3
privacy-policy,paged,page-template-default,page,page-id-3,paged-3,page-paged-3,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Privacy Policy

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

How Two-Factor And Two-Step Authentication Can Improve Your Security

Data breaches are becoming more prevalent these days. In order to keep your business safe from data breaches, you need to step up your security measures. One of the best ways to strengthen your security is by implementing a two-factor or a two-step authentication process. These authentication methods may sound the same, but they are actually two different processes. Read on to learn more about the difference between two-factor authentication and two-step authentication.

According to the Allianz Risk Barometer, businesses are more worried about cybersecurity threats compared to other business disruptions like supply chain issues, natural disasters, or even the COVID-19 pandemic. This is why business owners are ramping up data security measures. One way they do this is by implementing two-factor and two-step authentication. Many businesses use the two terms interchangeably, but these processes are quite different.

Two-factor authentication

Two-factor authentication (2FA) is a security measure used to ensure that people trying to access a system are who they say they are. 2FA requires users to provide two pieces of information before being granted access.

When you try to log in to a system that uses 2FA, you’ll be asked to provide not only your password but also another piece of information or form of identification. This second factor can be something you know, like a PIN or a security question, or something you have, like a physical token or key fob. If you have the correct password and the second piece of information, then you’ll be granted access to the system. Because of the additional authentication information required, hackers would have great difficulty breaking into a network using a 2FA system.

Two-step authentication

Two-step authentication (2SA) is an extra layer of security that can be added to your online accounts. 2SA requires you to enter both your password and a code that is sent to your phone or email before you can log in.

Adding 2SA to your online accounts can help protect your information from being hacked. Even if a hacker knows your username and password, they will still need the code that is sent to your phone or email before they can log in to your account.

There are a few different ways to set up 2SA. Some websites, like Google and Facebook, offer 2SA as an additional security measure that is especially useful when you or someone else is trying to log in using a new or different device. Others, like Dropbox and Twitter, require you to set up your authentication profile in the settings page before you can use their app. A 2SA setup is typically quick and easy, and only requires you to have your phone or email immediately accessible when you log in.

Which one is better?

Relying on a single-factor authentication process is no longer sufficient in ensuring the safety of your network. Securing the authentication process and making it difficult for cybercriminals to access your network should be on top of your priorities. Deciding whether to use two-step or two-factor authentication largely depends on your business’s specific security requirements. To take the stress out of choosing which between the two methods better suits your needs, call us today for expert cybersecurity advice.

Microsoft Help Files Are Being Used To Distribute This Spyware

Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing.

Apparently, a group of hackers are trying a new approach to distribute their malicious code which is leveraging Microsoft’s HTML help files.

Yes, you read that correctly.  It’s an innovative technique that’s not only proving to be surprisingly effective, it is also proving to be notoriously difficult to detect. Even worse is that it’s not even a terribly sophisticated attack.

Here’s an overview of how it works:

Naturally, it begins with an email.  The email contains a generic subject line and an attachment, often entitled “Reques.doc” or similar.

This file is not a doc, but an .iso file.  A disk image.  The image contains a pair of files.  One of them is a Microsoft Compiled HTML Help file (CHM) and the other is an executable.

By exploiting the capabilities of the help file, the executable can install its malicious payload. In this case it is a malware strain called Vidar.

Vidar then establishes a link to its command-and-control server via Mastodon, which is a multi-platform open-source social networking system.  Once that connection has been established, Vidar goes to work harvesting user data from the infected system and exfiltrating it to the command-and-control server.

In at least one confirmed instance, Vidar was also spotted downloading and executing additional malware payloads.

Sophisticated or not, this new campaign has proved to be highly effective. Given that Vidar can serve as how other malware payloads wind up on an infected machine, this should be regarded as a serious threat.  Those “other payloads” could be anything from ransomware which will lock all the files on your network, to malicious code that has been optimized to steal banking information and everything in between.

Be sure your employees, friends, and family are aware and on their guard.  This is a nasty piece of code.

Ever Wonder If Your Apps Are Spying On You? Now You Can Find Out

It’s no secret that some applications are a little too interested in us and what we’re doing.

We’ve all had this experience. You might be talking to a friend about a new product that you’d like to try. Or perhaps you’ve discussed somewhere you’d like to visit.

Then the next time you go online you see adverts for the exact things you were talking about.

It’s more than a coincidence, surely???

Until recently, we haven’t had a lot of control over what information our apps are gathering about us.

Android and iOS first stepped up to give us more power over our online privacy. We were given the ability to control which apps could access our data, and sensitive things like our camera and microphone.

But while it’s easy to think of this only being an issue with phones… laptops have the same problems.

So here’s some great news. Microsoft’s testing a new feature in Windows 11 to put the power back in our hands.

It’s currently testing a new feature – called Privacy Auditing – which allows you to see which applications have been accessing sensitive hardware, like your webcam and microphone.

You’ll also be able to see if your screenshots, messages, and even your contacts and location data have been accessed. And there’s a log of which apps accessed this info, and when.

When launched, the feature will be available in your Privacy & Security menu, under App Permissions.

There you’ll be able to see a full list of what’s been accessed, by which app, and when. It should become your first port of call if you suspect any suspicious activity is taking place on your device.

When the feature is released, it will be a great tool to check periodically to help you avoid malicious activity and to make sure your sensitive data remains in the right hands.

In the meantime, if you’d like someone to look over the data permissions on your business’s devices, get in touch.

Upgrade Your Business With Unified Communications

As a business owner, you’re always looking for ways to make your company more efficient and profitable. One way to do this is to implement unified communications (UC). In this blog post, we’ll discuss how UC can help upgrade your business’s information system and other advantages of adopting a UC platform.

What is unified communications?

UC is a term used to describe the integration of different communication tools into a single platform. This includes just about every medium of communication, such as voice communication in all its forms — voicemail, phone calls, and voice memos — as well as multimedia services like video chat and web conferencing. Real-time communication, like call screening and call conferencing, can also be integrated. Even data services and transactions like eCommerce and online banking can be added to a UC system.

How can small businesses benefit from UC?

The most significant business benefit of UC is that it can help improve communication and collaboration between employees. This is because UC provides a single and flexible infrastructure in which you can streamline and enhance business communications and easily manage all the components.

Here are other benefits of having a UC system:

  • Hypermobility
    UC enables you to access your files via a wide array of mobile devices like laptops, smartphones, and tablets. This makes it easier to create an office environment and assist customers wherever you or your team might be. This opens up a world of opportunity for real-time collaboration and remote work.
  • Improved productivity
    UC lets you enjoy productivity-enhancing communication features like call information and call routing. These capabilities enable users to work more efficiently and better tend to customers’ needs. For instance, web and video conferencing calls not only allow for real-time interactions but also for better collaboration. Delayed response times and gaps between dispersed teams are also minimized.
  • Real-time updates
    With UC’s real-time presence updates feature, users can share their location and contact information — provided that you authorize the use of this capability. This allows team members to easily get in touch with the right person when they need to.
  • Single point of contact
    Clearly defined points of contact ensure that stakeholders can reach you by email, phone, SMS, etc., whether they are reaching out to you via a softphone, an IP phone, email, or instant messaging.
  • Reduced costs
    UC lowers phone bills since it uses the internet to make calls. It also limits the need for expensive on-site hardware, as one UC server keeps everyone connected using the aforementioned communication features. What’s more, it eliminates travel costs, because it allows you to join meetings without leaving your office or home.Even better, you can potentially save thousands of dollars on office overheads by allowing employees to work from home since they’ll remain connected through their softphones even when they’re not in the office.

It’s only a matter of time before UC becomes the norm for business communications. Give us a call if you’re interested in learning more about how UC or VoIP can transform your business. We’ll answer your questions and help you devise an integration strategy that fits your business needs.

Most Ransomware Victims Would Pay Up If Attacked Again

Ransomware is one of the fastest-growing cyber-crimes in the world. Last year, 37% of businesses were victims of an attack.

In case you didn’t know, a ransomware attack is where cybercriminals infiltrate your network (or device) and steal your data by encrypting it. The data is still there, but you can’t access it.

Then they demand you pay a large ransom fee for the encryption key.

If you don’t pay the demand (which can be tens or even hundreds of thousands), they delete your data.

It’s not just the cost of the ransom fee to worry about. There’s the stress, reputational damage, and downtime that goes with it. In 2021, the average downtime suffered after a ransomware attack was 22 days.

Official advice is not to pay any ransomware demands.

However, a new survey has shown that a massive 97% of business leaders who’ve experienced a ransomware attack in the past would pay up quickly if they were attacked again

A third of them would pay instantly.

What does that tell you about what a nightmare the whole thing is for any business?

The other problem is, that when you pay a ransomware demand, it’s not guaranteed that you’ll get your data back. On average, only 65% of data is restored once a fee is paid.

You may face further extortion. And by letting cyber criminals know that your business pays ransom fees, it’s likely that you’ll face subsequent attacks in the future.

So what’s the best way to deal with ransomware?

First, you should put in place the right security measures to try to prevent an attack:

  • Educate your people on cyber security and best practice
  • Implement multi-factor authorisation across all your applications
  • Use a password manager
  • Make sure all updates are installed quickly
  • And you should always have a working backup in place – ideally one where older data is retained and cannot be changed

It’s also a great idea to have a response and recovery plan that details what you will do in the event of a ransomware attack.

Not only will it mean your business can respond faster, but it should reduce the amount of downtime suffered as you’ve already considered exactly what needs to happen.

Keep Your Data Safe With These Backup Solutions

Data is an integral part of your business. You use it to build marketing strategies, forge customer relationships, and much more. Losing important client and company information can be harmful to the health of your business. Here are backup solutions you should ‌implement to ensure the safety of your data.

Tape drives

Tape drives are the oldest backup solution still in use today because they offer high-capacity data storage and are very cost-effective. Modern tape drives come with 114 TB native capacity and 360 TB compressed capacity, which is larger compared to most hard disk drives.

In addition, well-maintained tape drives can store data for over 30 years. Other devices, such as hard drives, become less reliable overtime. Also, tape drives are stored offline, which means they’ll be safe should your business fall victim to an online attack.

External hard drives

An external hard drive is a portable hard drive that can be connected to a desktop or laptop through a USB port. External hard drives come in varying storage capacities ranging from 1 TB to 18 TB.

For companies that can’t afford multiple servers or cloud storage, external hard drives are a cost-effective way of backing up valuable data. External hard drives are portable and let you access your files even when you’re offline.

When using external hard drives, however, you need to update your backups regularly to include new files. Also, there’s a risk these devices can be misplaced or stolen if they are not stored in a secure location.

USB drives

USB drives are an inexpensive and simple data backup solution. While they don’t have the capacity of external hard drives or tape drives, newer flash drives can store up to 1 TB of data, making them the ideal option if you’re not planning to store a huge amount of files. And because USB flash drives have a compact design, they are easy to carry around.

USB drives are compatible with both PC and Mac devices as long as they have a USB port. Modern ones are designed with transfer speeds of up to 4.8 GB per second. This allows you to copy files faster compared to hard drives which only have a transfer rate of 150 MB per second. The only drawback with USB drives is that they can be misplaced easily, so be sure to store them in a safe and secure place after use.

Cloud storage

Cloud storage allows you to back up your data online. This reduces the need for physical storage, helping you cut down on hardware maintenance costs and office space. And since your data is stored online, you can access your files from anywhere with a stable internet connection. This makes file sharing easier, thus facilitating remote and hybrid setups, which became the norm during the COVID-19 pandemic.

In addition, most cloud providers offer encryption services to ensure only authorized personnel can access the stored data. Keep in mind, however, that there are still providers out there that do not have sufficient security protocols in place, exposing sensitive data to cyberthreats. So before you decide to use cloud storage, make sure the provider you choose is familiar with data regulation laws and uses the latest cybersecurity protocols to ensure the safety of your data.

Data backup may seem like a chore, but having copies of your files offline, off premises, or in the cloud will ensure the continuity of your business in the event of a disaster. Call our data backup experts today to learn more.

Windows 11: First Things To Set Up And Customize

Microsoft’s Windows 11 operating system offers a number of improvements over Windows 10, including a new Start menu and a more functional Taskbar. If you have just purchased a laptop running on Windows 11, or are planning to upgrade your current device, then you will need to know how to set it up. In this blog post, we will provide you with a guide on how to customize your Windows 11 laptop.

1. Set up how your device checks for updates

New laptops usually automatically check for updates, but you can also manually do this. Click the gear icon above the Start button to go to Settings, choose Windows Update, and then click Check for updates.

You can also type “updates” into the search box and click Check for updates.

2. Create a restore point

It is ideal to set up your laptop’s restore point, which is the backup of your entire operating system. Doing this can save you a lot of time, effort, and even money in case something goes wrong with your device.

To set up a restore point, simply type “restore” into the search bar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window. From there, you can choose what you want to be included in the backup. Click the Configure button to apply your choices. Enable “Turn on system protection” if it’s not already on. Finally, choose how much disk space to reserve, which is ideally not more than 2–3% of your total disk space.

3. Choose a power plan

To help prolong your laptop’s battery life, you can choose from Windows 11’s Power Saver, High Performance, and Balanced power plans. Type “power plan” in the search button and choose either “Edit power plan” or “Choose a power plan.” Choosing the Edit power plan option allows you to set when the laptop display will be automatically turned off and when it will go to sleep. When you pick “Choose a power plan,” it will take you to a page where you can create and customize your power settings.

The default recommended plan is Balanced, but if you want to create your own, click on the “Create a power plan” option on the left part of the screen. You can choose from three options depending on how you plan to use your laptop: Balanced, Power Saver, and High Performance. After selecting your preferred plan, give your new power plan a name, then click Next to set the display and sleep settings for your laptop. Once done choosing your preferred power settings, click on Create and you’re good to go.

4. Set app installation tolerance level

For added security, you can restrict which apps can be installed on your laptop. Do this by going to Settings > Apps > Apps & features. From here, you can configure the “Choose from where to get apps” settings. You can choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.

5. Remove bloatware

Some vendors package new laptops with bundled apps and software, which are mostly unnecessary and unwanted programs called bloatware.

Windows 11 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t need. Head to Settings > Apps > Apps & features and peruse the list of installed apps. If you don’t want an app and are 100% certain that your computer doesn’t need it, click on the hamburger menu to the right of the app, then choose Uninstall.

6. Activate anti-ransomware

Ransomware is a form of malicious software that locks all your data until you pay a ransom to hackers.

To minimize the risk of ransomware attacks, type “Windows Security” into the search bar at the bottom of your screen and click on the Windows Security result. Go to Virus & threat protection, click Manage settings under “Virus & threat protection settings”, and go to “Controlled folder access”. From there, click the Manage Controlled folder access option and enable Controlled folder access; this protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add other folders that you’d like to be protected from ransomware.

There are myriad ways Windows 11 can be configured for optimization and security. This article barely scratches the surface of Window 11’s security and efficiency settings. Call us today for a quick chat with one of our Microsoft experts about taking your operating system to the next level.

Here Are Three Big Companies Working On Passwordless Login Options

Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks.

Despite years of training, re-training, and near-constant reminders to strengthen passwords, users keep making the same mistakes.

They’ll re-use the same password across multiple properties. They may use an incredibly weak and easy to guess password that makes it easy for hackers to break in using simple brute force attacks against their accounts.

If passwords were to simply go away and be replaced by something better, legions of IT security folks would breathe a tremendous sigh of relief.

If Apple, Google, and Microsoft have anything to say about the matter, that is soon to be a reality.  All three companies are hard at work on a variety of passwordless schemes. If their plans remain on track, we’ll get to see the fruits of their labor sometime next year.

The three companies are currently working to implement passwordless FIDO sign-in standards across Android, Chrome, iOS, macOS, Safari, Windows, and Edge.  Taken together, those systems and software packages account for some 90 percent of network traffic today. It won’t be long now before the devices users employ will store a FIDO credential, dubbed a passkey, which is used to unlock your device and access all of your online accounts.

The passkey scheme is substantially more secure than a simple password because it’s protected with powerful cryptography and only shown to your online account when you unlock your device.  Contrast that with passwords, which leave users vulnerable to all manner of phishing schemes and are subject to being weakened by bad habits developed by the users themselves.

All of that is good news but it should be noted that we haven’t seen it in action yet. Even after the Big Three finish their work, there’s still the considerable task of implementing the use of the new passkeys into websites and other applications. It will be a while yet, but the good news is change is coming.

Is Your Business Making These Cyber Security Mistakes?

It feels like every day we’re being warned about a new threat to our cyber security, doesn’t it?

That’s for good reason. Last year, ransomware attacks alone affected 81% of businesses.

And the cost of cyber-crime is estimated to hit $10.5 trillion by 2025, according to the ‘2022 Cybersecurity Almanac’.

But we’re still seeing far too many businesses that aren’t taking this threat seriously.

It’s not only your data that you could lose if your company falls victim to a cyber-attack. The cost of remediation or mitigation can run into tens of thousands.

And at the same time you’ll suffer an average of 21 days downtime after a cyber-attack. Imagine… 21 days without being able to use all your business technology as normal. It doesn’t bear thinking about.

That’s not to mention the loss of trust your clients have in you, which could lead to you losing their custom.

It’s really important that your business is taking appropriate steps to keep your data safe and secure.

That most likely means a layered approach to your security. This is where several solutions are used, which work together to give you a level of protection appropriate to your business.

This reduces your risk of being attacked. And makes recovery easier should you fall victim.

It’s worth pointing out that you will never be able to keep your business 100% protected from cyber-attacks. Not without totally locking down every system, to the point where it would be very difficult to do business (and your staff would constantly be looking for ways around the enhanced security).

No, the key to excellent cyber security is striking the right balance between protection and usability.

There are three mistakes that are most commonly made by businesses – and they’re also some of the most dangerous mistakes to make.

Is your business making any of these?

Mistake 1) Not restricting access

Different employees will have different needs when accessing company files and applications. If you allow everyone access to everything it opens up your entire network to criminals.

You should also make sure to change access rights when someone changes roles, and revoke them when they leave.

Mistake 2) Allowing lateral movement

If cyber criminals gain access to a computer used by a member of your admin team, that in itself might not be a disaster.

But what if they could move from your admin system to your invoicing system… and from there to your CRM… and then into someone’s email account?

This is known as lateral movement. The criminals gain access to one system and work their way into more sensitive systems.

If they can get into the email of someone who has admin rights to other systems or even the company bank account, they can start resetting passwords and locking out other people.

Scary stuff.

One strategy against this is called air gapping. It means that there’s no direct access from one part of your network to another.

Mistake 3) Not planning and protecting

Businesses that work closely with their IT partner to prepare and protect are less likely to be attacked in the first place.

And will be back on their feet faster if the worst does happen.

You should also have an up-to-date plan in place that details what to do, should an attack happen.

This will significantly shorten the amount of time it takes to respond to an attack. That means you’ll limit your data loss and the cost of putting things right again.

If you know you’re making one (two, or even three) of these mistakes in your business, you need to act quickly. We can help.

Give Net Activity a call, and we’ll review your current security arrangements.

5G: What You Need To Know About The Future Of Business VoIP Systems

Fifth-generation technology, or 5G, will significantly enhance the performance of your business’s Voice over Internet Protocol (VoIP) systems. That’s because 5G networks have much higher speeds, greater capacity, and reduced latency than 4G LTE networks. This means that businesses can enjoy crystal-clear voice quality and low call latency no matter what device or where they make calls. Here are three ways to take advantage of 5G for your VoIP system.

Explore VR and AR

With 5G network speeds, virtual and augmented reality can become more common for many small- and medium-sized businesses (SMBs). 5G easily surpasses 4G’s Gbps (gigabits per second) limit, which is currently holding back businesses’ adoption of virtual reality (VR) and augmented reality (AR) applications.

VR and AR need to process significantly more data because of the visuals they must process as users move, and this puts an enormous strain on mobile networks. 5G is set to ensure a better user experience by facilitating smoother connections and preventing network delays that can affect your bottom line.

Improved video conferencing

One of the major hindrances to smooth web and video conferencing is slow network data transfer. Fortunately, innovations like Web Real-Time Communication and 5G networks can enhance VoIP for businesses by providing open and stable streaming as well as sufficient transfer speeds. These will allow businesses to view higher-quality videos, even those at 4K and 8K resolution.

Beyond improved streaming quality, 5G networks will also be able to support video calls with a larger number of participants, which is timely, considering the current shift to remote working.

Utilize mobile VoIP

VoIP calls heavily rely on sufficient download and upload speeds. For example, mobile VoIP users may experience unstable and poor call connectivity and clarity when their 4G networks are limited to 12 Mbps upload and 2 Mbps download speeds. These limitations could also lead to packet loss. Packet loss happens when one or more “packets” of data traveling across a computer network fail to reach their destination, which is typically caused by network congestion. Packet loss reduces audio/video quality and can even cause calls to be dropped, leading to a poor VoIP experience. But thanks to 5G’s greater speed, packet loss can be prevented.

Moreover, 4G network providers set a fixed amount of bandwidth for every direction it transmits a signal to. But unlike 4G, the 5G bandwidth can be adjusted on the fly. This means that 5G network providers can allocate bandwidth to mitigate congestion. In practical terms, businesses could reach their customers even if the latter are in crowded places that normally max out 4G mobile network capacity constraints, like in football stadiums or airports.

When your business decides to adopt the up-and-coming 5G network, you can expect to see significant VoIP improvements. If you’re looking to set up a VoIP system for your business, call or email Net Activity today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room