10 Cybersecurity Tips for Your Small Business

If you run a small business, you have a responsibility to your employees and customers. Your employees rely on you to provide them with a steady paycheck in exchange for all their hard work, and your customers rely on you to provide top quality products and

services.

Your customers also expect you to keep their personal data safe, from the credit cards they use to make their payments to the names and addresses they provide. If you run a small business, you have a responsibility to those customers, and you need to take cybersecurity very seriously.

It seems sometimes that not a day goes by without another data breach, and many of those intrusions are aimed squarely at the small business community. If you want to protect your business and its data, start by building these cybersecurity tips into your daily operations.

  • Train all employees on the importance of cybersecurity, including the security of their personal devices. Continue their education with regular refreshers and warnings about current cyberattacks.
  • Set up a separate Wi-Fi network to let workers and guests connect their smartphones and other handheld devices. Personal devices can be a weak link in the security chain, so keeping them off the corporate network improves your overall protection.
  • Use strong spam filters and check their accuracy regularly. Many cyberattacks originate with infected emails.
  • Consider turning off clickable links in incoming emails, at least for emails that originate outside the company.
  • Establish a strong firewall and keep it updated. Whether you use a software firewall, a hardware device or a combination of both, your firewall is your first line of defense against cyberattacks.
  • Test your backups on a regular basis by doing dummy restores. Your cybersecurity and ransomware defense is only as good as your latest backup, and it is important to know where you stand.
  • Keep every device on your network, from network attached storage devices like external hard drives to the servers in the data room to the computers on the desks, up to date with the latest security patches. Make sure your operating systems and software packages are up to date, and do spot checks to make sure the recommended updates are being applied.
  • Stay abreast of end dates for software support. When support for a given operating system or software package ends, so do the security updates. Always have a plan in place to update your operating systems as the support end dates approach.
  • Consider outsourcing your IT operations to a third party. It can be hard for small business owners to keep up with the never-ending security requirements, and outsourcing those tasks can improve safety and give those owners one less thing to worry about.
  • Give employees only the access they need. Insider threats run the gamut, from the unintentional sharing of proprietary information to the deliberate theft of company secrets. Following the least access policy can minimize these dangers.

Running a small business is hard, and keeping your customer data safe can be even more challenging. The threats to data security are not going away – if anything they are ramping up with every passing day. Small businesses are increasingly the targets of sophisticated hacking attempts, ransomware attacks and other online threats, and it is easy for your own business to be caught unaware. Building cybersecurity into your daily operations is the best way to protect yourself, starting with the 10 security pointers listed above.


10 Ways Nonprofit Agencies Can Enhance the Privacy of Their Data

Data breaches are nothing new, and they are no longer confined to for-profit businesses. More and more nonprofit agencies are finding their data compromised, leaving their donors, volunteers and the people they serve vulnerable to identity theft and other serious ramifications.

There are several reasons that nonprofit agencies are increasingly becoming the targets of hackers and the writers of ransomware. One of the most significant reasons for the targeting is the perception that nonprofit agencies often lack the sophistication to protect their data adequately, and there is some truth to this assertion.

Nonprofit agencies often run on shoestring budgets, with little money left over for IT staff or outsourced data monitoring. For many years, some nonprofits have treated security as an afterthought, but these days no one can afford to be blasé about protecting the integrity of their information.

If you run a nonprofit agency or work for one, you need to take a proactive approach to data security. Here are 10 things you can do right now to protect your donors, your customers and the data with which you are entrusted.

  • Collect only the information you need. Whether you are collecting money from donors, working with the people you serve or bringing new volunteers onboard, minimize the amount of data you collect.
  • Recruit volunteers with solid technical skills. Having volunteer staff with up-to-date technical skills is a great way to protect your data without interfering with the good work you do.
  • Store sensitive information offline. If you must store Social Security numbers, credit card data and other confidential information, keep it in an offline database.
  • Provide employees and volunteers with the least necessary amount of access. Giving staff members access to only the information they need to do their jobs reduces the chance of data leakage and helps keep everyone safe.
  • Train your employees and volunteers on security best practices. Provide each new worker or volunteer with data security training, and hold regular sessions to remind them how important it is to keep the firm’s data safe.
  • Install a quality email filter and check it regularly. A good spam filter can reduce the chances of email-based phishing attempts and data breaches.
  • Filter internet traffic as well. Just loading a compromised website could put the security of the entire network in danger, and a good filter is your first line of defense.
  • Turn on automatic updates for all your connected equipment. Keeping your software up to date is an essential part of data security for nonprofits.
  • Schedule an annual security test for your network. Intrusion testing should be an integral part of your data security, and a yearly review will give you, and your customers, peace of mind.
  • Require strong passwords for website access. Online access can make it easier to give donations to the nonprofit, but weak passwords can put those donors at risk. By requiring a secure password for the nonprofit website, you force everyone who logs on to take their security seriously.

Nonprofit agencies face significant challenges when keeping their data safe. From the assumption of weak security to the reality of stretched budgets, these difficulties can create real problems. By taking a proactive approach to the safety of your donor, volunteer and customer data, you can enhance data security and make a data breach far less likely.


7 Reasons You Should Switch to Cloud-Based ERP Software Systems

ERP softward solutions with Elevated Tech

More than ever, small to medium-sized businesses are favoring cloud-based enterprise resource planning (ERP) solutions. While it may seem daunting to transfer your resource management systems off-premise, for most businesses it’s a smooth, streamlined process. Yes, there’s an initial learning curve, but most systems are intuitive, customizable, and cost-efficient. Here are seven reasons you should switch to ERP software.

  1. Data Management and Security

Most cloud-based ERP solutions have enhanced user-permission settings. What that means is greater security for all your data, including processes, financial, resources, planning, and inventory. ERP software offers a more robust security package than typical spreadsheet programs or document sharing solutions.

Software-as-a-Service (SaaS) providers monitor systems 24/7 and can patch any potential security exploits as soon as they’re discovered with automated, real-time updates for all users. Compare that with only discovering a security issue once there’s been a breach and then having to report the issue and wait for a response. Most reputable cloud-based ERP vendors support higher security standards than a typical small to medium-sized business can afford on their own.

  1. Knowledge Sharing and Community Support

With on-premise ERP software, customer support can be slow and expensive. But with cloud-based solutions, you have access to a vast knowledge base drawing on the experience and expertise of hundreds of thousands of business users. User forums for SaaS ERP solutions are active and efficient, providing experience-based resolution to issues in record time. You’ll have access to the vendor’s customer support service packaged into your monthly subscription. It’s a win-win, best-of-both-worlds situation.

  1. Improving Data-driven Business Decisions

Other advantages of cloud-based ERP systems are standardized data and integrated data management applications. In practice, that means better speed and accuracy when performing year-to-year analyses and forecasting.  Most ERP software solutions offer a user-friendly, browser-style interface and dashboard.

  1. Facilitate Regulatory Compliance

Cloud-based ERP software systems facilitate compliance with government regulations. Most providers deploy GAAP as the standard in financial management software, for example. Integrated data systems increase ease of traceability across the supply chain.  Compliance with data security standards is built in and updated for you.

  1. Automated Daily Business Processes

Most on-premise software solutions demand hours of employees’ time to run even basic processes. Cloud-based ERP systems allow you to automate operational and administrative processes such as linking orders to accounts, sales reporting, human resources management, manufacturing processes and distribution tracking. This leaves your employees free to concentrate their time and creativity on revenue enhancing processes rather than process management.

  1. Your Business in Your Pocket

To access on-premise ERP software systems you have to be on the premises. But most cloud-based providers offer integrated native applications for mobile devices. More than just allowing you to keep in touch, this means you can monitor key performance indicators such as sales, revenue, acquisitions, and web traffic in real time wherever you are. You can carry the office with you in your pocket and access and manage data on the move.

  1. Competitive Pricing and Customizability

The SaaS cloud-based ERP software solutions market is growing. That means it’s competitive and good for customers. The upfront and on-going costs of cloud-based solutions are favorable for small to medium-sized businesses as there’s no need for investment in hardware, infrastructure, added staff training, or licensing. As vendors compete for your business, they’re offering ever-more flexible and customizable products so you’re almost certain to find a solution tailored to your needs.

The Future is in the Cloud

The operational capabilities offered by cloud-based enterprise solutions are attractive and cost-efficient. Coupled with enhanced process automation an intuitive, dynamic user interface and mobility, there’s little competition. The future of enterprise resource management is in the cloud. Smart businesses bring the future forward. Now is the time to switch to cloud-based ERP software solutions.


What You Need to Know About Ransomware

ransomware protection with Elevated Tech

Social media is full of scare stories about ransomware and the damage it can do to businesses and personal users. However, taking a few precautions and planning ahead can minimise the potential for damage. Understanding what ransomware is and how it works enables you to protect your computers and important files. Here’s what you need to know about ransomware.

Ransomware

Ransomware is an increasingly prevalent form of malicious software (malware) that works by blocking access to files, folders or whole devices. Once cybercriminals have taken control of your system, they can demand a ransom to restore your files. Ransom payments are usually made with cryptocurrency, although credit cards, PayPal and even cash payments are sometimes used.

Types of Ransomware

Encryption ransomware works by encrypting individual files or folders so that you can only access them with a special code or encryption key. With this type of ransomware, you should still be able to use your computer and any unaffected files.

Screen lockers work by blocking access to your entire computer. If your computer has been infected with screen-locking ransomware, you will see a full-size window covering the whole screen. This window will contain instructions for making the ransom payment. The message on the lock screen may claim that your computer has been locked due to suspicious or illegal activity and will often appear to come from an official source, such as law enforcement or legal departments.

Another common type of ransomware is the security scam, which starts by displaying a pop-up window that appears to come from your antivirus or security software. The window may claim that your computer is infected with a virus and the only way to remove it is to make a one-off payment for a special removal tool.

File encryptors, screen lockers and security scams are the most common forms of ransomware, but there are new types being developed all the time.

Sources of Ransomware

Ransomware can come from a number of sources, including email attachments, infected websites and malicious advertisements. Spam emails containing attachments or links to malicious websites are among the most common causes of malware infections. Links in social media posts, online forums and even messaging apps can also direct users to infected websites.

Malicious advertisements can contain code and webpage elements that distribute ransomware and other malware to unprotected computers. These advertisements are automatically loaded when you visit particular websites, which means that your computer can be infected with malware even if you don’t click on the advertisement or link. Browser add-ons, infographics, program installation files and many other files downloaded from the Internet can also contain malware.

Protecting Against Ransomware

Staying vigilant and being cautious when opening email attachments, clicking on links and downloading files from the Internet will significantly reduce the risk of ransomware infection, but there are other things you can do to increase security and protect your computer from malware. Installing a security suite and antivirus software is essential for any computer or device with access to the Internet.

Most operating systems and browsers provide extra security settings to increase online safety. However, the best protection against ransomware is to make regular backups of all your files. If you keep up-to-date backups of your data, you will be able to restore any files encrypted by the ransomware.

Ransomware Infection

If your computer is infected by ransomware, you can try using decryption tools to recover encrypted files. You can also try using software available from trusted security companies to regain access to a locked computer. However, these tools are not effective for some types of ransomware. Often, the best solution is to wipe the hard drive and reinstall the backup files. Security experts advise users never to pay the ransom, as there is no guarantee that cybercriminals will restore the files.

Finally, you should report any ransomware attacks to the relevant authorities in your country, as this helps security experts to design tools to protect against this ongoing threat.


Five Online Scams to Watch for in 2018

scam alert

Online scammers never rest. They always find new ways to trick people. You must be vigilant. If you are active online, it is important to stay educated about the scammer’s methods. Here are five scams to watch out for in 2018.

Netflix Phishing Scam: Netflix has a customer base of over 100 million users. That makes it a frequent target of scammers. Some users have received an email asking them to update their billing information before their membership is suspended. If you receive such a message, be cautious. It is always risky to follow links in an email. Before updating your information with Netflix, go directly to the official website and log in from there.

Google Chrome Browser Freeze: Google Chrome is the most widely used browser, which makes it a frequent target of scammers. Upon visiting certain infected websites, Google Chrome will begin to download thousands of files. Soon after, your Chrome browser is likely to become unresponsive. Next, you receive a pop-up with a toll-free number to a fake technical support line.

This malware spreads through the use of infected ads on reputable websites, so using an ad blocker will prevent most attacks. Make sure that your computer’s virus protection is up-to-date. If your browser freezes, you can still close Chrome through the task manager by selecting Control-Alt-Delete on your keyboard.

New 2018 Microsoft Phishing Scam: Many Microsoft Hotmail, Live, and Outlook users have received fraudulent emails claiming that their account will be frozen if they don’t update to 2018 Microsoft. If you follow the link in the email, you are asked to enter your username and passwords. If you do as the scammers request, they will have access to your login information and can take control of your Microsoft-related accounts.

If you receive this message, go to Hotmail, Live, or Outlook directly. After you log in to your account, you will receive instructions if there are indeed any problems. Remember: don’t ever follow a link in a suspicious email.

FedEx Parcel Scam: Many FedEx users have received phishing emails with a subject line stating “FedEx: Delivery Problems Notification”. The scammers have created an email template almost identical to FedEx’s official email template, so beware. If the email asks for information about credit cards, invoices, or account numbers, it is not a genuine email from FedEx. If you have any questions about your FedEx account, go directly to the FedEx website and log in from there.

$1,000 Amazon Gift Card scam: This scam has been around for years, and is still a problem in 2018. Infected ads at reputable websites install adware that shows pop-ups. Once infected with the adware, you will receive a message claiming you have won a $1,000 Amazon gift card. If you click the pop-up, it takes you to a short survey. After you complete the survey, you are asked to provide personal information, such as banking details and contact information.

Never click any pop-ups that claim you have won an Amazon gift card.

Online scammers are very creative, continually developing new tools and methods. But the criminal’s best weapon always remains the same: exploiting user complacency. Even if you know the site is reputable, be suspicious when you receive emails and pop-ups. If you have a question about one of your accounts, go directly to the website and log in. Don’t ever follow a link in an email unless you are 100% certain it is authentic. Keep up-to-date on the latest scams. Be smart and stay safe.  Contact Elevated Tech today for user awareness training!


Cyber Security Tips to Safeguard Your Social Media Accounts

social media super hero

When taking steps to maintain cyber security, it’s not only your website and email that you want to secure but also your social media accounts. Cyber-attacks are a risk for your business as well as to the privacy and security of your followers.  Unsure about the security of your Social Media accounts?  Contact our Cyber Security Department today!

Risks to Social Media Accounts 

While people often think about cyber security concerning websites, it’s also necessary to keep this in mind when using social media. As sites such as Facebook, Twitter, Instagram, LinkedIn and others get vast amounts of traffic, it’s increasingly tempting for hackers to target these platforms. Businesses also face significant challenges in this area. If you have a business, your finances, reputation and customers’ security are all at risk. Some of the dangers include:

• Identity theft. This is a potentially devastating problem. Identity thieves use personal information to steal money, commit crimes or simply out of malice. Anywhere online that you store personal information, including social media sites, is a potential gold mine for identity thieves.

• Account hacking. When hackers gain control of your account, they can post anything they want. Many hackers do this simply for fun. For a business, however, there’s nothing fun about the hit to your reputation if someone posts offensive content under your name.

• Malware. These programs are often used for spamming, to collect information, or to deliberately harm someone’s computer. Social media sites are full of links to malware. If you and your employees aren’t careful, it’s easy to infect your computer when someone clicks on such a link from one of your social media accounts.

• Phishing scams. This is a type of scam where hackers impersonate a legitimate company for malicious purposes. One danger is that someone will impersonate your business to scam your customers. Another is that someone in your company falls victim to a phishing attack and compromises your information.

These are some of the most common security risks on social media. In some cases, attacks are from random hackers. Businesses, however, also face threats from unscrupulous competitors, dissatisfied and vengeful customers, and ex-employees.

How to Safeguard Your Social Media Accounts 

There are risks every time you access the internet. However, certain precautions make you safer. Here are some of the best ways to keep yourself safe on social media.

• Monitor your accounts. If your business is active on social media, you probably log in regularly to your accounts anyway. If you’re lagging behind on one or more sites, however, make sure you periodically check in to at least make sure everything looks good. If someone has hacked into your account, you want to know about it as soon as possible.

• Have a strict social media policy. You put your business at risk with social media practices are too casual or undefined. For example, it’s best to have a dedicated team in charge of social media rather than giving everyone access to your accounts. Putting an expert in charge helps to keep you safer and helps you maintain a consistent policy. Make sure you have clear rules about what your employees can and cannot do on social media sites. You might, for example, tell employees not to post personal information on your company account. Also set rules on sharing content and clicking on links.

• Keep your passwords secure. Make sure all of your passwords are complex and hard to guess. Never use simple sequences of numbers, personal names, or dates. Use a unique password for each site (i.e., don’t use the same password on Facebook, Twitter, etc.) Only reveal passwords to people who need access to social media accounts. Whenever an employee with password access leaves your business (or when an agency or freelancer completes a project), change your passwords.

• Use two-factor authentication. Two-factor authentication is an important step that makes your accounts more secure. That is an extra step needed to access your accounts, such as a question (e.g., “What was the name of your first pet?”), an image, or a verification code.

Site-specific Tips for Social Media Security 

While certain cyber security principles apply everywhere, there are also specific differences between the different sites. Here are some things to keep in mind on some of the most popular social media platforms.

• Facebook — Check out Facebook’s extra security features such as setting up login approvals, which is an example of two-factor authentication where you need an additional step to log in. Turn on login alerts, so you know when someone logs into your Facebook account from a new device or location.

• Twitter — Go to privacy and safety settings. The most important settings here are “verify login requests” and “require personal information to reset my password.” Without these precautions, anyone can change your password. You may also want to disable “add a location.” Clicking on “protect my tweets” means only people who follow you see your tweets. As a business, of course, there are reasons to keep your tweets public.

• LinkedIn – On LinkedIn’s privacy settings, there are quite a few options, such as deciding who can see your updates and connections. Here it’s up to you to find the right balance between privacy and visibility. Turn on two-step verification to secure your account. Because LinkedIn is a B2B network, you have to watch for hackers putting up fake company profiles or people falsely claiming to work for you. One way to reduce risks here is only to accept invitations to connect with people you know.

In some ways, it’s more challenging for businesses to secure their accounts than individuals. You don’t want to keep your posts and business information private as you obviously want to attract publicity. However, it’s still important to use caution and make sure you make it difficult for anyone to hack into your account or steal your information. Keep these guidelines in mind and make sure that all of your employees use common sense and are well-trained in basic cyber security principles.


Why Small Businesses Should Use the Cloud

cloud services houston

As of today, more than 30% of small businesses across America have migrated to the cloud, with that number expected to triple by 2020. Simply put, the cloud has revolutionized the way small businesses are run. Despite this, some businesses are still skeptical about the cloud. To contest this resistance, here are the top reasons that any and all small business owners should consider Elevated Tech’s Managed Cloud Solutions.

Cost

The first and most obvious reason is that moving to the cloud can save a lot of money in the long run. There are a few reasons for this, one of which is that cloud computing fully makes use of its hardware, while also increasing its value, meaning the business that owns said server can accomplish more with less. The outcome is that small businesses have lowered IT requirements, rack space, and power usage, among other things. The frankly invaluable result of this change is lower hardware, maintenance, installation, support and upgrade costs.

Collaboration

Because of the sharing capabilities of the cloud that are able to save one master document across several computers, more than one employee can work on the same project at once more efficiently and in real time. It also gives employees who have to leave the office but still need to work on something the ability to finish at home. Plus, managers can make sure their employees are in fact working on their assignments by being able to check in whenever they want.

Flexibility

One of cloud file sharing’s most tempting draws is the ability to access whatever you want from any device connected to the cloud. These days, accessing files, documents and other such work-related items when not in the office is essential, even for smaller businesses. Utilizing the cloud, managers can access essential files anytime, from anywhere, via a wide variety of devices, from smartphones to laptops. This can also be implemented as a cost-saving measure by having employees bring their own devices to work, saving the company money on electronics entirely. Plus, this allows employees to work on devices and interfaces they’re most comfortable with, meaning everyone wins.

Integration

With cloud-based business solutions come a wide range of chances for simple but effective integration. Small businesses that have adapted to the cloud receive the option of integrating with providers that work exclusively in the cloud. For instance, small businesses now have access to specializations on back-office operations that they had no knowledge of otherwise. These include specializations on human resources, marketing, and many others. This can give the owners of small businesses more time to focus on more critical operations of their business. In short, integration on this level frees up so much time for small business owners.

It cannot be overstated just how much help the cloud has been for small businesses in keeping up with the major players in this increasingly competitive market. The cloud has its downsides, yes, and can seem scary to the less informed. But for a small business owner trying to stay afloat, it is an invaluable tool that can help your company soar above your contemporaries.


Dark Web Monitoring Is Here!

 

Elevated Technologies Now Delivers Dark Web Monitoring Services through ID Agent Partnership

 Elevated Technologies Offers Monitoring and Alerting of Stolen Digital Credentials, Increasingly Valuable Asset on Dark Web

 Houston, TX – January 30, 2018 – Elevated Technologies announced its new Dark Web monitoring services provided through its partnership with ID Agent, provider of Dark Web monitoring and identity theft protection solutions. With Dark Web ID, Elevated Technologies offers around the clock monitoring and alerting for increasingly compromised digital credentials, scouring millions of sources, including botnets, criminal chat rooms, peer-to-peer networks, malicious websites, bulletin boards and illegal black market sites.

“With the security landscape ever changing and more small / medium size businesses are being targeted, a partnership with ID Agent was a must.  They add a robust Dark Web monitoring solution to our new Cyber Security department Elevated Cyber Security.  This new department is solely focused on a vast amount of security services for the SMB community.  We welcome ID Agent onboard and look forward to a great business partnership assisting the Elevated family.” said Jason Rorie, Founder of Elevated Technologies.

The Dark Web is made up of various digital communities, and while there are legitimate purposes for the Dark Web, it is estimated that over 50 percent of all sites on the Dark Web today are used for criminal activities, including the disclosure and sale of digital credentials.

“Digital credentials such as usernames and passwords are widely used to connect to critical business applications – the reason these credentials are among the most valuable assets found on the Dark Web,” said Kevin Lancaster, CEO of ID Agent. “Unfortunately, the unaffordability of cyber offerings has played into the cyber poverty line experienced by small businesses. Dark Web ID, however, delivers an affordable model that provides small businesses with the same advanced credential monitoring capabilities used by Fortune 500 companies to organizations in the SMB and mid-market space.”

Dark Web ID is the industry’s only commercial solution available to detect customers’ compromised credentials in real-time on the Dark Web. It vigilantly searches the most secretive corners of the Internet to find compromised data associated with your customers’ employees, contractors and other personnel, and notifies them immediately when these critical assets are compromised. There are a few competitors in the market but none completely focused on the Dark Web as ID Agent’s solution.

About ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions to private and public sector organizations and to millions of individuals impacted by cyber incidents. The company’s flagship product, Dark Web ID, combines human and sophisticated Dark Web intelligence with capabilities to identify, analyze and monitor for compromised or stolen employee and customer data, mitigating exposure to clients’ most valuable assets – their digital identity. From monitoring your organization’s domain for compromised credentials to deploying identity and credit management programs in order to protect the employees and customers you serve – ID Agent has the solution. For more information, visit: http://www.idagent.com or go to LinkedIn, Twitter or Facebook.

About Elevated Technologies

If you want more from your IT support company and are in need of a robust system to solve even your most challenging technology problems, your solution starts with Elevated Technologies. With Houston’s most advanced team of IT support experts and one-of-a-kind IT solutions, even your most challenging technology problems are no match for Elevated Tech. Our team of IT support experts implement advanced technology strategies, leveraging IT as a competitive advantage. Our mission is to create a personal, trusting relationship with every client in order to serve each business to the fullest.


How to Stay Safe on Public Wi-Fi

public wifi safety

Public Wi-Fi connections provide free access to the internet, allowing you to stay connected while away from home. However, using public Wi-Fi can be risky, as any personal details and sensitive information sent over an unsecured wireless connection could be intercepted by other people using the same network. If you intend to use public Wi-Fi connections, there are a few precautions you should take to keep your device and data safe.

Keep Updated

Software updates provide the newest patches to protect against security threats, so it’s crucial to keep your operating system, software and apps up to date. Ideally, you should be using the auto-update option on all computers and devices with internet access. Elevated Technologies provides IT management of mobile devices along with laptops, desktops, servers, etc.

Install Security Software

A firewall is essential for all computers, but a good all-around security system should also protect against viruses and spyware. For mobile phones and other devices, there are many free security apps available from reputable companies, such as McAfee, AVG and Avast.

Tweak Your Settings

Turn off file and printer sharing before connecting to public Wi-Fi. Most computers will do this automatically if you set up the Wi-Fi connection as a public network. Most mobile phones, tablets and other devices also offer extra protection for public Wi-Fi connections, but these security options vary greatly from one device to the next.

Add Extensions and Privacy Apps

Browser extensions like AdBlock Plus, Ghostery and Privacy Badger can help to protect privacy and keep your data secure. For mobile phones and other devices, Ghostery Privacy Browser and Firefox Focus offer enhanced privacy protection when browsing the internet.

Use a VPN

A virtual private network (VPN) enables you to route all of your online activities through a private and secure network. The easiest way to set up a VPN is by using a service, such as IPVanish, TunnelBear or ExpressVPN. You can also set up your own VPN, but this can be complicated, so it’s important to do plenty of research before attempting to create your own private network.  Let us assist with setting us your secure company VPN for traveling devices!

Use Extra Security Measures

Many websites now use secure connections (HTTPS), but some older websites still use unsecured connections (HTTP), so it’s important to look at the address bar to make sure that you are accessing a secure website, especially if you intend to enter sensitive information, such as usernames or passwords. Whenever possible, use two-step security settings for your email and other personal accounts, as this will provide an extra layer of protection.

Public Wi-Fi is a convenient and free way to access your online accounts, but it also leaves your data vulnerable to hackers. Taking a few precautions will help to secure your computer and devices, but you still need to be careful when entering sensitive information. In particular, you should avoid accessing your bank, credit card or other financial accounts through public Wi-Fi.  Contact Us Today for a no-cost IT Security Assessment of your IT Network and Devices!

 


Prevention is Ideal, but Detection is Essential!!

network security with Elevated Cyber Security

Looking back at all the threats and breeches of 2017, the threats today and the ones in the future, Elevated Technologies has developed a new, robust security solution for Houston Businesses. We now have a 24/7/365 Cyber Security Operating Center and Incident Response Team!

This means we can collect, correlate, and monitor the logs generated from infrastructure devices whether on premises, cloud or hybrid. By monitoring the logs, our expertly trained security analysts can detect malicious network, domain, and web traffic. Often this malicious traffic will come from known suspicious geographical areas or from domains known to be connected to criminal organizations.

62% of cyber victims are small and midsize businesses. This can’t be ignored. Even if you current have someone doing your IT support, this solution is different and needs to be addressed!

Become compliant with most regulations such as PCI-DSS, SOX, GLBA, FDIC, HIPAA.

Identify and address these (an more) threats

  • Port scans, host scans, denied scans, sudden change of traffic between certain IPs or other anomalies in traffic
  • Network server/device and admin logon anomalies – authentication failures at all times an unusual IPs
  • Network access irregularities from VPN, wireless logons and domain controller. Account lockouts, password scans and unusual logon failures
  • Rogue endpoints, wireless access points
  • Botnets, mail viruses, worms, DDOS and other “zero day” malware identified by cross correlating
  • DNS, DHCP, web proxy logs and flow traffic
  • Abnormalities in web server and database access

Contact Us Today And Receive Our “Understand The Advanced Threat Landscape” Report and Take Advantage Of Our No-Cost Cyber Security Vulnerability Scan