Michael Johnson

8 Essential Reasons to Outsource Your IT Services

8 Essential Reasons to Outsource Your IT Services

Technology moves fast and furiously. In this modern world, you need IT services for your business to run as smoothly as possible. The last thing any well-run company wants is for their IT issues to trip up working conditions so your employees are frustrated, and not being as productive as they should be. Ideally having the right technology in place can help your business to be more profitable in the long run. The question then becomes, is it better to have your IT department in-house or outsource those services? There are actually many terrific benefits to outsourcing your IT services to the right qualified professionals.

Outsource IT Services

Here are 8 essential reasons to leave it to the pros at a managed IT service company for all your technology needs.

Reason #8: Increased Productivity

When companies have their IT services in-house, this can take up time and reduce productivity among the staff. It’s been shown that Managed Service Providers (MSP) who have all the right credentials can implement IT solutions for you in a much faster way. The speed and efficiency an outsourced IT company can give you will allow your business to operate at full capacity much faster in the long run. Less IT distractions equal a better working environment for your staff.

Reason #7: Focus on Core Operations

If you and your employees have to worry about IT glitches and struggles, it’s going to carry over into your daily working environment. That takes away the focus on your core operations. Your managers and employees have limited time to do their job. There are only so many work hours in a day. They can do their jobs better without having to get sidelined by IT problems they shouldn’t have to deal with.

Reason #6: Smaller Business Can Compete

Smaller companies sometimes can’t afford the kind of IT services that larger, more established companies use. By having an MSP who can give you the kind of technological advance that larger companies can afford, will make it easier to compete with the “big guys” on a global scale.

Reason #5: Risks and Threats Are Handled

Most outsourced IT companies are available for risks and threats 24 hours a day, 7 days a week. It’s something they monitor all the time. They will be able to handle and manage these threats for you seamlessly to keep your company operationally rock solid.

Reason #4: More Security

Security and compliance issues are less of a problem with experienced IT professionals. Hardware crashes, viruses, data corruption, and backup failures are less of an issue when outsourced IT people are constantly looking out for your company’s security.

Reason #3: Implement New Technology Faster

When you outsource your IT and need updates to be made to your technology, the professionals are going to be able to put that new technology in place much faster. They can also do these updates in off-hours that won’t interfere with your working day.

Reason #2: More Experienced IT Professionals

A company that focuses solely on IT is going to have all the right credentials and certifications in place that will allow you to have the most experienced professionals in your back pocket. A highly qualified MSP also has the most up-to-date training and ongoing education of everything involved in the technology sphere.

Reason #1: Less Expensive IT Costs

This is by far the most important reason in the minds of most companies, the bottom line. By not having your IT department in-house, you are going to be saving serious monetary resources. It’s just less expensive to outsource your IT costs with an MSP that works efficiently and allows you to pay only for the services your company needs from them.

8 Essential Reasons to Outsource Your IT Services Read More »

The Complete Guide to Managing Popular Extensions Successfully

Protect Yourself from Potential Attacks Via Chrome Extensions

Learn two simple ways to set the privacy and activity settings for each Google Chrome extension on your browser and steps the company is taking to protect users.

Google’s Chrome web browser is a popular choice for businesses the world over. Managing the extensions gives you more control and faster results when using Chrome to its best. Here’s a closer look at Chrome add-ons and how to use them effectively.

And with emerging cyberthreats targeting browsers, now is an important time to know your way around the extensions.

Browser Extensions

What Is the History of Google Chrome Extensions?

Google introduced Chrome in 2008. By 2010, there were more than 10,000 extensions available in the Chrome Web Store. Today, the company does not release the number available, but it’s estimated to be in the hundreds of thousands.

That growth brings with it an increasing vulnerability to attacks via vectors embedded in extensions. The company does work to keep malicious extensions out of its store but mistakes are possible. Other extensions can invade users’ privacy.

Should I Uninstall All Chrome Extensions?

Deleting all extensions is not necessary. Instead, use these two helpful tools to manage your extensions better and control permissions you provide to the add-in.

1. Use Extension Icons

To the right of the address bar, you’ll find icons representing the extensions you’ve installed. If you right-click on an icon, you’ll see an option titled “This can read and change site data” with three options:

  • When you click the extension
  • On [the site you’re on]
  • On all sites

The default is the first option, which limits the use of the extension to user-activated times. If an extension is “loud,” meaning it uses a lot of bandwidth, these settings can provide more control.

2. Use Extension Settings

If you click on the hamburger menu icon to the far right of your address bar, you can click on the option “More tools” and click on “Extensions.” This will bring up a screen with a box for each installed extension. Click on the Details button for any extension you want to modify. You’ll see the three options again, but also an option to add the URLs of specific sites on which you want the extension activated.

What Can Go Wrong with Browser Extensions?

There are several risks to installing browser extensions. Here are a few of the ways extensions can do harm:

  • Malicious intent. Malware can be installed unknowingly that uses your computer for other purposes. Kaspersky, for example, noted a recent example of extensions that made money for the hacker by clicking on pay-per-click ads.
  • Hijacking. If a hacker steals a designer’s credentials, an extension can be compromised by changing the functionality or inserting malware.
  • Purchases. Extensions are hard for designers to monetize. That’s why many are eager to sell their code if approached by a buyer. Users are usually unaware if extensions change hands, meaning a previously well-intentioned add-on can be repurposed.

Is Google Addressing Extension Security?

Google recently announced steps it’s taking to combat the security issues with extensions. Among its changes:

  • More granular user permission options
  • A requirement that extensions only request access to the minimum amount of user data needed to operate
  • Expanding privacy rules for extensions. Those that carry user communications and user content will join those that handle personal or sensitive user data and need to post privacy policies

Proactive steps combined with Google’s efforts are critical to keeping your browsing and data safe and secure.

The Complete Guide to Managing Popular Extensions Successfully Read More »

10 Questions Every Company Should Ask Before Outsourcing IT Services

Ten questions to ask while considering outsourcing your IT services to a provider.  

Many companies are outsourcing their IT functions due to convenience and budgetary constraints. Small- and medium-size businesses can focus their hiring of staff for their core business, and hire an IT consultant for their expertise and efficiency. However, even with the growth in IT consulting, there are several things you should consider before signing a contract.

Questions for Managed IT Service Providers

It easy to fall prey to assumptions when interviewing consultants to outsource IT services. Packaged services don’t always include additional IT support, management, maintenance and security needed for your business’ network. When agreeing to a contract, look carefully to make sure it contains everything you need. Here are some questions for you to ask when interviewing a new consultant.

1. How do you support security compliance?

Often IT providers support security compliance through their package bundles which include an array of features and components. On this list of features you should see firewall configuration, vulnerability patching, incident response, intrusion detection systems (IDS), demilitarized zones (DMZs), intrusion prevention systems (IPS) and more. These features should be included by default to protect your data and hardware.

Dependent on your industry and client list, you should have a good idea of the level of security necessary for your network to ensure compliance and proper security documentation. Discuss this with any providers you interview to match the level of security needed to protect your business.

2. How do you manage service integration?

In order to stay competitive, your company needs to fine-tune service integration. Standard Information Technology Infrastructure Library (ITIL) capabilities require integration and automation from your IT service provider to minimize errors and provide secure and effective on-demand service delivery.

3. How do you support incremental outsourcing?

In order to reduce risks associated with outsourcing, you can divide the requirements you need into manageable projects. If you provide a specific set of deliverables to your service provider to work with in a trial setting, you can better assess their completion. You have the option of having the work done on your premises or remotely to better prepare for completely outsourcing managed services.

4. Do you provide a service-level agreement (SLA)?

The service-level agreement (SLA) is one of the most important factors in outsourcing IT services. This agreement is where the service provider details the list of support actions they will provide including end-to-end program management and deliverables to your company.

The agreement should lay out how the provider will take on the project from your company, deploy a small remote or on-site team to coordinate and complete the work. Included in the agreement are delivery dates, the effectiveness of the work, surveys to ensuring the quality of service, and timeframes for the availability of services and service request response times.

5. How flexible is the SLA?

Can the provider grow and change as your business does? Changes within your company should be reflected by the services provided for your IT needs. As you grow, your company will hire more people, take on new projects, add new departments and functions, and have a need for scalable IT infrastructure from your IT provider. In fact, your service provider should have expertise in their field that includes the knowledge and experience to custom-fit a scalable infrastructure that you need for your company.

6. What kind of experience do you have?

If you look at managed service providers by price alone, you may find that you don’t get the expertise you need. It’s better to outsource your IT services needs to an expert that’s completed hundreds of projects successfully. Extract the most value from an experienced partner to gain peace of mind over the quality of work completed. Included in the experience is the latest training and tools available to best protect your company’s data.

7. How do you handle IT strategy vs. emergency support?

If your company has a strategic IT strategy, you need a service provider that can act as a partner in this process. Your service provider should be the expert resource to assist in your strategy. If all they do is take orders and offer emergency service, they are not the right fit for your company.

8. Who will govern our IT services?

Your SLA should include an understanding about who will govern and take responsibility for your IT services. By including a foundational governance framework, you will set the tone for future accountability and start with a shared understanding for your team and your provider’s team. This framework determines which entity makes specific decisions to support organizational principles.

9. What is your reporting process?

Formal reporting should be listed in your SLA and include the standard set of reports provided and a timeline for delivery of those reports from the provider. The frequency and scope of the formal reports between the provider and in-house manager should take place according to the schedule. However, many providers offer informal reports as work is completed.

10. How will you adopt new configuration management?

Changes are part and parcel of a business, making managing those changes routine for your IT service provider. For routine changes, your SLA should cover implementation, but if you have a large project then you should discuss management with your provider before implementation. You can initiate a change request to the provider to allow them to complete an analysis of how to proceed. Once the provider has responded with a schedule and any questions they have, you can move forward on the project together. With a system in place to accomplish new projects, it’s easy to maintain proper tracking and logging of work completed.

10 Questions Every Company Should Ask Before Outsourcing IT Services Read More »

Intel Chip Vulnerabilities: What We Know So Far!

What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities?

L1 Terminal Fault (L1TF

Understanding The L1 Terminal Fault (L1TF)

Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory.

Who or What is Vulnerable?

In short, Intel’s desktop, workstation, and server CPUs are exposed. What Intel initially described as impregnatable memory, has been found to have holes. That means sensitive data from other software and other customers’ virtual machines can be stolen from malicious software and guest virtual machines either on a vulnerable device or a cloud platform.

This private information may involve personal and financial accounts, passwords, and encryption keys. Also, they pose a threat to be taken from other customers’ virtual machines, including both System Management Mode (SMM) memory and SGX enclaves.

SGX, made by Intel technology, is intended to guard private information from code geared to peep and pry.

SMM serves as a computer’s clean-up operator.  This is an alternate software system that is usually placed in the computer’s firmware. It also has total control over the computer’s hardware and absolute admittance to all of its data.

Let’s break down the three areas, which Intel has named its L1 Terminal Fault (L1TF) bugs:

CVE-2018-3615

CVE-2018-3615 impacts Software Guard Extensions (SGX). More specifically, Intel says, “Systems with microprocessors utilizing speculative execution and software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via side-channel analysis.” The researching teams who discovered CVE-2018-3615, named the vulnerability, Foreshadow.

The Fix:

Fixing this vulnerability will require the microcode update. To be safe, it is also recommended that you update your operating system and VM hypervisor. The patches should be available now for just about all operating systems.

This bug was discovered by two different groups:

  1. Jo Van Bulck, Frank Piessens, Raoul Strackx from imec-DistriNet – KU Leuven.
  2. Marina Minkin, Mark Silberstein from Technion, Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch from The University of Michigan, and Yuval Yarom from University of Adelaide and CSIRO’s Data61.

CVE-2018-3620

According to Intel, “Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis.” In short, CVE-2018-3620 affects operating systems and SMM.

The Fix:

To fix this, operating system kernels will need to be patched. Also, the SMM needs the microcode update, to be safe.

CVE-2018-3646

Intel states, “Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and side-channel analysis.” CVE-2018-3646 affects hypervisors and virtual machines.

The Fix:

Fixing CVE-2018-3646 will require the microcode, operating system, and hypervisor updates in order to protect your data.

Extra Fix:

The way hypervisor software operates is by allowing virtual machines or processors to be run off shared resources of a physical server. At the same time, they use multi-threading – a technique by which a single set of code can be used by several processors at different stages of implementation. Intel calls this Hyperthreading, and it can split one of its cores to act like two separate processors of the multi-core CPU for the hypervisor. This technique creates what Intel calls “sibling threads.”

Since these threads share a pool of L1 cache memory attached to the core, a malicious guest, on one of the virtual processors, could manipulate the third variant of the L1 Terminal Fault and get data used by the other sibling thread.

Even though the virtual processor will recognize this and deny the request of the hacker, if the data is in the cache at the same time, it can be revealed to the hacker.

Both CVE-2018-3620 and CVE-2018-3646 were discovered by Intel’s engineers after the university researchers who discovered “Foreshadow” informed Intel about CVE-2018-3615, the SGX issue.

The Ultimate Fix

The real fix to all these problems will be made by replacing the processors. As Intel stated, when addressing L1TF, “These changes begin with our next-generation Intel Xeon Scalable processors (code-named Cascade Lake), as well as new client processors expected to launch later this year.”

For now, the best advice is to keep patching and be aware of any changes you see in the area of performance and speed with the patches.

Intel Chip Vulnerabilities: What We Know So Far! Read More »

The 10 Most Secure & Insecure Airports For WiFi In The United States

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel?

Safe Wifi Airport

Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want to think twice before connecting to the airport’s Wi-Fi.

According to Coronet’s findings, most airport public networks are unencrypted, insecure, or improperly configured. Hackers, therefore, have easy access to devices connected to the networks and they can potentially steal your personal data.

What Can Hackers Take?

Most public connections are either unsecured or require shared passwords. Hackers want to get between you and the websites you visit in order to look at your information. They do this with little effort on public Wi-Fi networks.

A weak network makes it easy for a hacker to gain access credentials to cloud apps, such as Microsoft Office 365, G-Suite, Dropbox, and iCloud. They can send malware to your device and the cloud, as well as breach your various forms of infrastructures. Although it’s not horribly difficult to cancel and replace credit cards and void unauthorized transactions, once passwords and business digital frames are exploited, it’s incredibly challenging to recuperate complete control over them.

How Were These Findings Conducted?

Coronet revealed which airports have the most vulnerable networks. They came up with a ranking system of airports by their threat level. Coronet amassed data from more than 250,000 consumer and corporate endpoints over a 5-month period that went through the 45 busiest US airports. They gave each of the airports a threat index score after assessing the vulnerability of the traveler’s devices who used the airport’s network.

“Far too many U.S. airports have sacrificed the security of their Wi-Fi networks for consumer convenience. As a result, business travelers, in particular, put not just their devices, but their company’s entire digital infrastructure at risk every time they connect to Wi-Fi that is unencrypted, unsecured, or improperly configured. Until such time when airports take responsibility and improve their cybersecurity posture, the accountability is on each individual flyer to be aware of the risks and take the appropriate steps to minimize the danger.” – Dror Liwer, Coronet’s founder and CISO

Top 10 Most Cyber Vulnerable Airports:

  1. Boston Logan International Airport
  2. Detroit Metropolitan Wayne County Airport
  3. Charlotte Douglas International Airport
  4. Phoenix Sky Harbor International Airport
  5. Dallas Love Field
  6. Newark Liberty International Airport
  7. Southwest Florida International Airport
  8. William P. Houston Hobby Airport
  9. John Wayne Airport-Orange County Airport
  10. San Diego International Airport

How Did The Hackers Specifically Get Traveler’s Information?

In its report, Coronet revealed some specific ways in which hackers were able to infiltrate the airport’s network and steal people’s information. In the worst rated airport, the data revealed that hackers in San Diego set up an “Evil Twin” hotspot with the name “#SANfreewifi” at the airport to trick users into connecting to it. This allowed them to have access to all of the files that the victims downloaded or uploaded while they were connected. Similarly, at Houston’s William P. Hobby Airport, which was rated third weakest, hackers created a network named “SouthwestWiFi.”

Top 10 least vulnerable airports:

  1. Chicago-Midway International Airport
  2. Raleigh Durham International Airport
  3. Nashville International Airport
  4. Washington Dulles International Airport
  5. San Antonio International Airport
  6. Louis Armstrong New Orleans International Airport
  7. Kansas City International Airport
  8. Lambert St. Louis International Airport
  9. Miami International Airport
  10. Tampa International Airport

How Do I Prevent Hackers from Attacking Me?

You don’t have to stop using public Wi-Fi for the rest of your life, and it’s not exclusively the airport’s fault. Let’s look at an easy solution to protect you from the majority of hackers.

Make Passwords Stronger

You have the ability to turn on two-factor authentication for all your web services. How this works is when you try to login to a website, the website will text message your phone with a code that you’ll enter into the site in addition to your password.

Even if a hacker has your password, they won’t have your phone — which makes it much harder for them to log in to your account.

Use a VPN

A VPN (virtual private network) is a secure and private solution within the wider internet itself that allows you to send and receive data while maintaining the secrecy of a private network.

If you access your data remotely via a VPN connection when you use public Wi-Fi, it can protect data from interception and networks from compromise.

Stay Vigilant

Most importantly, remember to always be alert and use caution when browsing the internet. In your browser, block cookies and remove tracking. Avoid unsafe or untrusted software recommendations. And lastly, avoid suspicious links in your inbox or on your social media feeds.

The 10 Most Secure & Insecure Airports For WiFi In The United States Read More »

Call Now Button