Author: Jessa Erickson

  1. Home
  2. /
  3. Author Jessa Erickson

3 steps you can take to protect your data in the Cloud

3 steps you can take to protect your data in the Cloud Moving to the Cloud offers tremendous benefits for SMBs that range from lower IT costs to any-time access to data and certainly more reliability in terms of uptime. But, data in the Cloud is also vulnerable to security threats just like the data stored on physical servers. This blog discusses 3 things you can do to protect your data in the Cloud Secure access: The first step would be to secure access to your data in the Cloud. So, how do you go about it? Safeguard your login credentials-your User IDs and passwords-from prying eye. Set strong password policies that are practiced across the board and educate your employees about good password hygiene. Also, do you have employees using their own devices to access their work-related applications and documents? Do you have staff working from home? Then, you also need to formulate strong BYOD (Bring-your-own-device) policies, so these devices don’t end up as the entry point to cybercriminals. Educate your employees: What’s the first thing that pops into your head when someone talks about cybercrime? You probably picture some unknown person, a tech-whiz sitting behind a computer in a dark room, trying to steal your data. But, surprising as it may seem, the first and probably the biggest threat to your data and IT security in general, comes from your employees! Malicious employees may do you harm on purpose by stealing or destroying your data, but oftentimes, employees unwittingly become accomplices to cybercrime. For example, forwarding an email with an attachment that contains a virus, or clicking on a phishing link unknowingly and entering sensitive information therein or compromising on security when they share passwords or connect to an unsecured or open WiFi at public places such as the mall or the airport with a view to “get things done”, but, without realizing how disastrous the implications of such actions can be. Choosing the right Cloud service provider: If you are putting your data in the Cloud, you need to make sure that it is in safe hands. As such, it is your Cloud service provider’s responsibility to ensure your data is secure and, accessible, always. But, are they doing all that is needed to ensure this happens? It is very important to choose a trustworthy Cloud service provider because you are essentially handing over all your data to them. So, apart from strengthening your defenses, you need to check how well-prepared they are to avert the threats posed by cybercriminals. Complete Cloud security is a blend of all these plus internal policies, best practices, and regulations related to IT security, and of course, the MSP you choose to be your Cloud security provider plays a key role in all this.

Is the Cloud really risk-free?

Is the Cloud really risk-free? The Cloud presents plenty of benefits that make it a very attractive choice, especially for SMBs who don’t want to be burdened with higher in-house IT costs, putting your data in the Cloud is not risk-free. Just as storing data on physical servers has its security threats, the Cloud presents certain security concerns as well. These include Data breach: A data breach is when your data is accessed by someone who is not authorized to do so. Data loss: A data loss is a situation where your data in the Cloud is destroyed due to certain circumstances such as technological failure or neglect during any stage of data processing or storage. Account hijacking: Like traditional servers, data in the Cloud could be stolen through account hijacking as well. In fact, Cloud account hijacking is predominantly deployed in cybercrimes that require entail identity thefts and wrongful impersonation Service traffic hijacking: In a service traffic hijacking, your attacker first gains access to your credentials, uses it to understand the online activities that happen in your domain and then uses the information to mislead your users or domain visitors to malicious sites. Insecure application program interfaces (APIs): Sometimes, Cloud APIs, when opened up to third parties, can be a huge security threat. If the API keys are not properly secured, it can serve as an entry point for cybercriminals and malicious elements. Poor choice of Cloud storage providers: A security lapse from the Cloud storage provider’s end is a huge security concern for businesses. It is very important to choose a trusted and experienced Cloud service provider who knows what they are doing. Apart from the above, there are some common threats that apply to both the Cloud and traditional data storage environments such as a DDoS attack, or a malware attack where your data in the Cloud becomes susceptible because it is being shared with others and at other places. Some Cloud security mechanisms that SMBs can invest in to keep their data safe Cloud firewalls: Much like the firewalls you deploy for your local IT network, Cloud firewalls work to prevent unauthorized Cloud network access. Penetration testing: Penetration testing is a sort of a Cloud security check where IT experts try hacking into the Cloud network to figure out if there are any security lapses or vulnerabilities that could serve cybercriminals. Obfuscation: In obfuscation, the data or program code is obscured on purpose such that the system delivers unclear code to anyone other than the original programmer, thus mitigating any malicious activity. Tokenization: Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.1 Virtual Private Networks (VPN): Another, more commonly used mechanism is the VPN. VPN creates a safe passage for data over the Cloud through end-to-end encryption methodology. Investing in a good Cloud security system is a must, but, in the end, you also need to remember that Cloud security is not only about antivirus software, firewalls, and other anti-malware tools. You need to pick the right MSP and work closely with them to implement a Cloud security solution that works for you. 1https://searchsecurity.techtarget.com/definition/tokenization

Things to consider before switching to the Cloud

Things to consider before switching to the Cloud More and more businesses are switching to the Cloud to store their data and rightly so. The Cloud offers numerous benefits over the traditional, physical on site server. For example, Anytime, anywhere access to your data: Information in the Cloud can be accessed from anywhere using an internet connection, unlike in the case of traditional servers, where you need a physical connection to the servers Significant cost savings: You cut hardware costs, because the Cloud follows a ‘pay-as-you-use’ approach to data storage SaaS compatibility and support: The Cloud allows the use of Software-as-a-Service since the software can be hosted in the Cloud Scalability: The Cloud lets you scale up and down as your business needs change 24/7 monitoring, support, and greater access reliability: When your data is in the Cloud, the Cloud service provider is responsible for keeping it safe and ensuring it is securely accessible at all times. They monitor the Cloud’s performance and in the event of any performance issues, they provide immediate tech support to resolve the problem Your big Cloud move: What to consider If you are considering moving to the Cloud, you will find it helpful to sign-up with an MSP who is well-versed with the Cloud. They can advise you on the benefits and risks of the Cloud and also offer the Cloud solution that’s right for you. In any case, before you migrate to the Cloud, make sure you are dealing with a reputed Cloud service provider who has strong data security measures in place. You can even explicitly ask them what security mechanisms they have invested in to manage data access and security. Yes, moving to the Cloud has it benefits, but it also has its challenges including security risks. Learn more in our next blog, “Is the Cloud really risk-free?”

4 things to consider before starting a WFH initiative

4 things to consider before starting a WFH initiative In our last blog, we talked about 5 things to plan and analyze before you initiate a WFH policy. In this blog, we address four interrelated issues that need careful consideration. Equipment – It should be outlined what equipment and utilities employers and employees are responsible for providing and maintaining. Will bandwidth be a reimbursable expense? Will laptops, phones, etc. be provided by the business or will this be a BYOD project. Equipment maintenance – If technology is provided by the employer, what is the employee’s responsibility to keep it maintained, upgrades installed, etc. Even if you have a BYOD policy, are employees required to bring their devices in for upgrades and security checks? Fair Labor Standards Act – Just because an employee works from home, it doesn’t mean overtime laws go out the window. The FLSA creates a framework for paying wages above the law’s definition of a 40 hour work week that includes overtime pay for work performed beyond that threshold.  Under FLSA, two basic classes of workers are defined: those employees who must be paid overtime when working in excess of forty hours (non-exempt employees), and those who are not required to be compensated for work done beyond the 40 hour limit (exempt employees) The problem FLSA presents is that non-exempt employees must be paid for all work, including any work activity outside regular working hours.  An example of the liability that is created for an employer are employees who respond to texts and emails from home outside “office hours.” This is compensable work and needs to be counted under the 40 hour threshold. Policies that protect you from any violation of FLSA should be articulated clearly in writing. Because they are not physically in the building, it becomes trickier to observe and limit their work activity. No Silos – When developing a WFH policy, the above issue of FLSA points out that effective WFH  planning and implementation requires collaboration, and not just between individual managers and employees. It is an IT issue-who is supporting all of this off-site technology and maintaining data security? It is a human resource issue-will performance measurements need to be tweaked? What about FLSA and similar laws? It is a legal issue-how is data governed by federal and state laws such as HIPAA and FERPA being handled? Is Wi-Fi permitted? It is extremely important that companies look into the legal angle before opting for the work from home setup. WFH can prove beneficial to both the employer and the employee if planned well and implemented properly.

Implementing work from Home: Planning Matters

Implementing work from Home: Planning Matters Work From Home, also commonly known as telecommuting, is a fairly general term that encompasses a range of workplace policies. Most generally, it refers to a policy permitting an employee to work from home (or any other approved remote location-the range of acceptable locations will differ depending on the organization’s policies). Beyond that WFH may or not be restrictive regarding working hours, breaks, equipment used, etc. For example, some WFH policies may require that an employee work within the standard corporate-approved workday. Other policies may simply require tasks to be completed when required. Once a business has determined that it wishes to explore a WFH policy, plans need to be put in place to roll out a new workplace telecommuting strategy. Implementation: Some Considerations Initial Note: Unless your firm is facing some unexpected risk event that requires you to quickly implement a WFH policy, the design and adoption of a policy should be carefully planned with forethought. There are many ways that well-intentioned WFH plans can stumble at the outset, setting everyone up for a failure that will be unfairly blamed on WFH. What jobs are eligible: The first step is identifying which jobs are eligible to be completed from home. Some jobs clearly require a full time presence in the workplace. Others, with some ingenuity, may be able to be partially handled on-site. Other jobs may clearly be eligible. (note: we refer to “jobs” here, not “employees.” There is a difference.) Which employees are eligible: Once it has been determined which jobs are eligible for partial- or full-time WFH, then the decision must be made about which employees are the best candidates to successfully adopt WFH. For instance, employees may be eligible for WFH only after they have completed a probationary or training period. Or longer, if that seems appropriate. A second criteria may be a good performance record. Employees with performance or disciplinary issues may be not eligible for WFH. A slow, incremental rollout: Adopting a WFH policy may represent a serious shift in company culture, management style, and operational processes. Doing it all at once is likely asking for trouble. Every project needs a beta stage, and WFH is no exception. Try adopting it with a few employees from one unit. Then do the same in another area. Then review and identify issues and concerns by talking with all involved. Set Parameters and Expectations: Policies you may wish to consider Availability window – Will it be necessary for them to be completely available during certain periods? For example, must they conduct their WFH within standard working hours, e.g. 9-5. Or will there be a flex-time approach, where availability is only required within a smaller window, e.g. 10-2. Responsiveness – How responsive must they be to emails, phone calls, text, etc? One of the risks of the modern workplace is the feeling employees have that they must be available 24/7. Because WFH may have less structure, this perception may be exacerbated. It is only about deadlines – just get your work done on time. The rest is up to you. Cancellation: If the plan is partially or fully repealed, will employees be given sufficient notice to make plans to cover for child care, etc? In short, this gives you some indication that one simply does not initiate WFH by issuing a laptop to everyone. If WFH is to succeed, it has to be designed around your company’s goals and unique requirements.

Why we still worry about Work from Home policies

Why we still worry about Work from Home policies If you have been in the workplace for a few decades, you may remember that the idea of telecommuting began to appear in the late 90’s as Internet access from home began to become more common. Telecommuting was often poorly received, as it carried the onus of being a “trick” to avoid working a full 8 hours. Then, with the arrival of residential broadband access in the 2000s, successfully conducting a large majority of your work tasks in real-time, from home, began to become very realistic for a large swath of office workers. Managers finally had to face their own biases against WFH. So what are the concerns that some in management have about WFH? Decrease in productivity – A common concern is that when at home, where there may be many domestic or entertainment distractions, workers will be unable to settle in and focus on their work. Kids, pets, laundry, Netflix, etc. may represent a strong magnetic pull from the work at hand. Oversight – Many managers fear that without onsite management ensuring that work is getting done, employees will slack off. Accepting or not accepting WFH for this reason represents the basic conflicting managerial attitudes in the Theory Y vs. Theory X developed by Douglas McGregor in the 1950s and 60s. Without going into detail, it hinges on whether a manager feels employees can be sufficiently self-motivated to succeed or must rely on external rewards and penalties to successfully perform their jobs. Loss of collaboration – There is also a concern that when people work alone, they miss the creative spark that comes from the unplanned and spontaneous discussion that comes about informally from mingling in the same space. Yahoo is an example of this concern. In 2013, the new CEO Marissa Mayer ended most work from home policies because she believed Yahoo needed the collaborative approach that she felt came only from sharing a common physical space. Planning – Operating an organization partially with off-site employees takes careful planning. For one thing, your IT infrastructure has to be able to accommodate the added requirements of an entirely digital office space. It also means your IT department is responsible for developing protocols to maintain off-site devices as well and support a uniform set of collaboration tools to ensure productivity is not lost because of technical problems or cumbersome work tools. In short, some of these concerns are valid, but they can generally be overcome, at least partially, when management is committed to developing a thoughtfully-designed set of policies that will dovetail with the company’s strategic goals.
Jul 13

7 ways a Work From Home policy can help your business

7 ways a Work From Home policy can help your business In the last several years, the concept of WFH has become increasingly more popular. Though some still remain skeptical, it has been gaining in popularity and become more widely accepted among management circles. That said, the pandemic event in 2020 essentially set the debate entirely aside, at least for the time being, because WFH became the only choice between working and shutting down. Aside from mandatory quarantines, why have organizations been adopting WFH policies? There are several factors that are motivating companies to select WFH. Employee satisfaction: Many, but not all, employees like the freedom to work from home at least part of the time. Offering WFH opportunities can increase levels of employee satisfaction. This ties in to the increasing concerns employees have about work/life balance. Most workers, especially younger ones, prefer organizations that allow a greater balance between life and work and they perceive WFH to be an important aspect of creating that balance. Productivity: Worker productivity is a major driver for WFH policy adoption. In the end, increased productivity is a bottom line issue and studies have shown that in many cases productivity improves when employees work from home. It may seem one’s house has many distractions, but the office may have more. Colleagues visiting, the hustle and bustle of a busy office space, and impromptu meetings can steal a lot of one’s day. And anytime a person’s focus is pulled away from a task, it takes several minutes for them to get back onto the level of engagement they had before the interruption. Less commuting time: Anyone who sits in traffic or takes the public transportation each day sees the merit in this benefit. Recruitment and retention: Recruiting top employees remains a serious challenge no matter what the state of the economy. Increasingly, studies by major consulting and recruitment firms are determining that the opportunity to WFH can be a key factor when selecting a new employer. The lack of a WFH opportunity has also been shown to be a reason for seeking alternative employment. Also, it can become a branding issue: employees and applicants, especially younger ones, may perceive office-bound companies as obsolete, less cutting edge, less competitive, and thus less desirable employers. Caregiving needs: While some WFH policies restrict at-home workers from handling caregiving needs, others provide WFH for that very reason. Employees who have child, parental, or spouse care responsibilities require flexibility to handle these demands. WFH may be a way to accommodate these needs. When it works, it can decrease turnover, as a large percentage of workers, especially women, end up leaving their jobs to handle child or parental care. That means losing quality, productive employees. It may be greener: Cutting down on daily commutes may have a net positive effect on energy savings. However, if nothing else, employees will see a cut in their weekly transportation costs. Real Estate costs: For companies and organizations who believe WFH will be their long-term model, this can mean eliminating office space, cutting considerable fixed-costs out of the bottom line equation.

Provide comprehensive and innovative solutions.

Empower our customer partners to achieve their business goals.

Leverage cutting-edge tech and best practices.

Cultivate a culture of continuous improvement.

Managed
close-link
It's never too late to ensure your network's security.

PENETRATION TESTING

SUBMIT
Cost varies based on number of IPs, for an accurate quote please get a hold of us.
close-link
COULD A vCIO BE JUST WHAT YOU NEED?

Learn how easy it is to employ the expertise of a CIO, without the high cost.

Say HELLO! to your new favorite business advisor.
SUBMIT
Managed
close-link

Premium Content Locked!

Unlock the secrets to a more efficient IT network with a comprehensive network assessment.
SUBMIT
X
Should you hire an IT Security & Compliance consultant?

We'll help you find out.

The best time to safeguard your data, is now.
CONTACT US TODAY
close-link
See what all the talk is about

GET BETTER SERVICE

at a better price
ASK US HOW
close-link
Empower your business
with our Total IT
Management solutions.
Hit the button below to find out how!
Let's Talk >
close-link
New customer exclusive offer!

WORRY-FREE IT START UP

Stop stressing over IT problems and start focusing on growing your business with
no onboarding fee and a free network assessment (up to $2,500 value).
LET'S GET STARTED!
Limited-time bonus: Sign up this quarter and get a free penetration test (up to $5,000 value).
close-link