CTS Services, Inc.
  • Home
  • Services
    • Hardware Repair Services
    • Remote IT Support
    • Managed IT Services
    • Depot Repair Services
    • Printer Services
    • EpsonGPC831Printer
    • EpsonTMC3500Printer
    • Data Backup & Recovery
    • IT Consulting and Staffing
    • Office 365 & Cloud Services
    • Multi-Media/Projectors
    • Digital Signage
  • About
    • Know CTS
    • Career Opportunities
  • Contact
  • Request Consultation
  • Request RMA
  • Blog
  • Dark Web

CTS Services, Inc Awarded Authorization for Service and Repair of Epson’s Colorworks GP-C831 and TC-3500 Label Printers

12/5/2017

 
For Immediate Release
December 5, 2017
 
Bellingham, MA – CTS Services, Inc., a local IT services and support company and Authorized Epson Partner serving the SMB marketplace, announced today that is has been awarded factory authorization for servicing and repairing the Epson Colorworks GP-C831 Label Printer and the Epson Colorworks TM-C3500 Label Printer.
 
“Our ability to service these specialized printers allow us to serve our clients in new ways,” said Michelle Carlow, president of CTS Services, Inc. “The BS5609 certification of these printers opens new markets for Epson, and our service and repair capabilities allow us to serve their clients nationwide via our repair depot, and to provide local service across all of New England. We’re very excited.”
 
The Globally Harmonized System For Hazard Communication creates certain challenges for printing compliance of labeling. Epson's ColorWorks C831 Labeling System offers an industrial-strength inkjet label printer is ideal for GHS large format drum and chemical labels and more. It combines all the benefits of a rugged color inkjet printer with the accuracy of an 8-pin tractor feeder and is the first inkjet printing solution that has been BS5609 certified. With Epson's ColorWorks C3500 inkjet label printer, you can dramatically reduce label costs, increase operational efficiencies and print high-quality, durable labels on demand in four colors (CMYK) at speeds of up to 4 inches/second.
 
# # #
 
CTS Services, Inc. is a full service IT Support company providing remote, on-site, and depot services to small and meddium sized businesses in Massachusetts, and throughout New England. For more information please visit www.ctsservices.com or call 508.528.7720

Are You Making It Too Easy For Hackers Ruin Your Business?

3/21/2017

 
Your business is too important to simply invite hackers in to torment you and encrypt your data or otherwise paralyze your operations. It happens every day in the small business arena, and the nightmare that one client experienced need not happen to you. Keep in mind, hackers have automated tools to exploit your vulnerabilities for fun and profit. You need to shift from knowing this is an issue to taking action to protect your assets.
 
It is time to fully realize that your business is under attack by malicious hackers. You need to lower your attack vector so hackers are unable to exploit your company.
 
Here’s what happened recently to a client that should have acted before the problem arose:
 
A manufacturing company choose to stay vulnerable by ignoring smart IT advice. They kept their Windows 2003 Server running, they still had Windows XP machines connected to the network, and they had some scattered USB drives on desktop devices for a “local backup”.
 
This “open invitation” led a hacker to install a crypto virus on a server, as well as gain access to all of the other easy-to-identify servers in the network, without a password. The company’s data were encrypted and held for ransom. Even the backup data on the USB drives were encrypted, making an up-to-date recovery impossible. Fortunately, and after 80 hours of IT consulting work to restore data, the company was able to use a 7-month old backup file to at least partially recover and become functional. All avoidable, of course, with a sound data protection and technology deployment plan. Migrating away from XP, once and for all, and upgrading to current server software along with smart data backup is a good start.
 
You might be unknowlingly leaving the door wide open for hackers to come in and ruin your business.  Whether you are highly vulnerable, or as protected as can be is a choice. This choice is clear as you take a close look at your exposure.
 
Hackers have enough tools to succeed without you making it too easy for them. When they find a company that is “just begging” to be hacked, they get a certain thrill in punishing the unsuspecting or ignorant victims, and those who are in full denial about cyberthreats.
 
My message:
 
Make it difficult for hackers by taking steps to lower your vulnerability. Smart IT security decisions can help you reduce exposure and minimize your attack vector.

  1. Make it difficult for hackers by giving servers on your network disguised names, removing the word “server”. Instead of “factory server” call it by a desktop name, such as Bill’s Desktop 01. Something that a hacker will not bother to attack.
 
  1. USB drives as a back-up strategy is foolish. Yes, backup to a USB as a backup to your backup is it helps you sleep better, but do not leave it connected to the machine. Crypto viruses will encrypt the data on your USB drives, too! Your disaster recovery plan should include an ioSafe fireproof solution. We can help you select the right ioSafe solution.
 
Your Decision:
 
Choose the maximum protection you can afford for the risk level you can accept. We’ll assess and advise you, and help you implement the best solution. Since way back in 1986, when CTS Services, Inc. started, our goal has been to keep your business up and running. Now, we’ve added to that value statement; We help you protect your company’s IT assets. Better.
 
Call to discuss your fears and concerns, and to address your questions about risking your business to hackers.
 
Sincerely,
 
Michelle Carlow
President, CTS Services, Inc.

PS: References: I invite you to explore the below links, or simply google the phrase “IT attack vector” and discover what might be a new vocabulary in your IT or business world. Then, if you are feeling vulnerable and at risk, call to discuss a strategy for protecting your company better. Our resident IT security expert staff can help you implement a smart strategy.
 
https://insights.sei.cmu.edu/cert/2013/10/vulnerabilities-and-attack-vectors.html
 
http://searchsecurity.techtarget.com/definition/attack-vector
 
https://eforensicsmag.com/attack-vector/

Cybersecurity is Everyone's Responsibility - and Vigilance is Required!

2/1/2017

 
You've got a business to run, and locking down your network, to the degree that you can, is essential. You know that, and since our job is to help keep your business up and running we continue to shine a light on cybersecurity. Making matters more challenging is the shortage of cyber security talent in this relatively new IT field. No wonder small businesses are vulnerable!

The trap that small businesses fall into is the false belief that hackers and cyber-creeps are only interested in large businesses and governmental agencies.  The truth is that your business is likely more vulnerable than you think, and constant vigilance is required.
 
Here are a few things you should know:
  • The National Institute of Standards and Technology has issued a draft of a cybersecurity self-assessment tool. The Baldrige Cybersecurity Excellence Builder is a self-assessment tool to help organizations better understand the effectiveness of their cybersecurity risk management efforts. NIST Deputy Secretary of Commerce Bruce Andrews announced the release of the draft document and said: "The Baldrige Cybersecurity Excellence Builder answers a call from many organizations to provide a way for them to measure how effectively they are using the Cybersecurity Framework. The Builder will strengthen the already powerful Cybersecurity Framework so that organizations can better manage their cybersecurity risks."
We recommend you grab the 35-page self-assessment to bring   yourself up to date. We also recommend that you take advantage of our FREE 28-point network evaluation. Call to schedule an appointment and we'll help you assess the integrity of your network.
  • As reported in Security Magazine: A recent survey conducted by the Ponemon Institute of nearly 600 IT staff from businesses with fewer than 1,000 employees found that more than 50 percent have suffered a cyber-attack within the past 12 months. The report, "The 2016 State of SMB Cybersecurity," can be downloaded here.
The fact that only 14 percent of the companies surveyed rated their cyber defenses as highly effective sheds light on the specific challenges small and medium-sized businesses (SMB) face. With limited budgets and lack of IT staff that are devoted to cybersecurity issues, the task of keeping your business safe in an ever increasing digital world is daunting.
  • 50% of SMBs have been breached in the past 12 months
  • The most prevalent attacks against SMBs are web-based and phishing/social engineering
  • 59% of SMBs have no visibility into employee password practices
  • 65% of SMBs that have a password policy do not strictly enforce it
 Rather than summarize the report, best for you to grab it here in its entirety.  
  • Take steps to prevent a data breach. You have heard it before... but it cannot be stressed enough. Hackers love lackadaisical password policies and if you are not enforcing a rigorous password protection plan you are inviting them to steal your most precious company data. Grab these five tips for SMB Data Breach Prevention.
  • Finally, The US Computer Emergency Readiness Team (US-CERT), a division of Homeland Security, has published a web resource to help you bolster your cyber security profile. Check it out here.
We are well aware of the scarcity of cybersecurity expertise in small businesses. This fact alone makes it doubly difficult for SMB organizations to keep up with trends and protection strategies. The above resources are designed to help you stay current.

We're here to help you minimize your risk. Our Managed Services Program offers a complete suite of services which can also be unbundled to address specific issues. It all starts with a consultation or our free 28-point network evaluation.
 
 Here to help you keep your IT systems secure.

Sincerely,

Michelle Carlow
President
CTS Services, Inc.

Four IT Goals We Recommend For All Small/Medium Businesses: Start 2017 With A Strong IT Plan

2/1/2017

 
It's time to take steps to ensure a smooth and prosperous new IT year!

Now that we are well into the new year and things begin to return to normal, I want to recommend four IT goals that you may choose to adopt. This is a good time to review all of your IT policies, technologies, and procedures to ensure your business operates securely and optimally.
 
We partner with the best of the best technology providers so we can help you achieve your goals in each of these areas:
 
1. Storage capacity and system performance: What are the key performance indicators for your business? Your IT systems performance is a contributing factor in the company's ability to meet certain metrics. System storage impacts performance. Keep in mind that data storage requirements grow each year as new information and expanding backup requirements grow. We can help you plan and manage your data storage systems to meet the demands of your business. We can help you measure and monitor your storage performance. 
 
2. Data protection and disaster recovery: Let's talk... before a disaster strikes, please. Of all of the risks you take in business, gambling on the integrity of your data protection and data recovery plan is a risk we recommend you avoid. Too many of the businesses we serve fail to fully implement, test and enforce a strong data backup plan. Policies are usually inadequate. Backup technology and procedures are out of date and often untested, and should a real disaster occur they are hardly prepared. Power surge protection goes hand in hand with data protection!
 
Your company's Backup and Recovery Policy is intended to ensure that computers are regularly backed up to prevent loss of data. This Backup and Recovery Policy is designed to protect data in the organization to be sure it is not lost and can be recovered in the event of an equipment failure, intentional destruction of data, or disaster. 
 
3. Network security and access control: Are your private WiFi access points really private and secure? Do you have a separate public WiFi for visitors and guests? Do you have stringent policies in place for the ever-growing number of mobile devices? Have you installed mobile device management (MDM) software on each device? MDM is the administrative area dealing with deploying, securing, monitoring, integrating and managing mobile devices, such as smartphones, tablets, and laptops in the workplace.
 
4. Cyber-security: We really do not need to tell you that cyber-security is important. You know it already. It's the never ending story in business, and in our personal lives as well. Cyber-security, also known as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. All small and medium businesses are as vulnerable as larger enterprises.  
   
Aside from vigilance and constant security monitoring (and a solid back-up plan), we recommend taking these two steps to increase your knowledge and comfort level:
  1. Grab this cyber-security planning guide courtesy of the Federal Communications Commission. Review it in the context of what you are already doing or what you are not yet doing then...
  2. Call us at 508.528.7720 (or reply now) to schedule a phone meeting or a meeting at your business to discuss what makes the best sense for your business.
Our expertise in these areas, and the depth of experience in implementing modern, best in class solutions for our clients combine to enable us to provide you with exceptional guidance and support.

At the very least, test your back up and restore functionality and policies.

To a great 2017!

Michelle Carlow
President, CTS Services, Inc.

Forward>>

    Author

    Our blog posts are written by several members of our team. Please contact us if a particular post or topic is of further interest. We're here to help keep your business up and running.

    Archives

    November 2019
    July 2019
    May 2018
    January 2018
    December 2017
    March 2017
    February 2017

    Categories

    All

    RSS Feed

Services

Depot Repair Services
Managed Services
IT Consulting and Staffing
Printer Services

Support

Contact
Request an RMA
Request Network Evaluation
Newsletter Sign Up
About
Picture
© COPYRIGHT 2020
. ALL RIGHTS RESERVED.

CTS Services, Inc.  260 Maple Street, Bellingham, MA 02019  Phone 508-528-7720  Fax: 508-966-9734
  • Home
  • Services
    • Hardware Repair Services
    • Remote IT Support
    • Managed IT Services
    • Depot Repair Services
    • Printer Services
    • EpsonGPC831Printer
    • EpsonTMC3500Printer
    • Data Backup & Recovery
    • IT Consulting and Staffing
    • Office 365 & Cloud Services
    • Multi-Media/Projectors
    • Digital Signage
  • About
    • Know CTS
    • Career Opportunities
  • Contact
  • Request Consultation
  • Request RMA
  • Blog
  • Dark Web