An interview with our System Engineer and Service Manager, Jordan Simpson. “Do not be afraid to mess around with tech. It’s harder to break than you think. Just because something doesn’t work the first time doesn’t mean its totally broken.”
Posts
Increase Your Protection to Reduce Your Cyber-related Costs with Core Tools
By Chris Bierasinski, VP of Business Development
IT Insights of Rochester is a local IT service provider offering managed IT security services and technology solutions in Rochester and nearby areas. Visit our Cybersecurity Protection services page for an overview of the various levels of protection we offer.
This is the first entry in a four-part series of articles. In this initial blog post of the mini-series, we will introduce the various security services structures offered by IT Insights and provide a review of the core tools that we leverage.
THE IMPACT OF CYBERSECURITY
Cybersecurity is critical to your business IT Infrastructure and plays a vital role in the overall health of your organization. In the 2022 statistics released by the FBI’s Internet Crime Complaint Center, they received a staggering 800,944 complaints. Though total complaints decreased by 5% compared to the previous year, losses went up 49%, reaching over $10.3 billion in losses.
To summarize, the threat is real. Seeking a trusted cybersecurity consulting partner to help you avoid and mitigate cyberattacks and losses is crucial.
HOW IT INSIGHTS CAN HELP DEFEND YOUR BUSINESS FROM CYBER THREATS
IT Insights is consistently evaluating tools to help harden defenses. Since opening our doors in 2019, our suite of cybersecurity tools has steadily expanded, adapting to address emerging and evolving threats. As part of our commitment to staying at the forefront of cybersecurity, we prioritize internal training and education. Notably, Nick Polce, with his master’s in Cybersecurity, exemplifies our dedication to expertise and excellence in the field. This commitment ensures that our team is well-equipped to navigate the dynamic landscape of cybersecurity.
Cost-Effective Cybersecurity Solutions
IT Insights cybersecurity solutions align with industry and regulatory best practices and cybersecurity insurance requirements. This model makes advanced IT security solutions affordable for all organizations, including small businesses.
Here are the cybersecurity tools and solutions included in the first level of protection:
CORE TOOLS: ANTI-VIRUS SOLUTIONS WITH TIMELY AND EFFICIENT REMOTE SUPPORT
Worry-Free Antivirus Protection
In our first level of protection, we offer the powerful Trend Micro Worry-Free Antivirus, a next-generation holistic antivirus solution. If you don’t have Trend Worry-Free Antivirus, you need to. This is an essential tool for every PC, laptop, and server. Over the last twenty years, its developers tested, refined, and proved the application’s effectiveness. (That’s like dog years in Internet time.)
For a bit of background, antivirus software used to be sufficient. However, with the evolution of technology and the changing nature of threats, the landscape has transformed both positively and negatively. In today’s technology-driven world, having a lightweight, reliable, and centralized antivirus tool is not just important—it’s essential.
Passive monitoring and risk mitigation provide a superior alternative to active engagement in monitoring or excessive costs. In response to virus threats, IT Insights employs a centrally managed system. If an endpoint is infected, we receive a ticket, ensuring that we can’t simply minimize the warning and overlook it. Our approach involves managing a vast and well-maintained library of risks, reflecting our commitment to staying ahead in the face of evolving cybersecurity challenges.
Remote Monitoring & Management (RMM)
Our second tool, Datto’s RMM, is a secure cloud-based platform that provides remote performance monitoring of PCs and laptops. It proactively notifies IT Insights cybersecurity specialists of potential issues, unusual behavior, or problems. In fact, Datto RMM often alerts us before the user even notices a problem.
When issues arise, RMM supports a co-pilot mode, allowing us to remotely access a user’s computer from any location. This enables us to provide prompt assistance without taking control away from the end user, making it particularly valuable for those with remote workers. In essence, we can assist employees from anywhere.
Datto RMM enables us to manage updates at your convenience. Flagged important events notify us of problem behaviors, failing health, and other critical logged events. Communication is a two-way street, incorporating health checking. This eliminates the necessity for on-site IT support for minor issues. Datto RMM is an exceptional tool for remote employees in need of assistance.
Password and Documentation Management
Our third tool, Kaseya’s MyGlue, is a robust solution for securely storing and managing passwords across various accounts and systems. Beyond password management, users can seamlessly document and organize crucial information, including processes, procedures, and keynotes, creating a centralized knowledge base for enhanced team collaboration.
Given MyGlue’s involvement with sensitive data like passwords, it prioritizes security with robust measures in place, eliminating the need for outdated password rotation policies. Say goodbye to the days of scribbling passwords on Post-it notes; MyGlue ensures strong, unique passwords on any company device.
The platform even facilitates the secure sharing of organizational passwords without compromising safety. With access control, our IT team can gain temporary access to personal passwords for immediate support and restrict access promptly once the issue is resolved. This proactive approach stands as a paramount measure for elevating password security practices.
Ready to enroll in IT Insights cybersecurity protection?
If you are a current client, we encourage you to contact your account managers – either Tony, Alex, or Chris with questions. If you’re not a client, contact Christopher Bierasinski to learn how IT Insights can help strengthen your digital security.
What is a Strong Password, and Why Does it Matter?
We live in a world where we are barraged with more online apps, virtual platforms, online services and digital accounts than ever before. And, every single one of them requires a password. Whether it’s your Hulu login credentials or online banking double encryption, you need strong passwords to protect yourself and your personal information no matter where you go on the internet. Combine your ever-growing list of digital accounts with the increasing frequency of data breaches and cybercriminals lying in wait, it is smart to ask yourself, “Just how strong is my password?” and “How many passwords do I really need?” Read our tips on what makes a strong password and how to make a good password to keep yourself, your data and your personal information protected.
How to Create a Strong Password
In reality, it’s common for people to use the same passwords for years. But, experts recommend using a different complex password for every site and account. Let’s face it, it’s less daunting to remember one or two passwords with slight variations. The problem is that many of us not only use similar passwords multiple times, but we use these same variations across multiple platforms too. There are two problems with this:
- If you’ve been using your password for more than a year, it’s likely already been part of a past data breach.
- If you’re reusing passwords across platforms, one breach puts all other platforms at risk.
That means if you’ve saved your personal data or forms of payment on one site, you’ve potentially opened yourself up to breaches on another site by using the same password in both places. For example, perhaps you use the password DogLover123 for your online bank account. Your bank likely has strong security. However, let’s say you have also used that password for your Yahoo email address. But, just a few years ago, Yahoo had one of the most significant data breaches in history, and if your password was compromised there, it could also be used to access your bank account. It is crucial that your passwords should be not only unique in terms of characters and symbols but also unique to the platform they’re being used on. While this might sound like a lofty goal, like your doctor telling you to exercise every day and get at least eight hours of sleep every night, we have some tips and strong password examples to help you keep your accounts secure.
How to Remember Your Passwords
Our number one tip for remembering all those passwords is to use a password manager. There are several advantages to using a password manager, like one of these recommended by PCMag. First, password managers use encryption to keep all your passwords secure in a single location. This beats any spreadsheet or handwritten list, because it provides secure, encrypted access. Second, most password managers have the option to autogenerate, save, and autofill your passwords. These features make it easy to remember, store and secure your passwords. But, if you’re looking for an alternative to generate your own strong passwords, we have some examples and tips to help with that, too.
Things to Avoid When Creating Passwords
Weak vs. Strong Passwords
Weak passwords are easy to spot and easy to hack. Our DogLover123 example above is a primary candidate of what to avoid. Here are examples that illustrate what not to do:
- DO NOT USE common words, phrases or names. A good rule of thumb is to avoid using words found in the dictionary for your password. You also shouldn’t use any information a stranger could know about you. For example, your first or last name, date of birth, year you graduated, etc.
- DO NOT USE sequential letters, numbers and symbols. No more ABC, 123 or !@#. These are easy to guess and leave you vulnerable to hacking.
- DO NOT USE something that relates to our hobbies or interests. Reach outside your interests, especially for your password hints.
What is an Example of a Strong Password?
Strong Password Examples
An easy way to make a strong, memorable password is to make it a sentence. For example, if your password was DogLover123, an alternative making the password stronger would be I<3myGoldenDoodle! Here are some more strong password examples:
- XVwlNNx4rh9W
- N4]39#(^h{CV
- pHRUn.[‘K&mU
They’re not always pretty to look at, but the degree of randomness and a mixture of unpredictable letters and symbols keep your personal data and account secure. Things to keep in mind when creating your password:
- Make it long. At the very least, 8 characters. 12 characters are even better.
- Use a mix of random characters. Uppercase and lowercase letters, numbers and symbols.
- Use a password manager with a password generator. You can find some great recommendations here.
How Strong is Your Password?
Many people don’t see security as an investment, but cyberattacks can result in huge losses for your company. Along with strong passwords, you should also be using two-factor authentication (2FA). If you have questions or need help setting up a password manager or 2FA in your organization, that’s what we’re here for.
You need IT. We have the insights.
IT Insights provides managed IT services in Rochester, New York, the surrounding areas, and other regions.
1150 Penfield Rd.
Rochester, NY 14625