5G is just about here, and the telecom carriers are pushing it out. Android devices, made by numerous manufacturers, are about to come on the market – even if networks are in the development stage. Rumors abound that Apple will hold back until 2020 to introduce 5G devices, and that’s a good decision for a number of reasons.
Continue readingHow Secure is Cellular Data?
We know public Wi-Fi networks can be unsecured, and we’ve tailored our use to deal with those problems. But now, hacking cellular networks may be a growing danger as more cracking devices and techniques become more available.
Continue readingIt’s All About the Switch
As data pipelines and Wi-Fi networks get bigger and faster, you need to pay attention to the switch, the connector that brings the service into your office or home and sends it to your network. You may need a hybrid system that includes an up-to-date switch and some hardwiring to unleash the full power of the internet service that you pay for.
Continue readingThe Azure Workaround
When Azure, Microsoft’s storage cloud, was hit with a problem that rolled around the world, it affected some of our clients who use it for storing and accessing data and apps, especially with remote access such a key need. Microsoft hasn’t been the only cloud provider hit, and this won’t be the last problem. But nothing needs to shut you down.
The Azure problem essentially locked people and businesses out of their data and apps. In the most basic terms, any Azure customer using Dev Ops and Office 365 who depended on two-factor authorization to protect their Azure accounts couldn’t log in. We were affected as a customer of both services.
At the time we were affected, we were doing a setup at a client and needed to get a big file, which we store through Azure. When I logged in to get it, I got no access; I just got a message they would send a text. I had an external hard drive with an old version of the file, and that was not suitable. Transferring the file remotely from my office computer would have taken too long. We solved the immediate problem by transferring the file from my computer to my Dropbox account and then downloading it from there.
We worked around the problem, but we operated in a vacuum. As an IT service provider, we got no information about anything that was happening, and that was frustrating. We later learned – along with the rest of the world – the problem started in Asia and made its way westward as organizations in Europe, Africa and the Americas began their workdays.
It took a few days for explanations and suggestions to reach everyone, and it didn’t take long (in the grand scheme of things) to return to normal operations. The problem centered around a breakdown in the two-factor authentication process. We and our client were fortunate that I had the capability – files stored on a computer I could access and Dropbox – to initiate a solution. But not every user has the resources I had.
Two-factor authentication is one of the key ways we can protect our data and app security, and the technology is evolving as we move toward password-less access to cloud servers and other websites that house highly sensitive info, such as banks, shopping sites and healthcare organizations. As hackers get better, our industry needs to stay ahead of them.
We don’t believe that shutting off two-factor authentication is a good solution to a random-access problem, but when it comes to your Microsoft accounts, you can turn it on and off as needed. That might be an effective workaround.
Microsoft’s website has step-by-step instructions for all who have a Microsoft account.
- Login to https://account.live.com/
- On the home page, click “Security & Privacy”.
- On the “Security & Privacy” Page, click on “Manage advanced security” link.
- Look for a page where you will find a link to “Set up two-step verification” or “Turn Off” Two-step verification
If you have any questions about the process or need a walkthrough, contact us by phone – 973-433-6676 – or email. We can also help you with two-factor authentication with other systems and help you with other solutions to maximize your data and app access and security.
By the way, this is not a Microsoft-specific issue. Other cloud services, including Google and Amazon, have had access problems. Service outages will happen again because we will continue to use cloud-based services and because…stuff happens. Looking at big picture, the cloud has too many advantages, such as access from any internet connection and the best possible security measures available, to pull everything back to individual computers and servers
New Company, Old Stuff…Old Company, New Solutions
A recent acquisition of a company by one of our clients illustrates the problems you can face with old software as well as old hardware. And our onboarding of a new client illustrates the problems that compound each other after neglect and poor shortcuts. Here’s how we tackled them together.
The software issue, which involved an old, old version of QuickBooks, drove home the benefits of keeping applications up to date. Our client, an accounting firm, recently acquired another firm, and we knew the technology had lapsed, and we even developed a budget number to bring it all up to date. Our question was whether to implement our project now or wait until after the upcoming tax season.
Wanting to do it right, we decided to move forward. Based on the problems we encountered, we made the right decision – because it was not a simple file conversion process. The old version of QuickBooks was from 2008; 2019 is the current version. There was an interim version is 2012. As with Microsoft Windows updates, we had to go through numerous updates because each update was built on a previous update.
In addition to the QuickBooks updates, we had to work with various versions of Windows and aged computers that couldn’t run Windows 10 and the current QuickBooks. Complications arose when people didn’t know the administrative emails and passwords required to set codes and perform updates. We tried numerous combinations, but the problem was solved by talking to the owner of the acquired company, who recalled a Hotmail account for QuickBooks. We had to work through additional emails and passwords – and inconsistencies on security questions.
We finally got it all done after several extra hours of time and another access issue. Our client is set for tax season, but we can’t help but wonder about the cost difference between software updates and the time and expense of the extra work.
Similarly, with old and new, we recently added a client who had been disenchanted with the managed services (monthly fee) program of their previous IT provider. We bid against another company that also offered managed services.
We don’t offer managed services because we believe it shortchanges clients. They pay a monthly fee but never know what the provider is doing for them. When we bill for the hours we work, we always provide a detailed description of our services.
We also don’t like to scare new clients into buying and installing new equipment, such as a server, until we take a deep dive into their systems and their needs. The bidder said the client needed a new one ASAP, which was logical because the server was eight years old. But when we talked to people there and learned how they work, they hadn’t been using the server, which had an old firewall that had never been registered. We registered the firewall and upgraded the software, putting off their need for a new server, which they were using to scan files to send to their printer.
Going forward, we’ll show them a different way of doing things without a server, and it should save them several thousand dollars.
We pride ourselves on being trustworthy, and we build our business on that trait. If you know a company or individual who’s looking for a new IT service provider, we hope you’ll refer us. And if you need a look at your systems, you can rely on us for an assessment that will show you the most cost-effective options. Contact us by phone – 973-433-6676 – or email to set up an appointment for you or a referral.
Tech Upgrades for New Year
New technology is a great value. You can improve the performance and cost-efficiency of business and home systems by investing in new hardware and upgrading application software. Consider some of these upgrades.
December is always a good time for businesses to look at technology investments because it can affect your taxes. Your CPA or tax advisor can tell whether a year-end expense can help reduce your taxes while increasing your capabilities, and we can tell what might work best for you to make those capability increases a reality.
First, look at your operating system. If you are on Windows 7, remember that Microsoft’s support of this ancient OS will go away in a year. They’ll no longer provide security updates and bug fixes. Cybercriminals salivate when they see any outmoded system because they can likely pull a hacking technique off the shelf and get into your system.
Yes, there will be some workarounds for you to continue to use Windows 7, but why do it? Windows 10 is much more efficient and secure, and Microsoft is dedicated to supporting it. Most common business apps running Windows 7 are easily upgradeable to run on Windows 10. If you have customized software from a publisher that’s still supporting it, they should be able to help with a conversion to the newer OS. If not, you may want to move to a new app, especially for the security aspects.
You should also look at your hard drives for business and home computers. Solid state drives (SSDs) have come way down in price this year, and while they’re not necessarily Walmart specials, they are good values.
SSDs are faster and more reliable than mechanical hard drives. The mechanical drives have moving parts that can wear out and crash, putting your data in jeopardy. They also require more space to move files around, and as they become fuller, they are less efficient. SSDs have no moving parts and don’t physically move around files. That makes them immune from physical crashes, and you only need a drive half the size to hold the same amount of data.
Call us – 973-433-6676 – or email us with questions about technology upgrades or to help you install new technology. You can hit the ground running in 2019 or get up to speed early on in the new year.
Using Alternatives to Passwords
We have harped…and harped ad infinitum…about having strong passwords simply because those strings of upper- and lower-case letters, numbers and special characters offered the best chances of staying ahead of the hackers. But we’ve always reminded you that something better is needed because the bad guys have a vested interest in developing better systems to crack passwords and in finding more ways to exploit vulnerabilities in anybody’s electronic vaults that store vital personal and corporate info.
When one of our clients got hacked, we installed a password-less system to offer them better security. Our solution, which uses Microsoft Azure, is one of the emerging technologies to replace passwords with biometrics, one-time codes, hardware tokens and other multi-factor authentication options. What they do is exchange tokens and certificates without users – you, your employees and your customers – needing to remember anything. The new pathway to better protection even bypasses the password managers that many of you use.
IT industry figures show that more than 80 percent of security breaches involve stolen passwords and credentials. We all pick passwords that are too simple and easy to guess, or we store and reuse a few complex passwords that we can remember. That problem is exacerbated by forcing regular password changes even without evidence of breach. If password reset systems rely on people, they can be fooled by social engineering. Password-less technologies can combine certificates with contextual security policies that require less from you. They rely more on trusted devices and connections, and they can add layers of complexity as risks rise. New security can be based on the value of the content and factors such as user behavior, device location and connection, or the state of the device.
You can already set up password-less access using Microsoft’s Azure AD Conditional Access. Many of you who use our backup services already have Azure accounts, and you can use the technology to manage:
- Sign-in risk to identify who’s signing in and determine who’s a risk.
- Network location to determine if access is being attempted from a network location that is not under your control or the control of your IT department.
- Device management for accessing cloud apps from a broad range of devices including mobile and personal devices.
- Client application to manage cloud access using different app types, such as web-based, mobile, or desktop.
There are some cross-platform technologies available for going password-less, but it all starts with the Microsoft Authenticator app. It uses key-based authentication to create a user credential that’s tied to a device and uses a PIN or biometric. Instead of using a password to sign in, users see a number code to enter into the Authenticator app, where they have to enter their PIN or provide a biometric.
Password-less sign-in for Microsoft accounts with the Microsoft Authenticator app is already available, and support for signing into Azure AD is now in public preview. Right now, the app can only cover a single account registered with Azure AD in one tenant, but support for multiple accounts is planned in the future. It covers Office 365 and Azure and works with a variety of other apps.
If you’re ready to go password-less, we can help you decide what’s right for you and set up your accounts and devices. Just give us a call – 973-433-6676 – or email us to set up an appointment.
Choose the Right Router
As we add more traffic to our Wi-Fi networks in the office and at home, choosing the right router is critical for performance and security. If your router is more than a few years old, the combination of improved technology and the probable loss of full power due to wear and tear means you should consider investing in a new system. The good news is that you don’t have to spend a fortune.
How do you know it’s time for a new router? The first sign is sluggish performance, and it’s a subjective call. Whether you use your router for business or home entertainment, you can notice that data just isn’t moving throughout your location as fast as you’d like. With today’s demands for moving more data faster, your router could be worn out or not have the capacity to meet your needs.
Routers do wear out over time. Heat can damage internal components, and that slows them down. Newer routers have fresher components, and they meet better performance protocols. This is especially true when it comes to dual-band routers. Older routers tend to operate on the 2.4 GHz wireless band, where they share space with your other household products, such as cordless phones and even your garage-door opener. That creates a lot of interference that affects network performance. This problem is more likely to affect home offices and small retail systems. In some homes, whether used for home offices or as converted office space, multiple stories and thicker walls require more powerful routers to send signals where needed.
Dual-band routers work on both the 2.4 and 5 GHz wireless bands, and that gives you options. You can set some systems to run on the 2.4 GHz band and use the 5GHz band for managing bigger data capacities. Some routers even allow you to run on two 5GHz bands. For a home office, a home with multiple devices (computers, mobile devices and smart TVs), a business in a converted home, or a small retail space, this allows you to dedicate bands to specific uses. Think of it as having a slow lane, an express lane, and a lane dedicated to buses and trucks.
For a home or small office or retail use, look for a router with at least four 10/100/1000 (Gigabit) Ethernet ports to connect wired devices such as desktop PCs, network-attached storage drives and home-automation hubs. A USB port makes it easy to plug in a printer or a USB drive and share it across the network, but with two ports you can do both.
You can manage how your Wi-Fi network is being used with parental controls, Quality of Service (QoS) options, and a guest-network feature. Parental controls and QoS are for home use. The latter helps you assign network priorities for applications and clients, such as downloading files, running printers or managing streaming to TVs or devices. You can also manage priorities for gaming systems.
A guest network for a home or business lets you create a separate network to offer Wi-Fi connectivity to guests without leaving your entire network vulnerable. This lets them connect to the Internet, but doesn’t give them access to your files, printers, and other connected devices.
Wireless routers for businesses have improved tremendously. To meet the complexity and requirements of running a wireless network these days, routers now have a much more varied feature set, including hardware that is often found in computers. You can find systems with dual- and triple-band connectivity, as well as a slew of other features usually found on far more expensive enterprise-grade models.
Priorities for business users differ from most consumer users. Security, support, remote access, business-grade VPN, WAN redundancy, connectivity options and scalability are critical. However, this doesn’t mean that some consumer routers cannot be used as business routers, especially in a home office environment.
We can help you find a router that meets your networking needs and help you find the best location and configurations to maximize performance. Call us – 973-433-6676 – or email us to answer your questions about router selection and help you with setup and settings configurations.
Hack Attack Continues vs. Businesses and People
While government-sponsored hacking and disinformation makes big news, don’t take your eye your eye off the ball when it comes to protecting your personal and corporate data. A report from a consulting firm, Positive Technologies, painted a dark, dark picture, saying the second quarter of 2018 showed a 47 percent increase over 2017. You need to remain vigilant, even when events are beyond your control. Nobody is immune.
As reported in Tech Republic, Positive Technologies said the most common methods of cyberattack are:
- Malware (49%), with spyware or remote administration malware being the most widely used forms of infection.
- Social engineering (25%) is the term for manipulating users into believing a message, link, or attachment is from a trusted source, and then infecting targeted systems with malware, stealing money, or accessing confidential information.
- Hacking (21%) exploits vulnerabilities in software and hardware, causing the most damage to governments, banks, and cryptocurrency platforms.
- Credential compromise (19%) targets password managers used for storing and keeping track of passwords.
- Web attacks (18%) are online racketeering attempts to extort website operators for profit, sometimes by threatening to steal client databases or shut down the website.
- DDoS (5%) tends to be the weapon of choice for business rivals, disgruntled clients, and hacktivists. Political events can drive attacks on government institutions. Criminals can use DDoS attacks to take websites offline and demand payment from the victims.
Attacks can be made in tandem, such as the common duo of using phishing emails to trick users into downloading malware.
Financial and healthcare institutions, retailers, and government databases remain prime targets, but higher education institutions and even school districts are being attacked. Wired reports that this past March, the Department of Justice indicted nine Iranian hackers in alleged attacks on 144 US universities and 176 in 21 other countries. They were also cited for attacking 47 private companies.
Hackers are homing in on the money. Positive Technologies said targeted attacks are outnumbering mass campaigns, with attacks directed at companies and their clients, as well as cryptocurrency exchanges. Data theft is driving an increasing number of attacks, with many criminals seeking personal data (30%), credentials (22%), and payment card information (15%). To steal this data, hackers are compromising online platforms, including e-commerce websites, online ticketing systems, and hotel booking sites.
The scary part for us is the report you can never be sure that criminals don’t have your credit card number from one source or another. Even a brand-new smartphone in a store can have pre-installed malware.
People and businesses can take steps to keep their data safe by installing updates for operating systems and application software and installing antivirus protection on all systems and endpoints and keeping it up to date.
Businesses can encrypt all sensitive information, perform regular backups, minimize the privileges of users and services as much as possible, and use two-factor authentication. Enforcing a password policy with strict length and complexity requirements, and requiring password changes every 90 days, can also help protect systems.
We offer security audits for businesses, and we can answer any questions individuals have about protecting themselves from cyberattacks. Call us – 973-433-6676 – or email us to set up an appointment.
Updating Your Cloud Strategy
We hear all about the cloud without end. For large corporations and individuals, using the cloud is a nearly flawless solution for storing and accessing apps and data from anywhere. But for small businesses, exclusive reliance on the cloud may not be the best solution. Here are some decision-making factors.
First, for all their differences in size, a huge corporation and an individual have a few things in common. Individuals and corporate employees can travel anywhere in the world and need to access apps and data wherever they are. The cloud works really well for this.
Although they operate on totally different levels, subscription-based apps such as Office 365 work really well for individuals and large corporations. Individuals can share the cost over a large user base, enabling each to benefit from constant upgrades that app publishers can update from central locations. Large corporations essentially do the same thing within their communities. They spread their cost over many users, and their tech teams control the software-update process to keep operations running as smoothly as possible.
A small business is different in one significant way. It’s essentially a self-contained community of users who use the same apps and data in one location. Yes, that business may have employees who log in ‘from remote locations, and yes, it may benefit from subscription-based application software. But we are likely talking about 10 to 100 people who are working with the same apps and data in a “bubble” known as the office. While small businesses combine to form a huge user base, each has its own specific needs, and our clients rely on us to customize systems to meet specific needs.
Therefore, the cloud may not be the solution, especially if you are a small business still working with a combination of a Windows 7 operating system and a Windows 2008 server, either in your office or in the cloud. We’re approaching a perfect storm with that combination because by January 2020, Windows will no longer support that OS and server platform. They’re too old and expensive for Microsoft to develop performance upgrades and security patches. You are being brought to a decision point.
We recommend that small businesses look at a cost/benefit analysis that covers five years to determine whether you upgrade your OS and server or migrate to the cloud. Five years is a good projected lifetime for a server and OS, it makes it easier to compare their cost with setting up and using a cloud-based system.
Setting up a server on the cloud involves costs, including the cost of server space and the cost to set it up to meet your needs. Once that’s done, your maintenance cost should be minimal. If your business runs Office 365, you already have a cloud presence through Azure, Microsoft’s cloud system. And while Azure automatically updates its server, it’s still a maintenance operation. All cloud servers need maintenance, and it’s something you pay for as part of your agreement.
Of course, using a cloud-based server requires access to a good internet connection, one with sufficient bandwidth for your needs and virtually perfect reliability. If you don’t have the bandwidth, your business won’t operate at its desired level. If your service goes down, you’re out of business until it’s restored.
If your computing needs are largely internal, you might be better served with your own server on a strong internal network, which can be hard-wired for better performance and security than a Wi-Fi network. You’ll incur purchase and set-up costs for your server, and you’ll need to install all updates in a timely manner. But your maintenance expenses should be relatively low once you’re up and running.
By setting up computers as terminals on a server and hard-wiring the network, you won’t need a router system or a big pipeline to the internet. You’ll also have fewer internet access points to secure, and that could help keep out intruders. Finally, depending on your employees, they’ll likely be less likely to wander off to other things on the internet.
Whichever way you go, you will have the most up-to-date servers, application software and security technology available at the time of installation. Cloud systems will update automatically, but your internal system can be configured to download and install updates.
With a January 2020 deadline, you have time to analyze your options and start moving along your chosen migration plan. We can help you analyze your business’s needs over the next five years and put a plan into action so you don’t miss a deadline or a beat. Call us – 973-433-6676 – or email us for an appointment.
