Ransomware in the News! Explained here in easy terms…

How did you fare with what is known as the biggest ransomware attack in history? The good news is that none of our clients have reported any infections. FedEx, government entities, hospitals, cloud environments that affect thousands of users right down to home users had their files locked up recently with a ransom note on them. Some articles say it was an XP vulnerability, an email attachment, an infected website, unpatched computers and servers, or a port used for Windows servers to communicate to network computers. For clarification, this virus does not just affect XP. And, if you are on XP, you should phase it out quickly because it’s an electronic petri dish waiting to attract a bug to infect everything else on your network. The common theme seems to be that once it infects a computer on a network that it goes from computer to computer if it is able to. This is what classifies this virus as a worm which is pretty serious. It tries to manifest though networks from an infected computer or server, but also tries to do the same thing on the internet by scanning IP addresses and looking for a way in. The vulnerability has been around for quite some time and was known by the NSA before it was leaked into the wild. Once that occurred a few weeks ago, Microsoft released a patch to fix the problem so that any attempts to exploit it would be benign. If you update your Windows patches regularly, then there was no need to worry. I know it’s hard to believe, but some people prefer...

Traveling to China?

We know many of our clients travel to China regularly on business. Careful consideration should be paid to the security of your data and devices while there and extra steps before, during and after your trip are highly recommended. The attached article sheds further light on why this is so important. As always, your team at Eagle Network Solutions is here to help. Kaleb Jacob and the Eagle Team...

Next-generation Wi-Fi provides advanced capabilities

From the Desk of Kaleb- As I read this article about the advanced capabilities of WIFI and what it means to businesses, it seemed like a whitepaper on our MoJo wireless product. We became a MoJo Parnter, formerly Airtight Networks, over two years ago and at first it seemed a bit high end for our clients. Over time, it has been our go-to product for WIFI to keep our clients safer and to offer much better reliability and total network segregation for guest access. If you have an open guest WIFI, there is a good chance that your guests are not the only ones connected to it. Where are they going and what are they downloading? Did you know that if an employee or guest goes to a site to illegally download a movie that you may considered responsible? ISP’s have compliance departments that look for this and notify their customers of violations as a warning the first time. Also, if you have a family in your lobby on your WIFI and one or two are on iPad’s watching a Netflix movie, how does that affect the rest of your corporate internet speed? We “throttle” guest WIFI to make sure your staff are not slowed down for the sake of “free” WIFI. Although separated, it all comes in on one pipe. – Kaleb Jacob...

Is Your Business Being Offered Faster Internet Speeds? Read On Before Deciding…

We have all seen the offers to boost our internet speed for a special rate from our current Internet Service Provider (ISP) or a competitor. I see them in my inbox, in the mail and even by phone now. As an IT company, we have a 10 x 50 connection. We are in “the business”, so we should be leading the pack, right? I got a call from our ISP a few weeks ago and, for a 3 year contract, they would boost it to 20 x 75 at the click of a button on their end and would give us the same rate we are currently paying for the next year. After that, it goes to around $20 more a month. Overall, not a bad deal. I declined because it is as fast as we need. In fact, we don’t even need it to be 50mbps for downloads, but it does come in handy when downloading some DVD ISO’s for operating systems. With some things, you should only pay for what you need. The representative pushed a little more and I said that I was happy not being under contract with them, giving us the freedom to look elsewhere should the service decline. This reminded me of a few instances where clients have upgraded to a faster speed over the phone with their ISP for not much more than they are currently paying. The upgrade is usually a process that takes under 5 minutes with a modem reboot, so it is easy and usually not very invasive. However, do you know what your firewall can handle for bandwidth?...

Why Should Businesses use Managed Service Providers?

What are Managed Services? Managed services let you offload specific IT operations to an external organization known as a Managed Services Provider. The managed service provider (MSP) assumes ongoing responsibility for monitoring, managing and/or problem resolution for selected IT systems and functions on your behalf. These services are typically customized based upon your needs, budget and vulnerabilities. Managed services providers can offer services such as alerts, security, patch management, data backup and recovery for various client devices: servers, desktops, laptops, storage systems, routers, switches and even applications. Some even manage your connectivity to the world by working on your behalf with ISP’s when there is an internet outage or slow bandwidth. This saves time and money from having valuable internal resources working on the issue, particularly if that isn’t their primary field of expertise. In short, offloading routine infrastructure management to an experienced MSP keeps your IT infrastructure running smoothly, alerts you if there are warnings signs that could lead to hardware failures and frees up your internal people to focus on running your business. Managed service providers usually price their services on a subscription basis. Depending on the services they provide, pricing is usually based on the number of devices, with different packages priced at different levels. Some provide valuable customer support onsite when required. Basic services often start with a monitoring service, which notifies you of problems, which you resolve on your own. At the upper end of the spectrum, service providers offer fully managed services that cover everything from alerts through problem resolution. Typically, they perform an initial assessment of your current IT environment and management...

The New Normal for Law Firms and Their Data

Eagle Network Solutions recently co-authored an article in Legal Link Magazine. Rapid and dramatic changes in technology are continuing to challenge businesses of all kinds, including those of attorneys and other professionals. According to the article,” The New Normal: The Challenges Facing the Legal Profession,” the second greatest challenge facing the legal industry is the growth of technology in the legal field. “These advances increase the pace of practice and client expectations, forcing lawyers to adapt or face extinction. Understanding and implementing new technologies are difficult and time-consuming for lawyers. Clients are often ahead of lawyers in implementing new technologies; they have increased access to legal information, much of it readily available on the Internet.” “Time is money,” according to an old adage, and most lawyers use their time and money on technology as it pertains to choosing billing software vs time management software, avoiding irregularities when using social media, and trying to navigate new legal advertising paradigms. However the security and safety of a practice’s own data as well as the maintenance of client’s personal and confidential information is often last on the list of priorities when it should be first. Client confidentiality, attorney liability, and technology security need to be paramount when considering what programs and technology services you use and how you utilize technology for your practice. More than questioning whether your internal software and/or cloud based programs for client records, billing, and receipts correctly capture and deliver client information, you need to constantly ask yourself the following questions: Is client information secure and how secure is it? Is internal as well as external information, including...