1815
paged,page-template,page-template-blog-large-image,page-template-blog-large-image-php,page,page-id-1815,page-parent,paged-5,page-paged-5,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Blog

Most Ransomware Victims Would Pay Up If Attacked Again

Ransomware is one of the fastest-growing cyber-crimes in the world. Last year, 37% of businesses were victims of an attack.

In case you didn’t know, a ransomware attack is where cybercriminals infiltrate your network (or device) and steal your data by encrypting it. The data is still there, but you can’t access it.

Then they demand you pay a large ransom fee for the encryption key.

If you don’t pay the demand (which can be tens or even hundreds of thousands), they delete your data.

It’s not just the cost of the ransom fee to worry about. There’s the stress, reputational damage, and downtime that goes with it. In 2021, the average downtime suffered after a ransomware attack was 22 days.

Official advice is not to pay any ransomware demands.

However, a new survey has shown that a massive 97% of business leaders who’ve experienced a ransomware attack in the past would pay up quickly if they were attacked again

A third of them would pay instantly.

What does that tell you about what a nightmare the whole thing is for any business?

The other problem is, that when you pay a ransomware demand, it’s not guaranteed that you’ll get your data back. On average, only 65% of data is restored once a fee is paid.

You may face further extortion. And by letting cyber criminals know that your business pays ransom fees, it’s likely that you’ll face subsequent attacks in the future.

So what’s the best way to deal with ransomware?

First, you should put in place the right security measures to try to prevent an attack:

  • Educate your people on cyber security and best practice
  • Implement multi-factor authorisation across all your applications
  • Use a password manager
  • Make sure all updates are installed quickly
  • And you should always have a working backup in place – ideally one where older data is retained and cannot be changed

It’s also a great idea to have a response and recovery plan that details what you will do in the event of a ransomware attack.

Not only will it mean your business can respond faster, but it should reduce the amount of downtime suffered as you’ve already considered exactly what needs to happen.

Keep Your Data Safe With These Backup Solutions

Data is an integral part of your business. You use it to build marketing strategies, forge customer relationships, and much more. Losing important client and company information can be harmful to the health of your business. Here are backup solutions you should ‌implement to ensure the safety of your data.

Tape drives

Tape drives are the oldest backup solution still in use today because they offer high-capacity data storage and are very cost-effective. Modern tape drives come with 114 TB native capacity and 360 TB compressed capacity, which is larger compared to most hard disk drives.

In addition, well-maintained tape drives can store data for over 30 years. Other devices, such as hard drives, become less reliable overtime. Also, tape drives are stored offline, which means they’ll be safe should your business fall victim to an online attack.

External hard drives

An external hard drive is a portable hard drive that can be connected to a desktop or laptop through a USB port. External hard drives come in varying storage capacities ranging from 1 TB to 18 TB.

For companies that can’t afford multiple servers or cloud storage, external hard drives are a cost-effective way of backing up valuable data. External hard drives are portable and let you access your files even when you’re offline.

When using external hard drives, however, you need to update your backups regularly to include new files. Also, there’s a risk these devices can be misplaced or stolen if they are not stored in a secure location.

USB drives

USB drives are an inexpensive and simple data backup solution. While they don’t have the capacity of external hard drives or tape drives, newer flash drives can store up to 1 TB of data, making them the ideal option if you’re not planning to store a huge amount of files. And because USB flash drives have a compact design, they are easy to carry around.

USB drives are compatible with both PC and Mac devices as long as they have a USB port. Modern ones are designed with transfer speeds of up to 4.8 GB per second. This allows you to copy files faster compared to hard drives which only have a transfer rate of 150 MB per second. The only drawback with USB drives is that they can be misplaced easily, so be sure to store them in a safe and secure place after use.

Cloud storage

Cloud storage allows you to back up your data online. This reduces the need for physical storage, helping you cut down on hardware maintenance costs and office space. And since your data is stored online, you can access your files from anywhere with a stable internet connection. This makes file sharing easier, thus facilitating remote and hybrid setups, which became the norm during the COVID-19 pandemic.

In addition, most cloud providers offer encryption services to ensure only authorized personnel can access the stored data. Keep in mind, however, that there are still providers out there that do not have sufficient security protocols in place, exposing sensitive data to cyberthreats. So before you decide to use cloud storage, make sure the provider you choose is familiar with data regulation laws and uses the latest cybersecurity protocols to ensure the safety of your data.

Data backup may seem like a chore, but having copies of your files offline, off premises, or in the cloud will ensure the continuity of your business in the event of a disaster. Call our data backup experts today to learn more.

Windows 11: First Things To Set Up And Customize

Microsoft’s Windows 11 operating system offers a number of improvements over Windows 10, including a new Start menu and a more functional Taskbar. If you have just purchased a laptop running on Windows 11, or are planning to upgrade your current device, then you will need to know how to set it up. In this blog post, we will provide you with a guide on how to customize your Windows 11 laptop.

1. Set up how your device checks for updates

New laptops usually automatically check for updates, but you can also manually do this. Click the gear icon above the Start button to go to Settings, choose Windows Update, and then click Check for updates.

You can also type “updates” into the search box and click Check for updates.

2. Create a restore point

It is ideal to set up your laptop’s restore point, which is the backup of your entire operating system. Doing this can save you a lot of time, effort, and even money in case something goes wrong with your device.

To set up a restore point, simply type “restore” into the search bar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window. From there, you can choose what you want to be included in the backup. Click the Configure button to apply your choices. Enable “Turn on system protection” if it’s not already on. Finally, choose how much disk space to reserve, which is ideally not more than 2–3% of your total disk space.

3. Choose a power plan

To help prolong your laptop’s battery life, you can choose from Windows 11’s Power Saver, High Performance, and Balanced power plans. Type “power plan” in the search button and choose either “Edit power plan” or “Choose a power plan.” Choosing the Edit power plan option allows you to set when the laptop display will be automatically turned off and when it will go to sleep. When you pick “Choose a power plan,” it will take you to a page where you can create and customize your power settings.

The default recommended plan is Balanced, but if you want to create your own, click on the “Create a power plan” option on the left part of the screen. You can choose from three options depending on how you plan to use your laptop: Balanced, Power Saver, and High Performance. After selecting your preferred plan, give your new power plan a name, then click Next to set the display and sleep settings for your laptop. Once done choosing your preferred power settings, click on Create and you’re good to go.

4. Set app installation tolerance level

For added security, you can restrict which apps can be installed on your laptop. Do this by going to Settings > Apps > Apps & features. From here, you can configure the “Choose from where to get apps” settings. You can choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.

5. Remove bloatware

Some vendors package new laptops with bundled apps and software, which are mostly unnecessary and unwanted programs called bloatware.

Windows 11 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t need. Head to Settings > Apps > Apps & features and peruse the list of installed apps. If you don’t want an app and are 100% certain that your computer doesn’t need it, click on the hamburger menu to the right of the app, then choose Uninstall.

6. Activate anti-ransomware

Ransomware is a form of malicious software that locks all your data until you pay a ransom to hackers.

To minimize the risk of ransomware attacks, type “Windows Security” into the search bar at the bottom of your screen and click on the Windows Security result. Go to Virus & threat protection, click Manage settings under “Virus & threat protection settings”, and go to “Controlled folder access”. From there, click the Manage Controlled folder access option and enable Controlled folder access; this protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add other folders that you’d like to be protected from ransomware.

There are myriad ways Windows 11 can be configured for optimization and security. This article barely scratches the surface of Window 11’s security and efficiency settings. Call us today for a quick chat with one of our Microsoft experts about taking your operating system to the next level.

Here Are Three Big Companies Working On Passwordless Login Options

Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks.

Despite years of training, re-training, and near-constant reminders to strengthen passwords, users keep making the same mistakes.

They’ll re-use the same password across multiple properties. They may use an incredibly weak and easy to guess password that makes it easy for hackers to break in using simple brute force attacks against their accounts.

If passwords were to simply go away and be replaced by something better, legions of IT security folks would breathe a tremendous sigh of relief.

If Apple, Google, and Microsoft have anything to say about the matter, that is soon to be a reality.  All three companies are hard at work on a variety of passwordless schemes. If their plans remain on track, we’ll get to see the fruits of their labor sometime next year.

The three companies are currently working to implement passwordless FIDO sign-in standards across Android, Chrome, iOS, macOS, Safari, Windows, and Edge.  Taken together, those systems and software packages account for some 90 percent of network traffic today. It won’t be long now before the devices users employ will store a FIDO credential, dubbed a passkey, which is used to unlock your device and access all of your online accounts.

The passkey scheme is substantially more secure than a simple password because it’s protected with powerful cryptography and only shown to your online account when you unlock your device.  Contrast that with passwords, which leave users vulnerable to all manner of phishing schemes and are subject to being weakened by bad habits developed by the users themselves.

All of that is good news but it should be noted that we haven’t seen it in action yet. Even after the Big Three finish their work, there’s still the considerable task of implementing the use of the new passkeys into websites and other applications. It will be a while yet, but the good news is change is coming.

Is Your Business Making These Cyber Security Mistakes?

It feels like every day we’re being warned about a new threat to our cyber security, doesn’t it?

That’s for good reason. Last year, ransomware attacks alone affected 81% of businesses.

And the cost of cyber-crime is estimated to hit $10.5 trillion by 2025, according to the ‘2022 Cybersecurity Almanac’.

But we’re still seeing far too many businesses that aren’t taking this threat seriously.

It’s not only your data that you could lose if your company falls victim to a cyber-attack. The cost of remediation or mitigation can run into tens of thousands.

And at the same time you’ll suffer an average of 21 days downtime after a cyber-attack. Imagine… 21 days without being able to use all your business technology as normal. It doesn’t bear thinking about.

That’s not to mention the loss of trust your clients have in you, which could lead to you losing their custom.

It’s really important that your business is taking appropriate steps to keep your data safe and secure.

That most likely means a layered approach to your security. This is where several solutions are used, which work together to give you a level of protection appropriate to your business.

This reduces your risk of being attacked. And makes recovery easier should you fall victim.

It’s worth pointing out that you will never be able to keep your business 100% protected from cyber-attacks. Not without totally locking down every system, to the point where it would be very difficult to do business (and your staff would constantly be looking for ways around the enhanced security).

No, the key to excellent cyber security is striking the right balance between protection and usability.

There are three mistakes that are most commonly made by businesses – and they’re also some of the most dangerous mistakes to make.

Is your business making any of these?

Mistake 1) Not restricting access

Different employees will have different needs when accessing company files and applications. If you allow everyone access to everything it opens up your entire network to criminals.

You should also make sure to change access rights when someone changes roles, and revoke them when they leave.

Mistake 2) Allowing lateral movement

If cyber criminals gain access to a computer used by a member of your admin team, that in itself might not be a disaster.

But what if they could move from your admin system to your invoicing system… and from there to your CRM… and then into someone’s email account?

This is known as lateral movement. The criminals gain access to one system and work their way into more sensitive systems.

If they can get into the email of someone who has admin rights to other systems or even the company bank account, they can start resetting passwords and locking out other people.

Scary stuff.

One strategy against this is called air gapping. It means that there’s no direct access from one part of your network to another.

Mistake 3) Not planning and protecting

Businesses that work closely with their IT partner to prepare and protect are less likely to be attacked in the first place.

And will be back on their feet faster if the worst does happen.

You should also have an up-to-date plan in place that details what to do, should an attack happen.

This will significantly shorten the amount of time it takes to respond to an attack. That means you’ll limit your data loss and the cost of putting things right again.

If you know you’re making one (two, or even three) of these mistakes in your business, you need to act quickly. We can help.

Give Net Activity a call, and we’ll review your current security arrangements.

5G: What You Need To Know About The Future Of Business VoIP Systems

Fifth-generation technology, or 5G, will significantly enhance the performance of your business’s Voice over Internet Protocol (VoIP) systems. That’s because 5G networks have much higher speeds, greater capacity, and reduced latency than 4G LTE networks. This means that businesses can enjoy crystal-clear voice quality and low call latency no matter what device or where they make calls. Here are three ways to take advantage of 5G for your VoIP system.

Explore VR and AR

With 5G network speeds, virtual and augmented reality can become more common for many small- and medium-sized businesses (SMBs). 5G easily surpasses 4G’s Gbps (gigabits per second) limit, which is currently holding back businesses’ adoption of virtual reality (VR) and augmented reality (AR) applications.

VR and AR need to process significantly more data because of the visuals they must process as users move, and this puts an enormous strain on mobile networks. 5G is set to ensure a better user experience by facilitating smoother connections and preventing network delays that can affect your bottom line.

Improved video conferencing

One of the major hindrances to smooth web and video conferencing is slow network data transfer. Fortunately, innovations like Web Real-Time Communication and 5G networks can enhance VoIP for businesses by providing open and stable streaming as well as sufficient transfer speeds. These will allow businesses to view higher-quality videos, even those at 4K and 8K resolution.

Beyond improved streaming quality, 5G networks will also be able to support video calls with a larger number of participants, which is timely, considering the current shift to remote working.

Utilize mobile VoIP

VoIP calls heavily rely on sufficient download and upload speeds. For example, mobile VoIP users may experience unstable and poor call connectivity and clarity when their 4G networks are limited to 12 Mbps upload and 2 Mbps download speeds. These limitations could also lead to packet loss. Packet loss happens when one or more “packets” of data traveling across a computer network fail to reach their destination, which is typically caused by network congestion. Packet loss reduces audio/video quality and can even cause calls to be dropped, leading to a poor VoIP experience. But thanks to 5G’s greater speed, packet loss can be prevented.

Moreover, 4G network providers set a fixed amount of bandwidth for every direction it transmits a signal to. But unlike 4G, the 5G bandwidth can be adjusted on the fly. This means that 5G network providers can allocate bandwidth to mitigate congestion. In practical terms, businesses could reach their customers even if the latter are in crowded places that normally max out 4G mobile network capacity constraints, like in football stadiums or airports.

When your business decides to adopt the up-and-coming 5G network, you can expect to see significant VoIP improvements. If you’re looking to set up a VoIP system for your business, call or email Net Activity today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room