By -- 2018-10-25 in Blog

It’s no secret that small businesses and organizations are the main target of cyberattacks. According to a recent article from entrepreneur.com, the FBI has received more than 4 million complaints from small businesses regarding internet crime between 2000 and 2017. Unfortunately, smaller organizations generally don’t have the budget for advanced levels of cybersecurity. However, if the proper standards are implemented, you don’t need to spend a fortune on cybersecurity for your organization.  A few standards and recommendations to best keep your business protected on a budget are as follows:

Cybersecurity Standards for Your Organization

  1. Implement email sender authentication standards for your organization and your business partners. These include: Sender Policy Framework, DomainKeys Identified Mail and Domain-based Message Authentication, and Reporting and Conformance.
  2. Take a layered approach to security. In addition to sender authentication standards, implement impersonation filtering to identify domains that are a character off from a trusted domain. It is also useful to implement an internal email filter that blocks external emails that make themselves appear as though they are from an internal user.
  3. Be sure there is a protocol for authorizing wire transfers. Be sure your employees and partners confirm the legitimacy of any wire transfer or change of payment address requested via email. Never use the contact information from the email to confirm the request, instead confirm the legitimacy by calling a verified phone number.
  4. Educate your employees and partners on the risks associated with careless email and online practices. Hold cybersecurity training courses regularly and reward your employees for good cybersecurity habits. If you don’t have an educated workforce, all other layers of security are rendered useless.
  5. Partner with or consult an outside expert. Consult a trusted provider to answer any of the questions or concerns you may have.

Next Steps

OptfinITy happens to be a trusted MSP with over 15 years of experience. If you are worried about how to best protect your business or organization from cyber threats or don’t understand the items above,  don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-10-23 in Blog

It seems that nowadays every device we use is “smart.” We have access to everything from smart speakers to smart vacuums, and their prevalence is on the rise. According to a recent FBI public service announcement, the number of Internet of Things (IoT) or “smart” devices is expected to increase by anywhere between 300% to 1000% by 2020. While it’s undoubtedly convenient to have all our devices interconnected with each other and the internet, unsecure devices are at a very high risk of being exploited by cyber criminals. To best keep your IoT devices secure, the following actions are recommended:

Recommended Actions to Secure IoT Devices

  1. While shopping for new devices
    1. Research your options on reputable websites that specialize in cyber security analysis.
    2. Search for products with a good reputation for providing security for their IoT products.
    3. Search for products that offer software or firmware updates and find out how often they are provided.
    4. Find out the types of data that is collected and stored on the device.
    5. Find out how long the data will remain stored on the device, whether or not the storage is encrypted, and whether or not the data will be shared with a third party.
    6. Check to see if opting out of the collection of data is an option and if there are any policies in place in the case of a data breach.
  2. For recently purchased devices or ones you already own
    1. Change default usernames and passwords. Create STRONG passwords. Never use common words such as sports teams or children’s names.
    2. Isolate them on their own protected network and configure their network firewalls to have traffic blocked from unauthorized IP addresses and be sure port forwarding is disabled.
    3. Implement the security recommendations that are provided by the device manufacturer, be on top of updates and implement security patches where available.
    4. Invest in a secure router that allows you to whitelist (only allow specific devices to connect to your network).

Although these smart devices aren’t computers with screens, it is important to remember that they require the same cyber security measures as your laptop, desktop or cell phone. As these IoT devices become more prevalent, it is more important than ever to make sure they are secure and safe from cyberattacks. If you have any questions about the security of your IoT devices don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-10-18 in Blog

iDRACula discovered in Dell Servers

According to a recent servethehome.com one of the most respected brands in the server industry contains a vulnerability in its 13th generation and older PowerEdge servers. This vulnerability allows users to bypass the Dell EMC iDRAC firmware protections and load their own firmware via both local and remote access methods.

Once exploited, cybercriminals have complete remote control of the server.

What You Need to Know

Although this vulnerability, named iDRACula (integrated Dell Remote Access Controller unauthorized load access), is not an issue for Dell’s newest 14th generation PowerEdge server, there are still millions of older generations in use and in distribution.

Therefore, it is important to be aware of this vulnerability if you are using a 13th generation or older PowerEdge server.

The good news is that for iDRACula requires a lapse of security to be taken advantage of. This includes someone gaining physical access to a machine or remote access with valid login credentials. The bad news is that Dell is a leader in the industry for server security. Since this vulnerability was discovered in Dell, it is highly likely that other types of servers contain similar vulnerabilities.

Final Thoughts

The iDRACula vulnerability serves as a reminder that even reliable brands such as Dell are not immune to security breaches. Even if you don’t use a Dell server or if you have the latest generation, it is important to always practice safe security measures and stay on top of software updates. Never give strangers direct or remote access to your electronic devices and get the latest software updates since they are created to fix bugs or vulnerabilities found in previous versions.

If you have any more questions about the iDRACula vulnerability or how to best keep yourself protected don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-10-16 in Blog

Data breaches happen often—even to those who follow cybersecurity best practices. That’s why having a clear plan of action is essential. A recent article from IT News outlines effective steps you can take to minimize the damage and protect your identity and finances.

Step 1: Identify What Was Stolen

Start by determining exactly what type of information was compromised. Was it usernames, passwords, credit card details, or something else? Understanding what data the attacker accessed will guide your next steps.

Step 2: Assess Whether the Data Is Usable

Next, evaluate whether the stolen data can actually be used. If the information was stored in cleartext, hackers can likely decode it easily. However, if it was hashed, salted, or encrypted, the data may be unusable to them.

Step 3: Change Your Passwords Immediately

Regardless of whether the data was usable, change your passwords right away. If you’ve reused the same password across multiple accounts, now is the time to break that habit. Consider using a password manager like LastPass to generate and store strong, unique passwords. Also, enable two-factor authentication on any accounts that support it.

Step 4: Create a Secure Password Recovery Email

Set up a dedicated email address specifically for password recovery. Make sure the email doesn’t reveal anything about your identity. A generic address like okurdone@outlook.com is a safer choice than one containing your name or initials.

Step 5: Report Credit Card Theft Immediately

If your credit card information was compromised, contact your credit card provider right away. Ask them to place a fraud alert on your account. Also, notify the three major credit bureaus and consider placing a credit freeze to prevent anyone from opening new accounts in your name.

Step 6: Notify the Appropriate Authorities

In many states, the law requires you to report certain types of data breaches. Determine whether your situation qualifies and report the breach to the necessary agencies or affected individuals as soon as possible.

Stay Calm—And Stay Protected

Data breaches are unsettling but increasingly common. If you’ve taken steps to secure your data, chances are the attacker won’t be able to do much with it. Still, it’s crucial to act quickly and follow the right steps.

Need help responding to a data breach or preparing a recovery plan? Call OptfinITy at 703-790-0400 or visit us online at www.optfinity.com.

By -- 2018-10-11 in Blog

Port of San Diego Hit by Ransomware Attack

In late September, a ransomware attack targeted the Port of San Diego. The attacker demanded an unknown amount in Bitcoin. Employees lost access to their computers, disrupting services like public records and park permits.

The full financial impact remains unclear, but similar attacks have caused major damage in the past.

Why Ransomware Is So Devastating

Ransomware encrypts your data and demands payment to unlock it. This creates a double hit—lost productivity and potential ransom costs. Some attacks have cost businesses and cities up to $300 million. For small organizations, these attacks can be fatal.

Protect Your Business Before It’s Too Late

The best defense is frequent data backups. If criminals can’t hold your data hostage, they lose their leverage. Backups allow your business to keep running even after an attack.

Along with backups, follow cybersecurity best practices:

  • Use strong, unique passwords
  • Train employees to spot phishing scams
  • Keep systems updated

Need Help? Contact Us

Don’t wait until it’s too late. If you have questions about preventing ransomware attacks, call us at 703-790-0400 or visit www.optfinity.com.

By -- 2018-10-9 in Blog

Stay Alert: Remote Tech Support Scams on the Rise

Even if you trust your IT provider, you still need to stay vigilant. Remote tech support scams are becoming more common—and more dangerous.

What Is a Remote Tech Support Scam?

In these scams, cybercriminals pose as IT help desk staff. They claim to be fixing an issue on your computer. Once you give them remote access, they:

  • Steal your data
  • Install malware or spyware
  • Demand payment for a fake repair

These scams cost businesses and individuals millions every year.

Beware of Unsolicited Help

The most important rule: Don’t trust anyone who contacts you unexpectedly.

Scammers may:

  • Call or email you without warning
  • Use a trusted tech company’s name
  • Make their number appear real on caller ID

They often use fear tactics. For example, they might say your computer has a virus and urge you to click a link or call them immediately.

Legitimate Tech Support Doesn’t Work This Way

A real IT provider will never:

  • Call or email you out of the blue
  • Push you to act fast
  • Ask for remote access unless you initiated the request

If you get a suspicious message or call, verify it. Contact your trusted IT provider directly before clicking any links or sharing information.

Protect Yourself from Scams

Here’s how to stay safe:

  • Never respond to unsolicited support calls or emails
  • Don’t give remote access unless you’re sure who you’re talking to
  • Avoid clicking on links in unexpected messages
  • Report anything suspicious immediately

Have Questions? Reach Out to Us

As a trusted IT provider, OptfinITy is here to help. If you’re unsure about a message or a caller—or if someone pretends to be us—call us at 703-790-0400.

You can also visit www.optfinity.com for more tips on staying secure.

By -- 2018-10-4 in Blog

In the current technological age, a website is now the face of an organization. When people hear about a new business or organization, the first thing they’ll do is check out their website. While having a secure, well-functioning website for your organization can help raise the reputation of your brand, having one that is not secure and puts visitor’s information at risk can have the opposite effect. A recent article provides some preventative measures you can take to keep your website and online reputation secure.

  1. Have a protocol in place for your organization outlining what to do in the case of a security breach. The better prepared you and your employees are, the quicker you will be able to stop or contain a cyberattack.
  2. Be sure you have access to a long history of logs and be sure you are checking in on your website daily for spam activity, security plugins and updates. If an update is available, be sure to go forward with it since outdated software is prime real estate for hackers.
  3. Do frequent backups, at least once a month, on everything! Creating backups takes away any opportunity for a ransomware attack.

As always, OptfinITy is here to answer any questions related to your IT needs. If you have any questions or concerns about the security of your organization’s website, please don’t hesitate to give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-10-2 in Blog

While running a small organization, getting your name out there is critical for your success. While using social media and online advertising are available options, the best way to become recognized by the largest audience possible is to appear at the top or near the top of an online search engine. A recent article from entrepreneur.com provides some tips on how to make this happen.

The first step to take is to make sure your website runs efficiently. This includes eliminating lag time between pages, and allowing for easy navigation and smart phone optimization. If your website runs slow or is confusing to navigate, people will more than likely become frustrated and leave your website never to return.

A great way to ensure your website runs at a fast speed is to optimize your images, which essentially means not using images at a size that is larger than necessary. Since more than 50% of a website’s memory load on average consists of images, having an image on your website that is unnecessarily large can be the difference between a fast and slow loading website. For example, if you are placing an image into a box that is only a 500 pixel square, uploading an image that is 5,000 by 5,000 pixels is only going to slow your website down.

Optimizing your website for mobile is now more critical than ever since consumers now spend around 69% of their time on their smartphones. To improve your website’s mobile performance, you should research which web-hosting site will work best for your content, or if you are developing your own, implement accelerated mobile pages to speed up your website.

Once you have a flawless, fast-running website that is fully optimized for mobile devices, your next priority should be to establish authority and use keywords in your website that will direct as many people to your site as possible. While establishing authority can take some time, you can speed up the process by encouraging people to share your news and blog posts on social media.

The use of specific and direct keywords will raise the likelihood of your website showing up in searches. For example, if your website contains an article about how to make lemonade, you will want to go with clear, direct keywords in the title and throughout the article that will show up in people’s searches. A good example would be “How to Make Great Lemonade.”

What you will want to avoid is trying to get creative and titling your post something like “Lemonaide: How to Create a Perfect Blend of Sugar, Water, and Lemons.” None of those terms are going to be something someone searches for while looking up how to make lemonade, and as a result, people will likely be directed to another website and not yours.

To recap, having a well-functioning website that is optimized for all platforms combined with the strategic implementation of keywords will result in a successful, well-known organization. OptfinITy provides assistance with website development and would be happy to answer any questions you may have regarding website development or any other of your business’ IT needs. For more information give us a call at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2018-09-27 in Blog

Beware of Malicious Emails

You probably receive hundreds of emails daily. Did you know that one in every 244 emails contains malware (according to IT World)? Stay alert for suspicious emails to protect yourself.

Red Flags to Watch For

1. Poor Spelling and Grammar
Scammers often disguise emails to look like they’re from trusted sources like your bank or Amazon. However, bad spelling or grammar is a major giveaway. Don’t trust emails with these errors.

2. Urgent Warnings or Threats
Phishing scams often use scare tactics. Emails urging immediate action or threatening severe consequences (e.g., from the IRS or FBI) are usually fake. Legitimate agencies won’t email you in this way.

3. Suspicious Attachments or Links
Unexpected attachments or strange links are red flags. Verify attachments with the sender before opening. Always hover over links to check the URL. If it looks odd or overly long, don’t click.

OptfinITy Can Help

Need guidance on phishing or safe email practices? OptfinITy is here to help! This month’s webinar covers these topics—sign up for free today. Call 703-790-0400 or visit us at www.optfinity.com.

By -- 2018-09-25 in Blog

Enhancing File Sharing Security in Your Organization

File-sharing software has become an essential tool for modern organizations, enabling more effective communication and collaboration on documents. While it boosts efficiency, improperly protected files can fall into the wrong hands, leading to serious risks such as fraud and identity theft. Understanding and addressing these vulnerabilities is critical to safeguarding your organization’s sensitive data.

Why Are Shared Files Vulnerable?

The primary reason shared files are at risk is that much of the data is stored by the organization’s internet service provider. Without proper security measures, this data can become an easy target for unauthorized access.

A recent Entrepreneur.com article offers actionable steps to prevent your shared files from falling into the wrong hands.

Educate Employees About File-Sharing Risks

The first step is to raise employee awareness about the risks associated with file sharing. Educate your team on general security practices to ensure they understand the potential consequences of mishandling sensitive files. When employees recognize these risks, they are more likely to adopt the necessary precautions to protect the data they manage.

Control Access to Cloud-Based Files

If your organization uses cloud storage to save and edit shared files, restrict access to authorized users only. Consider upgrading to a service that allows you to set file permissions, such as OptfinITy Sync. Many cloud-based systems also provide tracking features to monitor who has sent, received, opened, or shared a document. These features ensure your files remain secure and inaccessible to unauthorized individuals.

Keep Systems and Staff Updated

Ensure all content management systems (CMS) are regularly updated to protect sensitive files effectively. At the same time, continuously educate staff on the latest software updates and security protocols. This dual approach enhances your CMS’s ability to safeguard files while empowering employees to uphold strong security practices.

Implement an Integrated Security System

Deploy a comprehensive, integrated security system that addresses all potential threats. While standalone security solutions can focus on specific areas like email or file sharing, an all-encompassing system provides more practical and robust protection for your organization.

Get Expert Help with File-Sharing Security

As cloud users with a robust product like OptfinITy Sync, we are here to help ensure the security of your file-sharing software. If you have any questions about protecting your organization’s files, call us at 703-790-0400 or visit us at www.optfinity.com.

Safeguarding your shared files is crucial—take these steps today to secure your data and prevent potential security breaches.