Windows 7 and other aging operating systems will only become more vulnerable to attacks as time passes and new threats are developed.

This is precisely what makes it so important to upgrade your technology to Windows 10.

To pick on Windows 7 a little bit more, the operating system is now patently unsafe, which means that using it—especially in a business setting—is akin to high-stakes, low-payout gambling. In this way, the 23 percent share of Windows devices still using Windows 7 is about 24 percent too high.

Any amount of migration from Windows 7 to Windows 10 will ultimately be a benefit to cybersecurity in general, as it only takes a single insecure access point for a threat to overtake an entire system.

If you still have workstations that need to be upgraded to Windows 10, there’s little-to-no time left to waste. Reach out to us today at (732) 360-2999 to determine your best course of action concerning your information technology.