Sales: 678.967.3854
Support: 866.252.6363

By The DynaSis Team

In late 2013, Internet security firm Fireeye discovered that a string of sophisticated, seemingly unrelated malware attacks had all been built on a common infrastructure of malicious services and applications. After further research, Fireeye concluded that multiple criminal entities and operations were working together, pooling and sharing resources and logistics to make it easier and more efficient to develop and launch highly sophisticated but distinctly separate attacks. A few months later, security firm McAfee announced that 20 to 30 cybercrime groups—all in the former Soviet Union — had reached "nation-state level" capability.

At the time, DynaSis reported on this trend, urging business owners to increase their security efforts. Knowing that strong cyber security is beyond the technical capability of virtually all small and midsized businesses (SMBs) we recommended that SMBs work with security-focused IT consultants or IT services firms to achieve better protection.

Fast forward to 2016, and the situation has only gotten worse. In fact, the continued evolution of the Deep Web, (also called the Dark Web)—a “hidden” Internet where illegal activities flourish—is accelerating the threat.  According to an Infosec Institute report, security firm TrendMicro’s analysis of the Deep Web identified major cybercriminal ecosystems operating in Germany, Russia, Japan, China, the United States, Canada and Brazil.

News headlines about Russian and Chinese cybercrime organizations are fairly common. However, the media report less frequently about the U.S. cybercrime ecosystem, which Tom Kellermann, chief cybersecurity officer at Trend Micro, characterized as, “A gun show for everyone as long as they can participate and are willing to pay.” These cybercrime groups, Kellerman noted, “primarily cater to customers within the region…most of the offerings (stolen accounts, products and services, and fake documents) are U.S. based.”

We hope that anyone reading recognizes that the threat of becoming a victim has reached epic proportions. In fact, no prudent managed IT services or IT support provider—even those that emphasize security—guarantees to completely prevent all threats from reaching corporate systems. Rather, the focus is on monitoring, detection and swift elimination.

Here at DynaSis, we have always followed security news, and we continue to enhance our own security offerings to incorporate the most modern, successful approaches. It’s a scary world out there, and it only takes one breach to bring an organization to its knees. To learn more, we invite you to download our white paper, Cyber-Security 2016, or browse our blogs and white papers at “The Latest.”

DynaSis has been Atlanta’s premier IT support services provider for more than 23 years. As an IT company working with small to midsized businesses (10 to 150+ users), DynaSis has developed a unique 12-layer approach to network threat protection, ransomware prevention and crypto virus threat elimination. The DynaSis Business Cloud functions through a highly secure environment with full real-time data backup. Please contact us at 678.218.1769 or visit our website at www.DynaSis.com.

By the DynaSis Team

Every day, small and midsized business (SMB) owners are bombarded with seemingly conflicting messages regarding how IT solutions can help them best run their businesses. With so many options to consider regarding corporate security, productivity and cost efficiency, it is not surprising that some of them stick their heads in the sand and do nothing.

Unfortunately, with SMBs becoming favorite targets for cyber attackers, and with corporate competition increasingly fierce, that is the worst possible way to operate. Here’s one example:

A business owner has been operating with a “break-fix” mentality, which means he or she only makes technology purchases when something breaks. This is a reactive operating strategy, but many business owners take this path because they believe they cannot find the time or budget to manage their technology proactively.

This approach has always been financially inefficient and detrimental to productivity, and DynaSis has long recommended that business leaders team with a knowledgeable, trustworthy IT consulting partner, such as a managed services provider or an IT services firm, to help them create and implement a technology roadmap that includes staged upgrades and improvements.

Today, however, the break-fix approach has become more than inefficient. Outdated, network-connected equipment, such as networked printers, likely has no built-in security protections. Such machines are more likely to be operating with open Internet connections, and hackers know that. Furthermore, competitiveness in today’s market relies on providing workers with modern technology. Organizations that persist with the break-fix model invariably fall behind.

In other words, making smart, planned technology improvements helps organizations foster productivity, security, cost efficiency and competitiveness—not to mention employee satisfaction. The question then becomes: how does the business owner know which improvements are smart?

To help our readers, we have prepared a chart of technology Do’s and Don’ts, in terms of best practices. The list only scratches the surface, but it’s a good place to start.

Choosing the Right Technology

These are just a few of many examples where smart technology choices are beneficial to your company, its personnel and its bottom line. If your technology environment is inadequate or outdated, your employees cannot achieve their missions, and customers may perceive your physical space—and your firm—as dated. Similarly, if your approach is too lenient, you could be throwing away money, productivity and security. A knowledgeable, expert IT support company can help you evaluate your options, minimize your risk and keep your equipment operating in peak condition.

Selection of an IT outsourcing company is a very important business decision. For almost a quarter century, Atlanta’s small to mid-sized businesses have relied on DynaSis’ for managed IT services, internet security, and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.218.1769.

By the DynaSis Team

With bad news about cybercrime appearing daily, many small and midsized business (SMB) owners may be wondering, “How vulnerable am I?” After all, most of the news accounts of data breaches and other attacks relate to major companies, governmental entities, and other very large targets.

Unfortunately, the reason SMBs aren’t making headlines is because they don’t make great news, not because they aren’t favored targets. A quick Internet search will turn up dozens of stories about the vulnerability of SMBs, as a group. In 2011, Symantec’s annual Internet Security Threat Report found that companies with fewer than 250 employees constituted 18 percent of targeted attacks. In the 2016 report, that figured had risen to 43 percent, with SMBs being the most heavily targeted group.

Why are SMBs so attractive? Major corporations have big security budgets, and they can afford to implement the latest techniques to protect their networks. Many have teams of security specialists whose primary tasks are to keep cybercriminals at bay. SMBs don’t have these types of resources, and hackers know that.

Nevertheless, the vulnerability of SMBs wouldn’t be enough, by itself, to make them targets. If hackers had to expend days, or even hours, finding and attacking a vulnerable SMB in exchange for a handful of proprietary information, they wouldn’t do it. Fortunately for the hackers, they don’t need to.

An entire ecosystem of cybercrime tools now exists, and many of them are freely available. Hackers have also learned they can turn groups of vulnerable systems into “botnets.” Here, multiple computing devices are interconnected and used to scan the Internet, looking for compromised websites to hijack, open corporate network connections to infiltrate, and other inadequately protected resources. Making matters worse, cybercriminals continue developing new attack tools and approaches, and even large organizations have a hard time keeping up.

For SMBs, becoming a victim at some point is a near certainty. In fact, most experts no longer counsel organizations that they can completely prevent a breach. Rather, the goal is to mitigate the damage when one happens.

Fortunately, it is neither expensive nor complicated to secure your firm and its resources and substantially reduce your odds of attack. It is also possible to implement automated mechanisms that will detect penetration and stop it, quickly. However, these tools are sophisticated and it is usually neither practical nor cost effective for in-house IT support teams to manage them.

For most SMBs, contracting with a managed services provider or an IT solutions firm is the most effective way of implementing and managing stringent IT security. However, not all IT consulting or IT support companies are created equal. Some are more security focused than others, with certified professionals and the latest technologies at their disposal.

To help organizations better understand cyber security and the considerations for hiring outside IT security assistance, DynaSis has developed two white papers: Cyber-Security 2016 and Managed IT Security. Both are complimentary downloads on our site. In future blogs, we will drill down into greater detail about cyber security, so stay tuned!

Selection of an IT outsourcing company is a very important business decision. For almost a quarter century, Atlanta’s small to mid-sized businesses have relied on DynaSis’ for managed IT services, internet security, and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.218.1769.

[featured_image]

By the DynaSis Team

With all the news about the wonders of cloud computing, many small and midsized business (SMB) owners may wonder if they are making a mistake by not adopting cloud technology. Yet, they also have concerns, ranging from security issues to availability of offsite resources if Internet connections go down.

Depending on the SMB’s business model, location, and level of technological sophistication, these may be valid concerns. Yet, there is no doubt that cloud computing provides big benefits, and SMB adoption is accelerating. In a round-up of cloud computing “facts and figures,” Forbes noted that the cloud market for SMBs will double between 2015 and 2020, from 37 percent of U.S. SMBs to 78 percent.

The good news is that decision makers don’t need to choose between an off-site cloud and their current on-site systems. With a hybrid setup, they can have both—and they can selectively choose which resources to run in the off-site cloud. With this approach, often called a hybrid cloud, some data and other business assets remain hosted on company servers while others are run and accessed remotely.

The two sets of resources are tied together so that they run as a single, cloud-supported solution, with their on-site resources essentially serving as a “corporate” cloud. Yet each of the components can be configured differently to meet designated security, backup, and other requirements.

To determine if a hybrid cloud is the right approach, SMB owners must evaluate their current needs and future plans, as well as their ability to support on-premise systems. Such an evaluation is often difficult and time-consuming for business owners, who may benefit from the help of an objective, qualified outsider such as an IT solutions or IT consulting company.

If you are currently evaluating your resources for a new or expanded cloud deployment, consider these factors:

All Cloud Solution

All On-Site Solution

Hybrid Solutions

If you like the benefits listed under All Cloud but some of the All On-Site criteria apply to your organization, a hybrid storage and delivery model could be the perfect option. With hybrid delivery, for example:

A hybrid solution also allows you the flexibility to test a variety of cloud delivery and storage approaches to find the perfect mix for your firm.

Reputable managed services providers can help you evaluate and make these decisions and can also help you move resources to the cloud safely and securely. Some managed services companies offer ready-made hybrid solutions that include ongoing IT support.

Specializing in managed IT services and network security, Atlanta based DynaSis has been supporting small to midsized business for almost a quarter century. Among the services we provide are cloud computing through the DynaSis Business Cloud, 24 x 7 x 365 helpdesk support, and real-time monitoring enabling us to deal with “issues” before they become problems. For more information, please call DynaSis at 678.218.1769 or visit www.DynaSis.com.

[featured_image]

By the DynaSis Team

On Tuesday, June 14, 2016 from 12:00-2:00 pm, the DynaSis Team will host an Open House at its new headquarters, located at 950 North Point Parkway, Suite 300, Alpharetta, Georgia. All of DynaSis customers, partners and associates, as well as local media, are invited to attend. At the event, one of our favorite local barbecue restaurants, ‘cue, will serve a luncheon to all attendees.

DynaSis’ move marks a milestone for our organization, as we have not only doubled our size but also expanded our systems to enhance the IT support and IT services we offer our customers. Recognizing the increasing challenge that small and midsized businesses (SMBs) face in today’s technology-centric, threat-laden landscape, DynaSis has taken significant steps to ensure it will remain the area’s most proactive managed services provider in coming years.

A recent study of IT security among SMBs, conducted by Wakefield Research, found that only 37 percent of IT decision makers felt their organizations were fully prepared to manage IT security and protect against threats. Equally concerning, fewer than 25 percent have a dedicated, in-house cybersecurity team or individual. Improvements we have incorporated into our new facility to directly address these shortfalls for SMBs include:

During the event, visitors will have the opportunity to meet some of the DynaSis Team as we lead guided tours that showcase our new offices and equipment and explain the inner workings of the Managed IT Services model. As a thank-you to the Atlanta community for its years of support, we will also donate $10 to the Atlanta Community Food Bank (ACFB) for every Open House attendee. For the convenience of attendees, we can accept donations of canned and boxed goods and forward them to the ACFB on donors’ behalf.

For more information, or to RSVP, please email events@DynaSis.com

For small to midsized business owners and executives who are concerned about managed IT support services and network threat protection, DynaSis is one company that has been at the forefront since 1992. In this ever evolving world of cybercrime, crypto virus and network access protection have become critical to every company’s security. DynaSis also provides 24 x 7 x 365 outsourced IT services, with its own trained staff for helpdesk, real-time monitoring and the DynaSis Business Cloud, for highly secure data storage and backup. You can find out more by calling us at 678.218.1769, or checking out our website at www.DynaSis.com.

[featured_image]

By the DynaSis Team

Several recent reports have highlighted the growing importance for small and midsized businesses (SMBs) of outsourcing their IT functions. There is also new evidence that SMB owners are actively embracing the use of managed services.

Per a 2015 report from the MSPAlliance, an international association of cloud computing and managed services providers (MSPs), North American firms spend approximately $154 billion annually for managed services. The MSPAlliance also reports that SMBs are at the top of the list, in terms of adoption. Benefits cited by the SMBs contracting for managed IT services include increased operational performance, decreased operational risk, reduced IT costs and accelerated innovation.

The IT solutions offered as managed services range from computing, storage and networking resources to mobility strategy and management, expert, 24/7 support for users, and even telephony services. Some IT support companies offer ongoing monitoring, management and maintenance of the underlying infrastructure (with service guarantees).

The most engaged MSPs also offer IT consulting and strategic planning services to help organizations create roadmaps of upgrades and improvements, maximizing budget while minimizing downtime. With all of these options potentially—but not necessarily—available, SMB decision makers considering managed services must both identify their own priorities and vet their candidates carefully. Following are a few issues to consider.

In the long run, many organizations find that contracting with an MSP for all IT services is the most cost-effective solution. This is especially true when the provider offers proactive monitoring and problem resolution, which is proven to reduce outages significantly. With virtually all SMB staff requiring computing resources, IT outages quickly become costly based on wasted staff resource alone. When the cost of lost sales and goodwill are factored in, the price tag is even higher. For even the smallest providers, the new reality is that uptime is no longer optional.

Selection of an IT outsourcing company is a very important business decision. For almost a quarter century, Atlanta’s small to mid-sized businesses have relied on DynaSis’ for managed IT services, internet security, and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.218.1769.

[featured_image]

By the DynaSis Team

For many small and midsized business owners, cybersecurity is a maze with no apparent exit. Bad news arrives daily, and “recommended” or “best practices” solutions can differ from one IT solutions provider to the next. As a managed IT services firm that helps companies navigate this maze on a daily basis, we understand how confusing cybersecurity can be. Even so, that doesn’t mean business owners can afford to ignore the threat landscape and hope it will go away. It won’t.

Last week, we read the annual Data Breach Digest from Verizon, an incident report that identifies cyberattack trends. To pinpoint the trend lines, a team of investigators explored more than 500 cybersecurity incidents from 2015 and then analyzed them with data from the two previous years.

Some of the results were unsettling, to say the least.

Since the dawn of corporate computing, experts have been urging companies to require secure passwords—and to teach employees how to keep them safe. The fact that 80% of breaches involve compromised passwords surprised even us.

Human gullibility will never be eliminated, which is why cybercriminals rely upon it. However, organizations can teach employees how to recognize danger—and avoid giving into their gullible natures.

In addition, requiring strong passwords throughout the organization is one of the single easiest steps a business owner can take to secure his firm and its assets. Even if you don’t think you can afford an advanced threat detection and mitigation solution or don’t have the time to conduct a “safe IT practices” training session for personnel, it is business suicide not to enact and enforce a password policy.

If you do not have a password policy, we urge you to create one, now. Issue a memo about passwords with a deadline, and identify a trusted management or IT staffer to follow up and ensure compliance. To get workers excited, sponsor a contest, and offer a gift certificate or other perk to the person with the best password and the one that reaches compliance first.

To help you get started, here are a few pointers:

Many data storage solutions incorporate strict password policies, and a number of affordable security solutions police them. After you get everyone on board with password management, consider working with an IT consulting or IT support firm to adopt a technology-based enforcement mechanism. It will pay for itself, quickly.

DynaSis has been Atlanta’s premier IT support services provider for more than 23 years. As an IT company working with small to midsized businesses (10 to 150+ users), DynaSis has developed a unique 12-layer approach to network threat protection, ransomware prevention and crypto virus threat elimination. The DynaSis Business Cloud functions through a highly secure environment with full real-time data backup. Please contact us at 678.218.1769 or visit our website at www.DynaSis.com.

 

By the DynaSis Team

[featured_image]

IT consultants for many firms, whether they promote themselves as IT support companies or managed service providers, will tell you they are going to “monitor and manage” your systems and/or network. Others may say they specialize in “network and systems administration.” As a business owner seeking the most protection for your IT systems—and value for your investment—you likely wonder, what does this mean? Are all these types of services the same? How do they protect me and my company?

These are important questions you should ask of any current or prospective IT provider. To help you evaluate the answers you receive, here is some background.

From a generic perspective, network and system monitoring and management means keeping an eye on your network (and potentially its devices) and your servers or other IT hardware, to enable intervention before or after problems arise. Network and systems administration, generically, means the same thing, although some providers who “administer” do not “monitor.”

For a reactive IT solutions provider, this could mean looking at weekly or monthly logs (reports) of system “error codes” to see if anything might be going wrong. If the provider notes any obvious problems, they might notify the customer and ask if they want follow up (often for an additional fee). Alternately, they might not report the aberration but instead will note it, in case problems occur down the road. Neither of these approaches is cost effective in the long-run, and they also don’t promote system stability.

A proactive managed IT services firm, on the other hand, will likely provide remote monitoring. The service will scan the network and systems for problems, analyzing traffic and other information using advanced processes to identify signs of impending trouble. It will also create alerts for changing conditions, such as the need for system updates. The IT provider’s staff will have access to real-time performance data and can intervene to troubleshoot, respond to alerts and more, which helps to avert serious trouble before it occurs. (We call this issue avoidance.)

Proactive versus reactive IT service is an important distinction, as the examples above show. Some IT providers follow what we call a “break-fix” model—“If it breaks, we will come fix it.” Firms like this are at the far end of the reactive spectrum. They rarely have the ability to perform any automated monitoring or proactive troubleshooting and issue avoidance. Providers such as these may try to minimize the value of proactive services, asserting they are not worth the expense. Some will even mislead potential customers with obscure service descriptions.

In our experience, proactive network and system monitoring can dramatically increase system uptime, more than paying for itself in productivity gains. For small and midsized businesses hoping to grow and thrive, it provides another benefit. Per a study conducted by IT automation firm Kaseya, using remote, automated monitoring tools for both routine tasks and problem avoidance enables personnel to spend more time on strategic projects that drive productivity—and the success of the business.

DynaSis has been providing managed IT support services to Metro Atlanta’s small to midsized businesses since 1992. We provide Availability – making sure your network is up and running; Mobility – allowing your employees world-wide access to your network; and Security – as an Internet security company, we resolve “issues” before they grow into problems. If you want to learn more, please visit www.DynaSis.com, or call us at 678.218.1769.

By the DynaSis Team

[featured_image]

With bad news about cybersecurity hitting the media nearly daily (including recent attacks on healthcare organizations), it’s hard for a business owner to know what to do. It’s also easy to think, “Let’s focus on securing what we have and not add anything else to the mix.” Certainly, securing corporate assets (along with training the employees not to expose them) is a sound idea. However, refusing to explore new ideas and technologies out of concern for security isn’t the safest strategy.

One approach that has proven security value is virtualization. With virtualization, a company’s files and other digital assets are distributed by designated criteria and stored, not all together on one physical or cloud server, but rather on multiple “virtual” servers. These are discrete partitions, each of which can have its own level of security, access control and other protections, yet all can reside on a single on-premise or cloud resource. Assets can be separated by user, with each department or employee having its own virtual resource; by security need, with public, private and sensitive/proprietary files each on different virtual servers; or by any other criteria.

It may be a bit confusing to imagine how a group of files on a single server can be separated so completely, so here’s an analogy. Consider an overcoat with one or more hidden pockets. The wearer can put his wallet and all other valuables into one hidden pocket, but if a thief finds the pocket, everything will be gone. He or she could also divide those valuables among several hidden pockets, reducing the chances of the thief finding all of them—and increasing the time it takes. One or more pocket could be secured with multiple defenses, making those valuables the safest, of all.

Expanding this example, imagine now that owner is carrying candy for his or her small children and a present for the spouse. He or she puts the candy in a hidden pocket at the waist, but puts the presents in a zippered breast pocket. Upon arriving home, the children can find the candy quickly, because they can reach—and know how to open—the right pockets. However, they won’t be able to reach or see the hidden present intended for someone else.

That’s exactly how virtualization works. It isolates data in the manner that the corporate decision maker desires, making it more difficult not only for outsiders to find it, but also for the firm’s own “children”—employees—to discover files they are not supposed to see or access. Virtualization also makes is easier and less expensive to secure mission critical resources, since the most aggressive security efforts can focus on a single “pocket” rather than the entire coat.

Virtualization used to be considered one of the more advanced IT solutions, but that is no longer the case. Managed services firms routinely orchestrate virtualization for their customers. However, the best, most experienced managed IT services companies proactively work with organizations to ensure virtualization solutions optimize security and productivity while minimizing cost and complexity.

Selection of an IT outsourcing company is a very important business decision. For almost a quarter century, Atlanta’s small to mid-sized businesses have relied on DynaSis’ for managed IT services, internet security, and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.218.1769.

[featured_image]

By the DynaSis Team

Of the many sources of organizational risk that business leaders envision, printers likely aren’t one of them. Admittedly, one could run out of paper or toner/ink right before printing a major presentation for a customer. But other than that, how much risk can a printer pose? In today’s connected environment, the answer is “a lot.”

If your printers are networked, which means employees can send jobs to them from their desks or devices, then your printer is tied in with your network, and anyone who can access your printer can access your network. If you are thinking, “but my printer isn’t connected to the Internet, so how could someone gain access?” think again.

If your personnel connect to the Internet, and they connect to your printers, then the two are tied together. Furthermore, some printers automatically send and receive information, such as driver updates, across the Internet without anyone’s knowledge. That creates an additional layer of vulnerability.

Another way your printer can expose you to risk is through storage. Do your printers have the ability to store jobs for later printing? If so, they can (and likely do) retain information after the fact. Most printers have a “cache” for storing information, if not a designated hard drive, and unless someone clears it, the information is there for the taking.

Even assuming no one steals data from the printer while it is at your office, what happens when you sell or trade the printer? Even if the drives and caches are wiped, in some cases it is possible to lift data images off drums and other printer components.

Protecting your printing transmissions and data is beyond the scope of this article, but we can refer you to a few good tips. Rather, our objective here is bigger. Your office printer is a concern, but it is just one example of how “risks” are all around business owners today, often in the most unexpected places. Savvy cybercriminals know this, and they are learning how to penetrate companies in odd ways, such as through a printer-driver update link that may not be detected by the “average” firewall.

We are not suggesting that business owners be cognizant of all these risks, themselves. We’re not even suggesting that they should take action to avoid all of them. Rather, business owners must be keenly aware that business risks can be anywhere and everywhere, and they must take prudent, considered action as risk relates to technology. That means:

To do anything less is to admit defeat. In that case, we recommend the business owner start planning an exit strategy, because that’s what he or she will need, next.

DynaSis has been Atlanta’s premier IT support services provider for more than 23 years. As an IT company working with small to midsized businesses (10 to 150+ users), DynaSis has developed a unique 12-layer approach to network threat protection, ransomware prevention and crypto virus threat elimination. The DynaSis Business Cloud functions through a highly secure environment with full real-time data backup. Please contact us at 678.218.1769 or visit our website at www.DynaSis.com.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram