CTS Services, Inc.
  • Home
  • Services
    • Hardware Repair Services
    • Remote IT Support
    • Managed IT Services
    • Depot Repair Services
    • Printer Services
    • Dark Web
    • EpsonGPC831Printer
    • EpsonTMC3500Printer
    • Data Backup & Recovery
    • IT Consulting and Staffing
    • Office 365 & Cloud Services
    • Multi-Media/Projectors
    • Digital Signage
    • Hygiene
  • About
    • Know CTS
    • Career Opportunities
  • TechReview
  • Contact
    • Request RMA
  • Blog
  • MHEC

Are You Making It Too Easy For Hackers Ruin Your Business?

3/21/2017

 
Your business is too important to simply invite hackers in to torment you and encrypt your data or otherwise paralyze your operations. It happens every day in the small business arena, and the nightmare that one client experienced need not happen to you. Keep in mind, hackers have automated tools to exploit your vulnerabilities for fun and profit. You need to shift from knowing this is an issue to taking action to protect your assets.
 
It is time to fully realize that your business is under attack by malicious hackers. You need to lower your attack vector so hackers are unable to exploit your company.
 
Here’s what happened recently to a client that should have acted before the problem arose:
 
A manufacturing company choose to stay vulnerable by ignoring smart IT advice. They kept their Windows 2003 Server running, they still had Windows XP machines connected to the network, and they had some scattered USB drives on desktop devices for a “local backup”.
 
This “open invitation” led a hacker to install a crypto virus on a server, as well as gain access to all of the other easy-to-identify servers in the network, without a password. The company’s data were encrypted and held for ransom. Even the backup data on the USB drives were encrypted, making an up-to-date recovery impossible. Fortunately, and after 80 hours of IT consulting work to restore data, the company was able to use a 7-month old backup file to at least partially recover and become functional. All avoidable, of course, with a sound data protection and technology deployment plan. Migrating away from XP, once and for all, and upgrading to current server software along with smart data backup is a good start.
 
You might be unknowlingly leaving the door wide open for hackers to come in and ruin your business.  Whether you are highly vulnerable, or as protected as can be is a choice. This choice is clear as you take a close look at your exposure.
 
Hackers have enough tools to succeed without you making it too easy for them. When they find a company that is “just begging” to be hacked, they get a certain thrill in punishing the unsuspecting or ignorant victims, and those who are in full denial about cyberthreats.
 
My message:
 
Make it difficult for hackers by taking steps to lower your vulnerability. Smart IT security decisions can help you reduce exposure and minimize your attack vector.

  1. Make it difficult for hackers by giving servers on your network disguised names, removing the word “server”. Instead of “factory server” call it by a desktop name, such as Bill’s Desktop 01. Something that a hacker will not bother to attack.
 
  1. USB drives as a back-up strategy is foolish. Yes, backup to a USB as a backup to your backup is it helps you sleep better, but do not leave it connected to the machine. Crypto viruses will encrypt the data on your USB drives, too! Your disaster recovery plan should include an ioSafe fireproof solution. We can help you select the right ioSafe solution.
 
Your Decision:
 
Choose the maximum protection you can afford for the risk level you can accept. We’ll assess and advise you, and help you implement the best solution. Since way back in 1986, when CTS Services, Inc. started, our goal has been to keep your business up and running. Now, we’ve added to that value statement; We help you protect your company’s IT assets. Better.
 
Call to discuss your fears and concerns, and to address your questions about risking your business to hackers.
 
Sincerely,
 
Michelle Carlow
President, CTS Services, Inc.

PS: References: I invite you to explore the below links, or simply google the phrase “IT attack vector” and discover what might be a new vocabulary in your IT or business world. Then, if you are feeling vulnerable and at risk, call to discuss a strategy for protecting your company better. Our resident IT security expert staff can help you implement a smart strategy.
 
https://insights.sei.cmu.edu/cert/2013/10/vulnerabilities-and-attack-vectors.html
 
http://searchsecurity.techtarget.com/definition/attack-vector
 
https://eforensicsmag.com/attack-vector/

    Author

    Our blog posts are written by several members of our team. Please contact us if a particular post or topic is of further interest. We're here to help keep your business up and running.

    Archives

    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    April 2020
    January 2020
    March 2019
    January 2018
    December 2017
    March 2017
    February 2017

    Categories

    All

    RSS Feed

Services

Depot Repair Services
Managed Services
IT Consulting and Staffing
Printer Services

Support

Contact
Request an RMA
Request Network Evaluation
Newsletter Sign Up
About
Picture
© COPYRIGHT 2023
. ALL RIGHTS RESERVED.

CTS Services, Inc.  260 Maple Street, Bellingham, MA 02019  Phone 508-528-7720  Fax: 508-966-9734
  • Home
  • Services
    • Hardware Repair Services
    • Remote IT Support
    • Managed IT Services
    • Depot Repair Services
    • Printer Services
    • Dark Web
    • EpsonGPC831Printer
    • EpsonTMC3500Printer
    • Data Backup & Recovery
    • IT Consulting and Staffing
    • Office 365 & Cloud Services
    • Multi-Media/Projectors
    • Digital Signage
    • Hygiene
  • About
    • Know CTS
    • Career Opportunities
  • TechReview
  • Contact
    • Request RMA
  • Blog
  • MHEC