1815
paged,page-template,page-template-blog-large-image,page-template-blog-large-image-php,page,page-id-1815,page-parent,paged-19,page-paged-19,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Blog

6 Ways To Strengthen Your BYOD Security

Many businesses are adopting bring your own device (BYOD) policies as more employees work from home. The problem is, if you’re not careful, BYOD can expose your company to major cybersecurity risks, including the following.

Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, as well as the data stored in them, being lost or stolen.

Man-in-the-middle (MITM) attacks – Cybercriminals can intercept information transmitted from employees’ devices if these are connected to poorly secured public Wi-Fi networks.

Jailbroken devices – Jailbreaking is the process of removing the restrictions imposed by the manufacturer of a device, typically to allow the installation of unauthorized third-party software. This increases the risk of an employee inadvertently installing malicious software on a personal device.

Security vulnerabilities – If employees have outdated operating systems and software on their devices, cybercriminals can exploit unpatched vulnerabilities to gain unfettered access to company systems

Malware – A personal device that has been infected with malware can spread that malware to other devices that are connected to the company network and cause data loss and downtime.

 

To mitigate these risks, you must devise a BYOD security policy that works for the needs of your business as well as the needs of your employees. Here’s what you need to do:

  1. Set passwords on all BYOD devices

Prevent unauthorized access to company data by enforcing the use of passwords on all employee devices and accounts. Passwords should be unique; contain letters, numbers, and symbols; and are at least 12 characters long. It’s also a good idea to implement multifactor authentication to add another method of identity verification such as fingerprint scans or temporary passcodes sent via email.

 

  1. Blacklist unsanctioned applications

Blacklisting involves prohibiting the installation of certain applications on BYOD devices that are used for work purposes. This includes applications like games, social networking apps, and third-party file sharing platforms. The simplest way to blacklist applications is through a mobile device management platform that enables IT administrators to secure and enforce policies on enrolled devices.

 

  1. Restrict data access

Adopt the principle of least privilege on both BYOD and company devices. This means that a user is able to access only the data and software required to do their job. This can reduce the effects of certain types of malware and limit the fallout in the event of a data breach.

 

  1. Invest in anti-malware software

Anti-malware software identifies and removes malware before they cause irreparable harm to a device. The best anti-malware programs are often backed by the latest threat intelligence databases and use behavior-based detection techniques to pick up any traces of malware.

 

  1. Backing up device data

A well-thought-out BYOD policy can go a long way toward minimizing the risk of a security breach, but if something manages to slip past your defenses, you need to have backups prepared. Back up your data in off-site servers and in the cloud to ensure that any data stored locally on a device can be quickly recovered.

 

  1. Educate your staff about security

The vast majority of BYOD-related security risks involve human error. This is why you should educate your employees about proper mobile safety. Train them on spotting apps that could contain malware, sharing security threat updates, and securing their devices beyond enabling default security settings.

 

You should also approach us if you need assistance with protecting your BYOD environment. As a managed IT services provider, Net Activity keeps tabs on the latest trends and innovations related to BYOD and will recommend solutions that work for your company. Contact us today to see how we can help.

6 Ways to Save Energy With Your PC

It may be difficult to save energy when you use your PC every day. In fact, a complete desktop computer setup (i.e., one that includes an internet modem, a pair of loudspeakers, and a printer) that is on for eight hours a day consumes 600 kWh per year. But don’t worry, you can use the following tips to reduce your PC power consumption.

1. Unplug your computer when not in use

When you’re not using your computer, it’s best to shut it down and unplug it. This is because a plugged-in PC — even when switched off — still consumes standby power.

2. Disconnect external devices

When they’re connected to your PC, devices such as printers, headphones, and webcams consume power even when they’re not in use. This is why you should disconnect or remove external devices from your PC once you’re done using them.

3. Alternatively, use a smart strip, especially for computers you cannot turn off

A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. It can electronically unplug any device so that they stop drawing current, which saves energy. By connecting your PC and peripherals (e.g., printers, scanners) to the smart strip, you won’t need to unplug your equipment when you’re not using them.

4. Adjust your computer’s energy settings

Adjusting your PC’s power settings will help you consume less energy. For example, you can opt to put your hard drive and monitor into sleep mode when they’re left idle for a few minutes. Lowering the brightness of your screen also saves electricity.

5. Use a charger only when your laptop is charging

When we charge our laptops, we tend to forget about them, leaving them plugged in for hours. Unfortunately, overcharging degrades the battery over time. Leaving the charger plugged in — even if it’s not connected to your computer — also consumes standby power.

To save energy, make sure to unplug your laptop charger once you’re done charging. Alternatively, you can use a wall outlet with a timer or plug your charger into a smart strip.

6. Choose an Energy Star-compliant PC

Energy Star is the US Environmental Protection Agency’s symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver both quality performance and energy savings. The more stars a product has, the more energy-efficient it is. Studies show that a single Energy Star-compliant computer and monitor can save between $7 and $52 per year in electricity bills.

These tips should help you lower your electricity costs and make smart hardware choices. If you need assistance in choosing the best hardware for your specific needs, give us a call. We’ll be glad to help.

Increase Your Organization’s Productivity With Workplace Analytics

Microsoft Workplace Analytics is a powerful tool that gathers data from Office 365 applications such as Word, Excel, and Outlook, gleaning insights about your employees’ performance. This solution provides a better understanding of how every member of your team spends their time at work and helps improve both employee engagement and productivity.

How does Workplace Analytics work?

A paid add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from emails, calendars, documents, and Office 365 apps. This means any data an employee enters into Office 365 can be used to assess their performance and productivity.

The data from which insights are gleaned are generated by employees themselves — how much time they spend on meetings, who they communicate with, and how much time they spend on productive tasks.

All this data can be viewed on the Workplace Analytics dashboard, where information is sorted using the following metrics:

  • Week in the life provides information on how the entire organization spends time and how employees collaborate with one another.
  • Meetings overview shows the amount of time people spend in meetings.
  • Management and coaching presents information about one-on-one meetings between each employee and their direct manager.
  • The internal networks metric shows how people within your organization communicate and collaborate with one another.
  • External collaboration provides insights into how your employees connect with individuals or teams from third-party organizations.
  • Teams collaboration takes a look at how employees and managers use Microsoft Teams to communicate with their colleagues.

 

What does Workplace Analytics aim to do?

Workplace Analytics is designed to solve businesses’ most common problems, specifically issues related to productivity and engagement.

Using Workplace Analytics data, business leaders can develop effective productivity strategies for the entire company. For instance, if the data shows that employees spend 60% of their time in meetings, managers can come up with a strategy to make meetings shorter or less frequent so staff can focus on productive tasks. Similarly, human resources personnel can use data on employees’ work patterns to identify the causes of burnout — now a widespread issue across businesses and industries — and make recommendations to address it.

Workplace Analytics can be also used to determine how workers collaborate with internal and external parties. Suppose a member of your sales team frequently works and communicates with certain vendors. The sales team’s manager can pull up Workplace Analytics data and use it to assess whether or not this collaboration is helping the team meet targets, or if it’s causing them to miss out on other, more critical opportunities for collaboration and/or making a sale. Based on this information, the manager can also identify which employees are most likely to meet or exceed their targets and set company-wide standards accordingly.

Finally, Workplace Analytics allows managers to determine an employee’s level of engagement, and whether workloads are fairly distributed among workers and/or departments.

To ensure you get the full benefits of Workplace Analytics, partner with a reputable managed IT services provider like us. Net Activity’s experts are highly skilled and experienced in implementing and managing Microsoft programs and services, so you can rest easy knowing your business is in good hands. Reach out to us anytime.

How do sites with HTTPS make web browsing secure?

If you shop online like many people, you need to make sure that the site’s payment page has HTTPS in its URL. Otherwise, entering your personal and financial information on this page can expose you to risks such as identity theft. Read on to find out why HTTPS makes for a safer online browsing experience.

HTTPS encryption

The “S” in HTTPS stands for “secured.” It was introduced in 1995, so older websites that have been left on their own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them.

When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and your computer can view them as is. Cybercriminals know this, and they can exploit this fact to gain access to your Social Security number, credit card information, and other personal data. This puts you at risk of identity theft and other fraudulent activities.

HTTPS certificates

When you visit a website, your computer uses an online directory to translate its alphanumeric name into a numerical address. It then saves that information on your computer so that it doesn’t have to check the online directory every time you visit the same website.

In case your computer gets compromised, it could be manipulated into directing a perfectly safe web address like www.google.com to a malicious website. Most of the time, users are sent to sites that look exactly like the legitimate site but are actually fake copies designed to trick them into divulging their credentials.

To prevent such incidents from happening, the online directories mentioned earlier issue an ecosystem of certificates that turn HTTP into HTTPS, making it impossible for anyone to be redirected to a fraudulent website.

How does this affect our daily browsing habits?

We often visit a multitude of websites in a short period of time without checking each one for padlocks and certificates. Unfortunately, we can’t ignore the importance of HTTPS, so here are a few things to consider the next time you browse the internet:

  • If your browser marks a website as “unsafe,” think twice about clicking “Proceed anyway.” Click the prompt only if you are absolutely certain no confidential data will be transmitted.
  • Add web browser extensions such as HTTPS Everywhere that create encrypted connections to unencrypted websites. These extensions encrypt your communication with websites and are compatible with Chrome, Firefox, and Edge browsers.
  • Always be vigilant. Some sites may have HTTPS, but it doesn’t mean they’re safe. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but the misspelling clearly indicates that it’s an untrustworthy site. Cybercriminals use similar spellings of authentic websites to fool people into thinking that they’re on a secure site. This is called typosquatting or URL hijacking.
  • And perhaps, just follow the easiest step of all: avoid sites that don’t use the HTTPS prefix.

If you want to learn more about safer browsing habits and endpoint security, give our office a call.

Is Your Employees’ Social Media Behavior Impacting Your Business?

Social media: love it or hate it, it has transitioned from a casual pastime to a business necessity in the relatively few years it has been around. However, as beneficial as it can be to your business’ efforts, it can easily have the opposite effect if it isn’t used appropriately. 

Let’s explore this increasingly complicated topic, including what needs to be done to ensure that your business’s social media presence isn’t actually harming its success. We recommend that you also share this information with your employees, even directing them to this blog to read it for themselves.

What Are You (and Your Employees) Comfortable with Sharing?

It is fair to say that a business is representative of the people who work in it and vice versa. This is why it is so important to establish a culture within your organization beyond a unified stance on cybersecurity or the ways that you keep your team members motivated. 

This relationship is also precisely why it is so crucial for there to be an understanding of appropriate social media use.

While we’ve long been proponents of maintaining a proper work/life balance—especially when working from home—some elements simply can’t be completely separated from one another. One of these elements is the impression that can be generated in response to behavior on social media… whether it’s the behavior presented on your business’ official profile, or on the personal profiles that your employees maintain for themselves.

This behavior can result in serious consequences that directly affect the business’ success, which means that you will need to address this behavior to the best of your ability… even if that ultimately means that an employee is let go for what they’ve posted on social media.

“This Sounds Like an Infringement of My First Amendment Rights!”

Many would argue that the first adjustment made to the United States Constitution would bar an employer from restricting what an employee can say on social media or terminating their employment due to their online activity. As it turns out, this is not the case.

For the sake of clarification, let’s consider the actual text involved in Amendment I:

“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

While the Amendment strictly bars Congress from legislating control over the populace in these matters, nothing there dictates that a business cannot prohibit an employee from publicizing a particular view or that bars the business from levying out consequences should these views be publicized. In plain English, the First Amendment applies to the government and the government alone. Businesses can set conduct expectations as they please.

Speaking of which, it is important to outline a few practices that your team members should follow as they engage on their social media accounts (and that you should subscribe to with your business’s social media activity as well). While social media grants an incredible amount of power, it also comes with great responsibility and consequences.

Social Media Practices Every Business (and User) Needs to Follow

Be Extra Considerate About Images and Other Media You Post

There are a few reasons that everyone associated with a business needs to think before they share something online. Let’s consider the business side of things first.

Have you ever taken a photo that looked passable enough at first glance but featured something that you would have really rather not preserved in a photograph on further inspection? The Internet is filled with such unintentional photobombs, making it clear that even glaring details can be missed at the moment.

For example, when in the office, sharing pictures of your team hard at work or otherwise interacting with one another can help personalize your team and engage your social media followers that much more. However, if sensitive data happens to be visible on a screen in an image, your social media account would suddenly be classifiable as a data leak.

As for your team members, make sure they are cognizant of their role as a representation of your business as a whole. Even in their off-hours, they remain one of your team members, so sharing inappropriate images on their social media ultimately reflects poorly on your organization as well. 

Remember That the Internet Never Really Forgets

Even when it’s posted on a personal account, the content that your team members share reflects on your business as well. Unfortunately, if someone enjoys stirring the pot online, any ill feelings felt about them could leach back to your business’ reputation by proxy… and even if they delete their more inflammatory posts at some point, they won’t really be completely gone. The reality is that there are dangerous consequences of posting pics.

This also ties back to our previous point, in that an employee talking too freely on social media about their work could easily expose data and information that should have remained private. Regardless of the time they are using social media, they need to keep the workplace in mind and conduct themselves accordingly.

Keep a Level Head

Likewise, social media is not the place to lose one’s temper, either as a representative of oneself or of a business. As we’ve established, online trolls are a very real thing, and it isn’t unheard of for people to get fired up about a difference in opinion. While I wish I didn’t have to say it, a business should never lash out at anyone online. There’s a difference between getting angry, and simply caring a whole lot and expressing it appropriately. Your business and, once again by proxy, your team members should always default to the latter option.

Don’t Share Your Passwords

Seriously, just don’t. Also, you and your team members should be following the same best practices at home as we recommend in the office—using a different password for each proof of identity, ensuring that these passwords are strong enough, and otherwise boosting how effective your authentication measures are. While passwords may not be totally effective on their own at preventing breaches, there is no reason to make it simple for an unauthorized person to get in.

Watch Out for Phishing Attempts

While phishing may be most commonly associated with email, social media posts and ads can also be used to swindle an employee. Your team needs to understand more than just how to spot a potential phishing attack… they need to be aware that these kinds of attacks can come from all angles.

This is Why You Need to Establish a Social Media Policy

Like any other of your business’ assorted requirements, your team members should be made aware of the expectations you have of their conduct on these platforms while they are under your employ. Not only should this policy lay out the rules they are to follow, but it should also clearly describe the consequences of noncompliance. While this may seem excessive, you must insulate your business from untoward influence or scrutiny by association.

It is not unusual for team members to not understand where the lines are and how much leeway an employer has. For example, many remote workers wonder whether or not their boss can monitor their work habits via a webcam. The answer to this question is based on many factors, most importantly what you agreed to when you signed your employment agreement. The same concept applies to your social media presence.

While there will never be a perfectly clean split between an individual’s professional and personal life, you should still try to encourage your team members to separate them as much as possible… particularly on social media.

 

Why All Businesses Should Implement a Virtual Private Network

With the onset of the COVID-19 pandemic, many organizations were forced to transition to remote work, even though they would have preferred to keep operations within the office. While the transition was rough at first, these organizations may have found that remote work offers certain flexibilities that were impossible in the traditional office environment. That said, one looming threat was (and still is) a major concern for the remote workplace: security.

One of the major ways businesses can protect their organization while working remotely is through the use of a virtual private network or VPN.

What is a VPN?

When you connect your device to a virtual private network, what exactly is happening to the connection? It’s actually much more simple than it sounds; what it boils down to is that the device connects to an encrypted network over the Internet. This encryption allows for the secure transfer of data to and from the device, preventing onlookers from observing (or stealing) the data.

Think about it like looking at a pipe that is transferring something to and from a location. If the outside of the pipe is solid, onlookers cannot see what is in the pipe. When it is clear, you can see exactly what is inside it. Encryption in this case acts as an opaque pipe, obfuscating contents to the point where they cannot be seen clearly, but you still know that something is there. In VPN terminology, the pipe in the above scenario is referred to as a “tunnel.”

How Does It Help Your Business?

You can see how this would benefit the remote employee. Since the employee is not in-house working on the company network, they do not have access to the in-house security solutions that you may have implemented to keep your data safe. This is why encryption is so necessary; if you fail to protect your company’s assets through unsecured connections to your network, you are unnecessarily risking your company’s future.

Now, think about the possibilities that open up when you don’t have to worry about network security while out of the office. Employees can travel for business trips (when it’s safe to do so, of course) without fear of data being stolen while communicating with your home office. They can perform work from anywhere at any time, allowing for enhanced productivity without sacrificing security. They will not need to rely on public Wi-Fi connections or other unsecured networks to connect to your office.

We don’t want to beat a dead horse, but it just makes sense to implement a VPN from a security and longevity standpoint.

Get Started with a VPN Today

If you are ready to take the leap and implement a virtual private network for your business, don’t wait any longer. Net Activity can help you deploy a solution that is specific to the needs of your organization. We’ll work with you to get the most secure solution at the best price point. To learn more about how a virtual private network can benefit your business, reach out to us at 216-503-5150.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room