We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Armored Car Cybersecurity

Armored Car Cybersecurity

It’s fair to say that most business owners aren’t cybersecurity experts. That’s why there is such a large investment in cybersecurity solutions. That outlay is justified, sure, but is it effective? Today, we’ll talk a little bit about network and cybersecurity, and how all the capital investment in the world may not actually keep your network secure. 

Always Manage Risk

I’d like to start by saying that it would be good for all of us if we didn’t put blind faith in something that our business relies on. For example, if you go buy a new car, you expect that the car will operate well enough, until it doesn’t. According to Consumer Reports, the average life expectancy of a modern vehicle is around eight years or 150,000 miles. When you purchase it, your expectations are that the car you buy (with proper maintenance), will last you at least that long, if not longer. You expect it to be your daily driver until you finish paying off the car, and enough time as where you feel as if you’ve got a value for your car.

Business owners can think this exact way about their cybersecurity investments. If you invest in a backup, a firewall, a security suite, and you are diligently auditing your IT infrastructure with your IT company in the hope of locking down your network, you may think that your efforts will be repaid with a threat-free IT infrastructure. You may even institute more structured tools like multi-factor authentication just to make sure. The problem is that we are fighting an uphill battle against cybercriminals.

It’s not that these solutions don’t work. It’s not like our techs aren’t complete professionals and are ultra-vigilant in their monitoring and maintenance tasks, it's just that the threat landscape is filled with craters. Going back to the car analogy, sometimes buying cybersecurity tools, is like buying an armored car and realizing there are people on every street corner with bazookas. 

Look, I have confidence in my people, I have confidence that when we work with a client and set them up with all of our security solutions and our business continuity device that it is the right thing to do. I have confidence that these tools will work to keep the massive array of cyberthreats out of your network and off of your infrastructure. I just can’t guarantee it. 

The Tools Are Being Targeted

You can’t go a day without a software provider disclosing an attack that exposes thousands (or millions) of records. Do you think that most of these companies don’t take care like you and I take care? Just recently, the popular antivirus company Avast and virtual private network service NordVPN were targets of data breaches. Fortunately, in both breaches it seems as if no end users were harmed, but these attacks are complicated. 

Another security firm, Comodo, was recently attacked by hackers who exploited a vulnerability on its user forums. The breach resulted in the theft of 245 thousand users’ personal data.

Back in August, Imperva, who provides high-end cybersecurity protection solutions, informed customers that it recently discovered a “security incident” that exposed the sensitive information of users utilizing one of their products over the past 11 months.

These are multi-million-dollar a year cybersecurity companies that are doing the right things, being victimized. As we see more and more businesses like this getting targeted, the threats really get scary. 

Amazingly Enough, IT Companies are Targeted, Too

You might think it’s nuts that a hacker would target an IT company. After all, our whole business model is centered around risk management, proactivity, and having access to today’s strongest tools. These major security software developers are one thing, but the managed service provider?

It’s not as crazy as you may think. IT providers sell on security, we help businesses find the right security for them, we implement and coordinate integrations. We have all the information, and that’s exactly the currency of the cybercriminal. 

Last October, the U.S. Department of Homeland Security’s Computer Emergency Readiness Team issued an alert regarding cybercriminals attacking MSPs directly. Over the past year, we’ve seen other MSPs hacked, exposed for bad practices, or worse. Over the last year we’ve been seeing more and more cases where an MSP was the target of a data breach. 

Clearly, I’m not saying that our clients are at risk simply because we are a managed IT provider. We take more precautions than our clients, because we have to; and, we use the experience to provide better services for them. We also believe that because we are the experts, that it is our responsibility to raise the bar when it comes to protecting data, whether its ours or the data of our clients’.

The point is, the Internet is filled with situations and entities that enhance risk, and putting your blind faith in the tools money buys is a great way to have that risk compromise situations. No matter how comprehensive it is, you should always be auditing your cybersecurity. If you aren’t, it is time to start. If you are already working with an IT company and they are telling you with full confidence that your network is safe, get a second opinion, because anything less than full confidence can’t be trusted.

If you need help with your cybersecurity strategies, or you need that second opinion, give us a call at 708-781-7110 and we’ll discreetly help you solidify your security strategies.

Control Your Profile, Part I
Office 365 Offers More Than You May Think
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, December 19 2024

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Many of today’s businesses span continents. That’s not an exaggeration. With faster Internet speeds fueling remote workforces, some businesses choose to strategically use workers from all over the globe to create and sell their products or services. In today’s blog, we’ll di...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.