A firewall is the first line of defense against hackers for small businesses. The act as a barrier between computers and threats from the internet. Firewalls are a necessity to protect your and your client’s data.
What is a firewall?
A firewall is a security system that analyses and controls traffic that comes in or goes out of a network. A set of rules are defined in the firewall that allow or block traffic from traveling through a network. It also Firewalls can block virus and malware from entering your network, before they get to a user’s desktop. They can keep employees productive also. Sites can be blocked based on the types of content they provide (Media, adult content). Netflix can be blocked, but work-related sites are allowed.
Two Types of Firewalls
Software firewalls are installed on most modern desktop computers. Windows 10 has a built-in firewall. Some types anti-virus software come with a software firewall included. These firewalls may work well on a home PC, but they are costly to manage on a business network. Each computer needs to be configured and maintained separately. This can be time consuming and expensive. An employee may be able to disable the firewall on their computer also.
A hardware firewall is a physical device that sits on your network. All traffic in or out of the network goes through the firewall. The firewall reads all traffic and determines if it safe for send along. If someone tries to download a virus, the firewall will block it. Hardware firewalls are easier to manage than software firewalls. Configuration changes that affect the entire network can be made in one place and not on each computer. If the firewall needs to be updated, only one device needs to updated, instead of every machine on network.
The Necessity of Firewalls
Firewalls protect against threats, like virus and malware. As traffic enters a network, the firewall scans the traffic. If it finds a threat, it is blocks and does not get forwarded to a user’s computer.
Firewalls can monitor network for breaches also. While the firewall is inspecting internet traffic, it is looking for suspicious activity. This activity could be someone from the outside trying to access a computer inside your network. The activity will be blocked if it determines that it is not safe.
Control Internet Usage
Some small business would like to control what sites their employees are accessing while at work. Employees access streaming services, like Netflix, can slow down the entire network. Employees accessing can reduce productivity and allow threats into the network. Firewalls can block access specific sites. Entire types of sites can be blocked also, like media streaming sites or gaming sites.
If a small business accepts credit cards, they need to follow PCI compliance rules. One of the rules requires businesses to have a firewall on their network. A firewall protects customer data such as credit card information that hackers are looking for. A network breach where customer data is stolen can be expensive too. The average cost of a PCI breach is $36,000.
Price of Firewalls
Firewalls prices aren’t out of reach for small businesses. Prices range from $500-5000 depending on features and length of support.
Choosing the Right Firewall
Firewalls must be compatible with your current network. They need to be configured correctly and updated regularly to protect your business against the latest threats. It is important to contact your IT professional before purchasing a firewall.
Umbrella Infotech provides IT services in Litchfield and Fairfield Counties in Connecticut. We have helped many small businesses choose, install, configure and maintain firewalls. Contact us to discuss your company’s IT needs.
One complaint I hear over and over from clients is their computer is running slowly. Some clients are using older computers with older hardware. Others complain that the brand-new computer is not running as fast they expect it should be. It isn’t necessary to replace a computer to speed it up. Here are some steps that can improve the speed of your computer without dishing out a bunch of cash.
Uninstall unused programs
When you purchase a computer, programs come preinstalled on the computer. You may have never used these programs and they can be removed. These may be program you installed a long time ago, but don’t use anymore. To remove unnecessary programs, Click Start>Control Panel>Programs and Features>Uninstall a Program. Select the program that you want to uninstall and select Uninstall/Change.
Delete temporary files
Temporary files can take up space on your hard drive and slow down programs. Most of these files are no longer needed and can be deleted. Click Start and search for “Disk Cleanup”. Select the drive you would like to clean up. Normally this will be the C: drive. Select Temporary Internet Files and Temp Files. Other files types can be picked also, but make sure you know what you are deleting. Then click okay. If there are a lot of temporary files, the process may take a long time to complete.
Clean up the registry
The Windows registry is a database of configuration settings for your computer. When a program is installed, items are added to the registry. When a program is uninstalled, the registry items may not be removed. If there is a large amount of data in the registry, it may take longer for your computer to start or to open programs. Deleting unused registry item can speed up your computer. There are a few free programs that can be used to do the cleanup. My favorite it CCleaner Free. Download and install the program. Select Registry. Click Scan for Issues. When it complete, click Fix Selected Issue.
RAM, also know as memory, is what your computer uses to load all the information that your programs and files use. If your computer is older, your computer may not have enough RAM to run the programs that your want. Programs that open large files, like AutoCAD, Publisher, or Photoshop, the large files maybe using a lot of your RAM also. Upgrading the RAM in your computer can be a cost effective way to speed up your computer.
Add Drive Space
Your computer uses your hard drive as temporary memory also. If your hard drive is low of space, your computer may not have enough space for temporary memory. Upgrading the size of your hard drive or adding a secondary drive to your computer can fix this issue.
Upgrade Your Drive to SSD
If you are upgrading your hard drive, you may want to replace the old drive with an SSD drive. SSD stands for Solid State Drive. These new types of drives don’t have moving parts like traditionally hard drives which have platters. The drives read and write data faster than traditional drive. SSDs can improve the speed of your computer over 50%. Boot time are faster also. The new drives are more expensive but the gains in speed are worth the cost.
Run a disk defragmentation
When your computer writes to the hard drive, the bytes of data are stored on your computer. The bytes are stored can be stored in random places on the drive. Parts of the same file can be on completely different parts of the drive. When your computer opens a file, it takes longer because to needs to look at two different places to get the information it needs. Defragmenting your computer reorganizes the bytes, so they are logically organized. To defragment your computer, click Start and search for Defragment and Organize Drives. Select your hard drive and click Analyze. The program will scan your drive and recommend if you drive needs to be defragmented. If it does, click optimize and the defrag will run.
If you are still having issues with your computer after completing these steps, there may be other issues with your computer. Contact Umbrella Infotech to schedule a time to review your computer.
Imagine this; It’s 5PM, your employee is rushing to get home. An email pops up on their screen. The subject is “Urgent Big Order”. He opens the email. It looks a little different than emails normally do from the client. The email says, “click the link to get the order details”. Without thinking, the employee clicks the link. The web page asks for a user name and password. He enters his information and clicks Login, but the page does go anywhere. He shrugs his shoulders and says to himself “I will take care of it in the morning” and goes home.
What the employee doesn’t know is that he was just the victim of a phishing attack. The web site was bogus, and now a hacker has his user name and password. While the employee is eating dinner with his family, the hacker is reading through company data or transferring money out of YOUR bank account. By the morning when the issue is discovered, it is too late to do anything. The data or money has been stolen.
The stolen data could have been prevented using a simple, new technology called two factor authentication or 2FA. Two factor authentication adds a second method of authentication when a user logs into a web site or company resource. After logging into a web site, you receive a text message with a code. The code is entered into the web site. If the code is correct, you get into the site. If you don’t have the code, you don’t get in. You may have encountered 2FA when logging into Facebook or Gmail on a new computer.
Two factor authentication requires you to have different types of identifying information, normally a password and code that is sent to a device you own. The code sent via text message or phone call. It can be sent through an app on your phone. Not having access to the phone makes it very hard for a hacker to get into your accounts.
Many small businesses in the New Milford/Danbury area are adding two factor authentication to protect their company resources. Unified Access Systems are can be implemented to protect systems like Office 365, Dropbox, and many other applications. Configuration is simple and can be completely cloud based. Pricing is affordable and billed on a per user basis.
Umbrella Infotech can help your business get started with two factor authentication. Click here to see how we can help you protect your company today.
All business owners know that a secure network is an important factor in keeping their business running. Getting hacked can cause loss of productivity and sales. Having up to date anti-virus software needs to be installed on every computer is important, but that is only part of keeping their organization secure. Many leaders aren’t sure of other ways to protect their business from cyberattacks.
Recently, the National Institute of Standards and Technology released the guidebook Cybersecurity is Everyone’s Job. It lists different ways organizations can protect their network. The guidebook is broken down into sections based on employee roles, like leadership, human resources, and sales. Here is the most important information that I found.
Leadership needs to be actively involved in the organization’s cyber security. They need to understand cybersecurity to make sound decisions. Third parties should be engaged to explain cyber risks and how they can be stopped. Leadership should assist in developing and maintaining organizational security policies and standards. These polices should be developed from risk assessments, regulations, and best practices.
Sales, Marketing, and Communications
The Sales, Marketing, and Communications departments hold important roles in an organization’s cybersecurity strategy also. These teams need to communicate important cybersecurity matters within the company and to outside stakeholders. These communications could be an explanation of the security policy or making employees aware of new security risks. The communications team should be part of the incidence response team and assist in planning for the inevitable cyber incident.
Operations and Facilities
The operations and facilities teams should be involved in security planning and implementation also. They can identify physical security risks of systems and work with the IT to protect these systems. This could be securing a server room. Both teams should develop a physical safety plan. Operations should incorporate cybersecurity measures into their safety program. Employee training should include cybersecurity risks to the physical environment. They can partner with IT to develop systems for guests, which could include a restricted guest network and limiting physical access to systems.
There are several things that every person in the organization can do to reduce cybersecurity risks:
The entire guide book, Cybersecurity is Everyone’s Job, can be read at the NIST web site.
Umbrella Infotech offers cyber security services and training to business. We can develop a cyber security plan for you company. We can monitor you network in real time to identify and act against security risks. Click here to see how we can help you protect your company today.
Data backups should be a vital element in an organization’s IT strategy. It protects against the accidental or intentional loss of data which can cause down time and lowered productivity. Backups are made by copying important data from one device to another. If the data in the first device is lost, it could be restored from the backup copy.
Types of Backup Methods
Onsite backups copy data to a device located at the same physical location as the original data. There are several benefits to onsite backups. Access to the data is fast because it is close. Low cost media can be used. The main downside is if there is a disaster at your location that destroys both the original and backup copies, the data could be lost forever.
Remote backups copy data to a different physical site. The data can be copied over a network location to a secondary storage device. The secondary location could be a site you have physical access to, like another business location. Remote backups can be made to cloud storage also. Backups can be made locally, and the backup copy is physically moved to a remote location by a person. If the data at the main location is lost, it could be restored from the remote back up. Remote backups are good because if there is a disaster at your main site, the data is safe at the remote location. Restoring data from a remote back up can take a long time if the internet connection is slow. They can be costlier depending on the type of storage used, like cloud-based storage.
Data can be backed up to a variety of mediums. The most common is a hard drive. These can connect directly to a computer or over a network. CDs, DVDs, and tapes can be used also. Disc and tape backups are less popular than in the past. For small amounts of data, USB sticks can be used.
Backing up to the cloud has become more popular recently. Your data is copied over a network connection to server hosted in a remote data center. The provider of the server takes responsibility for the upkeep of the data at the remote location. You do not need to worry about the hard drive or the network connection. Cloud based storage is normally more expensive than other storage options.
Other Backup Considerations
Frequency of backups
How often data is backed up is important also. If data is only backed up once a day, changes or new files may be lost if a hard drive crashes before the data is backed up. Backing up data too often can cause issues also. The network connection can be overloaded with back up data. The backup device may slow down if it is receiving too many backup requests at one time. The risk of losing data needs to be weighed against the potential of system slowdowns.
File level vs image backups
When we think of backups, we normally think of a Word or Excel document on our computer. If your computer hard drive crashed, your files have been saved, but the operating system and programs need to be re-installed which can take a long time. All computer settings are lost also. An image can be taken of an entire computer, which it like taking of photograph of your computer at a point in time. Imaging software copies a computer, bit by bit, to a backup location. The image can be used to restore the entire computer using the image file. The restore takes a lot less time that re-installing all the programs. All the programs settings, Wi-Fi connections, and user settings are restored. Image backups take more space that file backups because all the files on computer are backed up, not just ones that you decide to back up.
Click here to see how Umbrella Infotech can help you protect your company today.