by Felicien | Sep 25, 2017 | Education
Cybersecurity software from Kaspersky Lab is no longer on the shelves of Best Buy after fears emerge of a connection between the company and the Russian government.
There are many reasons a store stops stocking a particular product. However, it’s rare when a business pulls top-selling items from their shelves because of a potential link between the manufacturer and a foreign government.
That’s exactly what happened when the electronics superstore, Best Buy, recently banned the sale of all cybersecurity products manufactured by Kaspersky Lab. In early September, officials from Best Buy confirmed suspicions that the reason behind the change was due to concerns that the Moscow-based company developed an inappropriate association with the Kremlin.
What Items Did Best Buy Stop Carrying?
Best Buy banned Kaspersky Lab’s products, including Kaspersky Internet Security, Kaspersky Anti-Virus, and Kaspersky Total Protection. These high-end, subscription-based, software tools for home users help more than 400 million protect their computer systems from viruses, malware and other malicious online attacks.
What Was the Company’s Response?
Prior to Best Buy pulling these products, Kaspersky Lab released a statement denying allegations claiming the Russian government was interfering or controlling the actions of the business. While the founder of the company, Eugene Kaspersky admits to receiving training from the KGB’s signals-intelligence division early in his career, having personal relationships with members of the Russian government, and working with Russia’s domestic-intelligence agency, he denies his company’s involvement with any wrong-doing.
Kaspersky Lab assured the US government that it didn’t take part in any hacking during the recent US presidential election, nor does it have any illegal or inappropriate connections with the Russian, any other foreign government. Kaspersky Lab even offered to provide the source code for its products to the US government to prove it doesn’t contain any secret backdoors— But, this wasn’t enough to prevent suspicion.
In February 2017, the Department of Homeland Security issued a secret report on the matter to other government agencies. And the FBI is investigating the nature of Kaspersky Lab’s relationship to the Russian government
Eugene Kaspersky believes that his company is a victim of America’s anti-Russian worldview, and that he’s being punished for being Russian. He wrote, “it’s not popular to be Russian now in some countries,” and “despite a lack of evidence as to the reasons why we’re being targeted, one thing does seem to be crystal clear: we are caught in the middle of a geopolitical fight. And there will never be any evidence to prove these false accusations against us since we’re innocent.”
Should You Worry?
The US Congress believe the possible connection between Kaspersky Lab’s and the Russian government is a serious matter. Members of Congress are already debating the possibility of banning the software from the Pentagon. Meanwhile, on September 13, 2017, the Department of Homeland Security took action by issuing a directive that all federal agencies must identify every computer that runs a Kaspersky product, and develop plans for alternatives within the next 60 days. After 90 days, no federal agency will be allowed to use any of the company’s products.
All of this is clear enough to rattle our nerves. Despite a column in Forbes from the founder of Kaspersky Lab pleading with customers that its products are safe, many consumers and business owners who are currently running cybersecurity software from Kaspersky Lab, are now wondering whether it’s a good idea to change, or take the chance of leaving their computer system exposed to hackers.
Before getting rid of your current cyber security software from Kaspersky Lab, it’s probably best to take a moment and relax. Unless you store government secrets on your laptop, (and even if you do) there’s probably little reason to worry. No one has found evidence proving any of the software Kaspersky Lab makes contains security risks—And the likelihood of this occurring is almost non-existent.
Kaspersky Lab offers one of the best cyber security packages available, and the company’s experts routinely contribute to the fight against the spread of computer viruses throughout the world. They recently helped to thwart the spread of the Petya/ExPetr ransomware worm.
Many independent security experts continue to trust the company despite recent developments. However, if you still feel a little wary about using any Kaspersky Lab software you purchased from Best Buy, the store will let you exchange the software for an alternative until the middle of November, if you still have an active subscription. In addition, if you bring your laptop into the store, a member of the Geek Squad will uninstall the software from your computer for free.
As someone who deals with IT and computer-related security concerns on a regular basis, I’m not worried. I personally find the software from Kaspersky Lab to be some of the top-performing cybersecurity protection in the industry. I’m advising my clients that there’s no need to change to new computer security software as long as they’re not experiencing any problems with its current performance.
by Felicien | Sep 25, 2017 | Education, General
The annual launch of the new iPhone lineup is here, and the inclusion of iPhone X may seem a bit confusing.
Learn why Apple may have chosen to use this unique name for its newest iPhone.
It’s no longer a secret. Since a leak just days before the official release, people have known this year’s annual iPhone release will be something special. Apple’s not only launching iPhone 8 and iPhone 8 Plus on September 23, but will offer an additional option which is a mysterious and radical departure from the look of their previous iPhone. Apple calls this new phone, iPhone X. “X” as in the Roman numeral ten. Wait! Is Apple really calling it iPhone 10? What happened to iPhone 9? Is This Just an Apple Marketing Ploy?
It’s almost impossible to know for sure what to expect from a company like Apple. They’ve had a history of blazing their own trail for everyone else to follow. However, with the launch of the iPhone X, Apple is closely following in the footsteps of another computer giant, Microsoft.
Microsoft famously chose to skip Windows 9, and jump straight from Windows 8 to Windows 10. There was an immediate backlash when this happened, with people accusing Microsoft of trying to use the double-digit version number to convince reluctant Windows users to cough up the cash for an upgrade. Is the odd name choice just Apple’s attempt to get fans to buy a new phone when there isn’t a compelling need to do so?
On the one hand, the official reason for the odd naming convention is that it’s a tribute to the iPhone’s 10th anniversary. While this may be part of the reason, I can’t believe there isn’t something else going on here. Anyone who’s been following the release of new iPhones in recent years (which is probably most people) will notice that the S version is missing from the iPhone 8 lineup. This probably isn’t an oversight, but a measured response to this year’s release of the Galaxy S8 from Samsung. Perhaps Apple wants to avoid confusion of their iPhone model with a competitor’s.
On the other hand, a few critics hold the improbable belief that by calling the new iPhone design X, Apple is attempting to play off the word “exclusive” to create a psychological need for early adopters to purchase it. What’s more likely is that Apple wanted to add a little more cache to this unique model, and the special naming convention let them deviate from the iPhone’s normal look without creating any additional expectations for future iPhones. Of course, there’s an even more practical reason why the marketing gurus at Apple could have called the new phone X. With a price point well above the cost of other iPhones, the one-off name lets them charge a higher price without appearing too greedy.
Apple may also be engaging in one of its favorite marketing techniques called “price anchoring.” Since the entry-level iPhone cost $999, a price that’s significantly more expensive than the $699 for the most basic iPhone 8 (and makes the iPhone 8 Plus a downright bargain at only $799), this technique of offering a higher-priced version makes it seem more affordable by comparison.
What Makes the iPhone X Special?
So, is the iPhone X worth $999? The answer to this important question is yes, but only if you count yourself among the most ardent Apple supporters, and you have the cash to spare. iPhone X needs a bit of magic to assuage some of the guilt of buying it. Fortunately, the new model delivers a good amount of sparkle with its new look and capabilities.
The biggest change you’ll notice is that the screen takes up almost all the real estate on the front of the phone. Almost, but not all. Apple did away with the Home button on the bottom of the phone and stretched the screen to fill up much of the front. The screen is quite large at 5.8″. However, despite what some people claim, iPhone X is not bezel-less. But, it’s Apple’s first OLED screen and has a 2436 x 1125 resolution which is impressive.
One of the most anticipated features of the iPhone X is Face ID which allows you to unlock it by simply smiling at the camera. This is a new technology for iPhone, and despite its failure to function at the introductory presentation, Apple assures everything will work fine upon the launch. Plus, the rear-facing camera offers a 12-megapixel rear camera with dual optical image stabilization that allows for wide-angle and telephoto photographs. The camera also has options to take better selfies using Portrait mode and offers TrueDepth, which helps the camera analyze up to 50 muscles in a user’s face to allow for some fun animation possibilities.
The same A11 Bionic chip with 64-bit architecture powers the iPhone X, which powers the iPhone 8 and 8 Plus as well. And, the iPhone X runs on the brand-new OS 11 and works with Qi chargers, to allow for wireless charging capability—Another great feature.
As someone who’s always interested in new technology, the new iPhone X is intriguing, but I don’t know if I see myself spending the money to buy this model. However, for people who spend a lot of time with their phones, and might regret purchasing one of the iPhone 8 models, I think it would be a reasonable purchase.
by Felicien | Sep 25, 2017 | Education
Microsoft Teams introduces more features for educators, Skype users, freelancers, and more!
Make sure you’re taking advantage of them for your business.
Microsoft Teams is a social space/messaging service for companies using Office 365. It’s great for growing companies. And now, Microsoft has added some new features that increase Teams’ usability for multiple industries. Let’s check out the updates!
Guest Access
Of all the recent updates, Guest Access has the ability to rapidly grow Teams far beyond what it was in the past. It’s a handy feature that lets you access Teams from outside your company in a secure way. This comes in handy when you need to interact with the team while working on a temporary project. You can easily manage what guests are allowed to view or edit, and reports on their activity.
Before Guest Access, Teams was limited to groups within your company. Sure, there were ways to add guests to O365 temporarily, or when working in other programs, but you couldn’t include them in the nuts-and-bolts of your projects. Now you can safely let outside teams and team members join Teams with access to all the same features as your internal teams.
Guest Access makes it easier to:
Partner and work together on events and projects.
Include freelancers or other independent contractors in your project without making them a permanent part of your company.
Note: There’s an important caveat here. You must be listed in the Azure Active Directory to join as a guest. This is temporary and will be replaced with a more common Microsoft Account. But, for the time being, freelancers may have to jump through extra hoops if they want to join Teams.
Educator Controls
Teams was originally developed for the commercial market. However, Microsoft is heavily involved in developing educator resources, so it’s no surprise that Teams is making its way into the classroom. Current updates integrate Teams with OneNote to make it more useful for educational purposes.
Teachers can access their Class/Staff Notebooks from within the Teams window. This makes it easy to make quick changes in response to Team discussions (with less danger of forgetting about them in the future).
Anyone on the Team can view the non-restricted parts of a Class Notebook, and use the Notebook features to get their work done. This also includes support for editing within a browser.
Skype Integration
This is just a rumor, but it’s a strong one with some very good evidence. In September 2017, an accidental message appeared in Skype for Business that said: “Skype for Business is now Microsoft Teams!” The announcement was a mistake, and many assume that it’s an upcoming change Microsoft has yet to officially announce. Microsoft has been working to expand its social video offerings in Office 365, and the integration of Skype and Teams would make a lot of sense from a commercial perspective. Look for this in upcoming upgrades, and if you use Skype for Business, start looking into the Teams experience.
Tabs
Tabs is a very simple feature that’s vital for Teams, and it’s bound to be even more important in the future. Basically, it’s a little plus sign located at the top of the Teams chat window—Click on it, and you can add an O365 file button to the toolbar so it’s available to everyone on your Team. This lets you customize your Team by adding documents to the toolbar for instant access. This is immensely useful in a number of ways. It lets you:
Include training materials and resources for newcomers;
Post current project documents the Team is editing;
Refer to wikis or whitepapers with more information, and much more.
Tabs is compatible with multiple file formats and programs like Excel, PowerPoint, OneNote, specific websites, and more.
Connectors
Think of Connectors as a more advanced version of Tabs. With Connectors, you can connect an external app to Teams and display content in the channel. This is an involved process – It only works with some apps, and requires authentication so there’s less danger of malware infection or other problems. However, it includes popular apps like Twitter, Trello, Yammer, and a lot more. This makes Connectors a particularly handy conversion tool if you’re moving from an older service to Teams and you need to keep some functionality—Or if using particular app would help you complete projects more effectively.
Bots
There’s now a bot directory that allows you to upload specific bots from various services to Teams. These chatbots are typically created to search for information, or to complete simple tasks based on queries. With chatbots, you can instantly bring up information about polls, ticket prices, meeting schedules, available flights, and much more. If Cortana can’t-do what you need within Teams, then take a look at the available chatbots to see if one of them will work for you.
Why not check out Teams for your business? If you need assistance, {company} can help. We provide a variety of data and security services to growing businesses in Atlanta and surrounding areas. To learn more about our offerings, call {phone} or email us at: {email}
by Felicien | Sep 25, 2017 | Education
Data compliance is growing more complicated. Here are some pitfalls to watch out for.
It’s time to get smart about HIPAA compliance today. It’s not just complicated – it’s now more complicated because the healthcare industry has become increasingly dependent on digital communications.
As you know, HIPAA requires specific protections for medical data, and adhering to these requirements is challenging to implement in a digital space where threats abound, and healthcare companies are less prepared than ever.
That’s why we suggest you take a look at the worst HIPAA compliance mistakes—Be wary of these traps!
Believing That Your General Insurance Extends to Digital Security
General liability is essential for healthcare organizations—However, it doesn’t protect against everything. Did you know that digital security isn’t covered by your general insurance? You must get data breach insurance to help you recover from a data attack or loss.
Data breach insurance helps cover the costs of a data security breach for things like identity protection solutions, public relations, legal fees, liability and more depending on the coverage you choose.
Assuming You Can Handle Audits Internally
I always tell my clients that relying on internal audits is dangerous, and particularly so when it comes to data security. Most healthcare organizations are poorly positioned to audit their own digital security practices. It’s time-consuming and, due to fast-evolving external factors, it’s very easy to miss something or misunderstand a threat.
You should always bring in an expert to conduct data security audits. {company} can help with this.
Not Having a Plan for Social Media
In many ways, social media and HIPAA compliance are polar opposites. Social media is cavalier in the way it uses and spreads data, while HIPAA exists to keep data as private as possible. The problem is that healthcare organizations often rely on social media to communicate to patients and advertise their services.
Some social media use is to be expected—But, many healthcare organizations don’t address security issues when using social media because they don’t believe they’re sharing PHI—Wrong!
Sometimes, without knowledge of HIPAA regulations, employees mistakenly post protected data, especially if no one tells them not to! This is particularly problematic because there’s no way to get that data back once it’s live on social media. Even if a post is deleted, the info still lives on in an external server somewhere, making it a direct HIPAA violation.
Your employees need proper social-media training that includes bans against providing private information, even if a patient asks for it. Only let trained individuals post on your social media accounts so there are no accidental HIPAA violations. {company} can provide Data Security Training for your employees that covers social media use and much more.
Not Considering the Implications of Partner Contracts
You surely scrutinize your business agreements. But are you considering the fact that business associates may unintentionally share confidential patient information? And, if they do, that your healthcare organization will be responsible for the breach?
When you sign contracts for common data services, you may be violating HIPAA regulations without realizing it. You must consider how data is stored and moved in the cloud when working with others. Plus, a lot of companies advertise that they’re “HIPAA compliant” or “certified for HIPAA data” when this isn’t true. They will lie to get your business, and you’ll be at least partially liable if something goes wrong.
It’s important to find associates who have experience and long-standing respect in your industry— {company} does—And you should use BAAs (Business Associate Agreements) that reduce liability if a business associate experiences a data breach.
Not Complying with State and Local Laws
You stay on top of state and local regulations, but you may be missing something when it comes to HIPAA. HIPAA regulations typically supersede state laws, because state laws are less stringent. In cases where state law is stricter, then it should be followed—And this includes states of residence for the patient as well as your organization. This can prove particularly confusing when trying to expand or deal with complex cases (court subpoenas, familial access to data, etc.).
State and local laws can be confusing when navigating HIPAA regulations. This is another reason that external audits from {company} are an important part of your security process.
Forgetting About Guidelines for Lost or Stolen Devices
It’s not just healthcare organizations that have trouble with this, but you have the most to lose. Today’s mobile devices are ubiquitous, and, yes, frequently used for work. But, they also get lost, or even stolen, and that jeopardizes PHI.
If your computer devices aren’t protected with the right encryption and authorization, then you can be fined when a device goes missing. Always have a reporting system and mandatory encryption for data on all your mobile devices.
Not Planning for Data Destruction
According to HIPAA, electronic health data must be destroyed when replacing old computers with new ones. This means clearing all data, and then destroying the device itself.
To make sure data is cleared and your old computer devices are properly retired, you should ask {company}, your trusted managed services provider, to handle this task.
Do you have questions about HIPAA compliance or other data security requirements? We can help. Contact {company} to learn more about the services we provide in {city}. You can reach us at {phone} or {email}.
by Felicien | Sep 22, 2017 | Education
The Equifax breach was bad enough. Read about the most common Equifax-related scams to keep from being a victimized twice.
Over 143 million US residents have a reason to worry about the fallout of this year’s Equifax hack. As we all try to sort out how this massive breach has affected us, there are new dangers on the horizon. Consumers from all over the country are reporting an increasing number of Equifax-related scams that attempt to take advantage of the hacker’s victims.
I strongly suggest that our clients take the necessary steps to minimize exposure to this breach. Whether you sign up for aggressive credit monitoring or freezing credit reports, it’s important to take action to keep a bad situation from getting worse by recognizing Equifax scams.
Common Equifax Scams to Avoid
Fake Help Scam
Don’t trust anyone who contacts you out-of-the-blue offering to protect you from the Equifax breach. Many consumers report getting phone calls from people pretending to work for Equifax. Once the scammers convince the target that they’re from Equifax, they explain Equifax is helping vulnerable individuals sign up for credit monitoring. But before the target can sign up, he needs to verify personal information.
This scam has a high potential to trick many people, specifically because Equifax publicly promised to provide free credit monitoring for all US residents. A similar scam involves conmen posing as employees of another credit monitoring service.
If you receive a call like this, hang up instantly. Equifax won’t contact customers by phone. While Equifax did promise to provide credit monitoring, you need to sign up yourself.
Don’t let a scammer trick you into giving up your sensitive information. And just because your Caller ID says the phone call is coming from Equifax or another well-known company, it doesn’t mean you can believe it. Spammers can spoof your Caller ID to confuse you. Remember, you can check for yourself on the Equifax’s website to determine if you’re at risk because of the hack. If you are, you can sign up for their free credit monitoring for a limited time.
Tax Refund Fraud
Most people don’t realize that an identity thief can file a false tax return using their stolen information. After all, the IRS is part of the government—Don’t they keep records to prevent this thing from happening? While the IRS does maintain records on US taxpayers, they don’t scrutinize every tax return before sending out a refund check. By the time you realize someone stole your identity, the thieves are long gone. Now you’re faced with the difficult task of explaining what happened to the IRS.
With the popularity of eFiling, the IRS saw an increase in the number of identity crimes relating to tax returns. The good news is that this number has declined during the last few years. In 2015, there were over 700,000 reported cases of people filing tax returns using stolen identities—But in 2016, the number fell to 377,000. This was due to tougher security checks, and people working with tax preparers to minimize fraud. However, tax experts expect an increase in the number of fraudulent tax returns this year due to the enormous amount of personal information hacks stole in the Equifax breach.
One of the best ways to protect yourself from being a victim of a tax return scam is to file your taxes as soon as possible. Once the IRS receives your tax return for the year, any subsequent tax returns it receives won’t be processed.
Spear-phishing Scams
A phishing scam is an attempt by a fraudster to persuade you to reveal useful information. I am sure there isn’t a week that goes by when you haven’t opened your inbox and discovered at least one phishing scam. These types of emails are usually easy to spot and don’t cost people much more than a momentary delay while they delete them. However, there’s a deadlier version of a phishing scam circulating—It’s called spear phishing.
A spear-phishing scam is similar to a regular phishing scam, but it’s a lot more sophisticated. These scams are extremely dangerous because the scammer customizes the email for each victim. Instead of using generic information, like in a regular phishing email, a spear-phishing email includes real information, the same type hackers stole during the Equifax breach. In this way, they convince a victim that the email is legitimate. Spear-phishing emails can include your name, the names of your friends or coworkers, your place of employment, or even your current purchases or available credit.
Since spear-phishing scams are difficult to recognize, I tell my clients to never click links from inside an email. Always type the name of the website in a browser to verify that it’s trustworthy. And, be especially careful when dealing with emails that ask for private information. The best way to remain safe is to never send sensitive information via email. Instead, contact the sender of the email by telephone to make sure the correct person really requested the information from you.
The Equifax hack should serve as a wake-up call for many business owners. Take a second look at the way your business handles data. Make sure your company has a properly designed data security plan, and that your staff knows how to reduce the risk of data loss by conducting frequent training throughout the year. Feel free to contact me to find out if your data is secure.
by Felicien | Sep 22, 2017 | Education, General
Cloud computing is popular, but make sure you’re ready to make the switch.
Business owners are considering whether to transition from running software locally, to join the millions of companies already using cloud-based applications. According to RightScale’s 2017 State of the Cloud, the majority of companies depend on cloud-based solutions to run their business applications. Smart business owners recognize the inherent benefits of using these solutions to increase flexibility and scalability and lower costs while gaining the ability to reduce the need for in-house technical support.
However, RightScale’s findings aren’t all positive. Roughly a quarter of the businesses taking part in the survey still have concerns over the cost of cloud services, fears over security, or the belief they don’t have the expertise necessary to take full advantage of the cloud.
Computer Network Systems believes cloud-based solutions can benefit all businesses, but only when you put a solid cloud plan in place. We tell our clients that before they spend money on a cloud-based service, they must take the time to assess their needs, choose the correct cloud solution provider, and develop a strong cloud-management plan. And, of course, we’re always here to help them do this.
Assess Your Company’s Cloud Needs.
Before you even think about moving your company’s computing to the cloud, you must understand your computing requirements. While this may seem obvious, each year thousands of businesses purchase services that don’t meet their needs—They wind up wasting money for extra services they’ll never use. Industry experts estimate the average business wastes between 30 and 45 percent of their cloud resources. Decide what you need—Are you looking for a lower cost, better access, or more security? Your answer will influence which service is right for you. In addition, you should know what specific applications you require, and if moving to the cloud will require switching to different ones. If this is the case, you must determine whether the new application is compatible with your business operations.
How Do You Find the Right Cloud Service Provider?
Using the right cloud service provider can mean the difference between a successful stress-free transition to the cloud, and a disaster. Before you choose a provider, do your research. Start by asking each to explain what they offer.
Be sure to request a demo account to verify that the cloud solution you choose meets your needs.
Once you find a cloud service that works for you, it’s time to ask some specific questions.
Find out about the providers:
Security. How does the cloud provider prevent security breaches and protect their customers’ data? Ask whether they have a history of hacks, how they handled them, and what they did if customer data was breached. Also, make sure you know what happens to your data in the event you stop using the service. If your business has compliance requirements (like HIPAA or FINRA) you must be especially careful when selecting a cloud provider. Pricing. Many businesses are looking to save money by using a cloud-based solution. In this case, it’s important to know the real cost before committing to a change. Ask the provider about its pricing structure—Is it a per-user / per-month cost, or do they offer a flat fee? How about contracts? Does the service have multiple pricing tiers? What do they include? Is it possible to switch to a new tier level, or increase/ decrease the number of users?
Set-Up and Customer Service. The faster you can set up your account, the better. Most cloud-based business solutions make it fast and easy to get started—However, it’s a good idea to know how long the process will take before signing up. Make sure the company you choose offers adequate customer service so they can walk you through the set-up. Also, ensure they have a good reputation resolving technical issues, promptly and efficiently.
You Must Devise a Cloud Management Plan.
The last step before making the switch to a cloud-based solution is to come up with a detailed plan to manage different cloud services.
Did you know that the average business that switches to cloud-based solutions uses two or more different clouds? —And that some businesses require much more?
Who Will Manage Everything?
Between updating users, maintaining licenses, and making sure everything runs smoothly, there’s a lot of work to do. For companies that retain an IT department, this normally becomes its responsibility.
But this arrangement can lead to problems. Many IT professionals don’t have the experience to manage cloud-based services. This means you have to either hire a Cloud Service Manager or retrain your current staff to fulfill the role. And, businesses without an IT department still need someone to take care of their cloud services. This can add additional costs and may lower productivity. If cost-costing and a higher level of productivity are important reasons for changing to cloud services, you need to consider if it is worth it.
And, What About Migrating and Training?
You also need to plan how you’ll migrate your current data to the new services. Depending on the data you need to move, this may be a long and expensive process. If you can’t replace your legacy software with a cloud-based alternative, you’ll then need to maintain both the legacy software and the new cloud service, and find a way to incorporate the two into your workflow.
Plus, don’t forget—You’ll need to train all of your employees on the new system. Many cloud service providers provide training material to get your staff up to speed. However, you many need to rely on a managed service provider to do this properly.