To continue our month of Cybersecurity Awareness, we want to remind you of the importance of keeping your WiFi-enabled devices secure in both your home and business setting. Last week we talked about the the most important skills to keep you safe in the cybersecurity age. Now, how do you keep your devices safe?
Did you know that October is National Cybersecurity Month? This seems appropriate since Cybersecurity exploits and hacks have kept the news buzzing through the summer. That’s why we’re going to take this time to remind you of the best cybersecurity practices you can implement to keep yourself safe.
In our last article, The Ping: How Does a Network Work?, we explained that a network “….allows all your devices to communicate and share data/resources with each other, either wirelessly or wired in a secure environment.” A Switch is the core of this environment. Switches allow the computers on your network to talk directly to one another. What if you want your computer to get to the internet or another network? You need a router for this. A router “routes” data from within your network to and from outside networks like the internet. If you’ve never heard of a router you’re not alone. Most small to medium sized businesses do not use plain old routers any more. Instead they use the routers more sophisticated cousin, the Firewall, to do the same job.
With kids back to school there are a lot of things to worry about. Getting them to class in time, making sure they have something to eat, and their homework is in their backpack. Unlike in our youth, kids have technology at their fingertips and are quick to explore the cyber world on their phones, but are they staying safe?
By now you should have trained your employees on what an attack might look like. Now what? Training an employee is half the battle. Not only do they need to know what NOT to do, they need to know what TO DO when a challenge presents itself. Next, employees need to be aware of internal changes that could directly impact them or their environment, and what to do in case your company does fall victim to an attack. One might call this a Security Plan…
Last week in The Ping: State of Cybersecurity, we spoke about the rise of cybercrime. Cyber criminals are continuing to find ways to access both personal and organizational networks. The good news is that there are a few things you can do to help prevent this from happening to you and your company.
Last week we discussed the consequences of allowing your systems to pass their end of life and continuing to use them. One of the larger issues is the increased potential of malware on your machines. Not only can this affect your desktops, but it can spread to the whole network. With malware attacks not slowing down, is this really a chance you can afford to take?
Over the past few weeks we’ve been talking about the importance of upgrading your near EOL, or end of life, systems. While it’s important to know that not replacing these machines can slow down your network, let’s talk about how it could leave your network open to malware and overall vulnerabilities.
We’ve been talking a lot about how end of life can negatively impact commonly used servers and desktops, but did you know this can affect your email software as well? In addition to Server 2008 and Windows 7, Exchange 2010 will be ending their support in January of 2020, which means any updates and patches will cease for your email as well.
With every Microsoft product you purchase there is a known EOL, or End of Life. Simply put, it’s an expiration date for your software or licensing. The most common reason is due to advancements and/or changes in technology that lead to your current purchases becoming obsolete. That is not to say that the software or devices that you recently purchased aren’t advanced for their current life cycle, but at one time we also believed that Windows 95 was so advanced we couldn’t imagine we would ever need a new operating system again. Fast forward to 2019 and we are 8 OS versions past Windows 95 with Windows 10.