5 Employee Bad Habits Risking Company Data

When people think about cyberthreats, they usually think of external threats caused by cybercriminals living in remote locations. However, 95% of security breaches are caused by internal human errors. Employee bad habits act as a catalyst for poor security practices within an organization and put a company’s data at risk.

Here are five common employee habits that can adversely impact a company’s security:

1. Poor Documentation Practices

  • Multiple employees view, edit and share your critical documents throughout the day. Without tracking who is accessing the documents, your data is more likely to get misplaced. You also need to incorporate access permissions, version control, etc., to limit access to critical data.
  • Employees who rely on manual documentation tend to miss key information, which creates room for errors and puts data at risk.
  • Employees who do not create or document a disaster plan for themselves or are not aware/trained on what to do post a cyberattack, tend to lose vital company data that can never be retrieved.
  • Lack of rules for accessing data from external networks can easily put your data at risk. You need to encrypt both your data transfer and storage.

Read More ›

2022 needs to see more spending on cybersecurity.

The annual State of IT report released by Spiceworks Ziff Davis, a global marketplace that connects technology clients and vendors with the most actionable and precise intent data, shows that managed security services spending is projected to increase in 2022. According to the report:

“In 2022, enterprises are expected to spend a significantly greater portion of IT budgets on security appliances. In fact, enterprises — with their bigger attack surfaces — are more likely to increase IT spending due to security concerns overall.”

Cybersecurity experts are pleased that companies finally seem to be willing to spend more on security. But how does Ziff Davis show security budgets being allocated? And how do independent experts view the shifting priorities?

Holistic security solutions a must

According to State of IT report, the top security expenditure in 2022 is expected to be employee security training tools (ESTT).

“Companies can no longer focus on singular solutions, they have to be holistic. The tools used to train employees in security protocols can be everything from cloud-based solutions to end-user education,” says Mike Medford, a cybersecurity specialist in Honolulu. “It used to be that there were more `silver bullets’ available to contain security threats, but that simply isn’t the case anymore. Companies must cast a wider net and that is ESTT.”
Read More ›

Announcing our new SaaS ERP platform powered by Datto

We are excited to announce our successful transition to a new best-in-class unified SaaS ERP platform with integrated Professional Services Automation (PSA) and Remote Monitoring Management (RMM) powered by Datto. The new PSA/RMM platform helps us provide secure and reliable end-to-end services focused on helping our clients with their evolving needs and our commitment to delivering best in class services and solutions.

In addition to maintaining complete insight into the computer networks under our management while performing tasks and services quickly and efficiently critical to your success, the new platform offers us better AI-based automation, better client engagement (i.e. client portal, desktop agent, etc.), as well as more detailed and accurate reporting on our service levels and overall performance as your business technology partner.

We look forward to serving you better and we always welcome your feedback and comments.

Show Your IT Infrastructure Some Love: It’s Been Working Really Hard for Your Business

Most of us have wrapped up our summer chilling and vacation by now and it’s time to dive back into work. But while we’re still drafting out the plan for fall work progress, what about giving your IT infrastructure a well-deserved break? Or even better: a much-needed upgrade.

Your mission-critical IT infrastructure needs an opportunity to refresh, too, so that it can continue to do its best at providing you with the power to maintain and accelerate your economic growth.

Instead of wasting money on inefficient hardware to collect dust, invest strategically in a Hyper-Converged Appliance (HCA) from NUMENTIS. Here are some of the benefits:

*             Unlock close to 100% of your underlying hardware potential

Read More ›

3 Ransomware Myths Businesses Need To Stop Believing Now

Despite the rising ransomware numbers and the numerous related headlines, many small and medium-sized businesses (SMBs) still don’t consider themselves at risk from cyberattacks. Nothing could be further from the truth. Smaller organizations are a prime target, and ransomware authors have only upped the ante in their methods to ensure they get paid. For example, many ransomware groups now threaten to expose or sell company data stolen in a breach if victims refuse to pay, meaning the business in question could have to shell out for heavy fines due to GDPR and similar regulations. In many cases, paying the ransom may be the most cost effective (and least publicly embarrassing) option. But what if your business can’t afford it? Or if the downtime from the attack is too much to recover from? And what’s the long-term psychological and emotional toll?

Here are 3 myths about ransomware that businesses need to stop believing to stay resilient against these evolving and insidious attacks.

Read More ›

5 Must-Have Features for a BCDR Solution

In today’s cutthroat environment, businesses cannot afford downtime due to cyberattacks, hardware or software failure, natural disaster or human error. That’s why a robust business continuity and disaster recovery solution (BCDR) is imperative for their survival. We at NUMENTIS deliver efficient BCDR solutions that our clients can rely on to keep business-critical processes up and running at all times.

Read More ›

Why Managed Services Will Drive The Future Of Remote Work

Reflecting on the past year, it’s clear that remote work played a major role in maintaining business operations. Many businesses quickly moved to a full or hybrid remote work model in response to the pandemic, which in turn led to an increase in the need for IT services necessary to resolve a myriad of issues that arose as a result and to ensure business continuity.

At the start of 2020, the Technology & Services Industry Association (TSIA) released The State of Managed Services 2020, a report that revealed the ratio between products and services for the T&S 50 (an index of 50 of the largest tech companies). The report showed services now comprise 60% of revenue, a stat which confirms IT services are a growing industry and remain a top process outsourced by small businesses.

Read More ›

Is having a Microsoft 365 data backup strategy important?

SaaS productivity apps like Microsoft 365 (Formerly Office 365) just make sense in today’s mobile world— the benefits of easy access to documents from any device and improved collaboration are obvious. However, many organizations believe that moving to Microsoft 365 means backup is no longer necessary. According to a recent Enterprise Strategy Group report, one in four businesses don’t believe they need to back up Microsoft 365.

Some of the confusion might be due to the fact that Microsoft 365 offers some safeguards to prevent data loss. Others simply believe that because data is in the cloud, it is automatically backed up. Still others believe that Microsoft OneDrive file sync is a replacement for backup. These are all misconceptions. Backup is equally important for Microsoft 365 as it is for
onsite deployments of Microsoft applications.

Read More ›

How to Protect Yourself Against Vaccine-related phishing

Vaccine-related phishing — Cybercriminals are exploiting the heightened focus on the COVID-19 vaccine to launch spear-phishing attacks. Capitalizing on fear and uncertainty, the attacks using urgency, social engineering, and other common tactics to lure victims.

Barracuda researchers identified two predominant types of spear-phishing attacks using vaccine-related themes: brand impersonation and business email compromise.

Read More ›

SolarWinds Orion Hack: A Cybersecurity Wake-Up Call

It has long been theorized among cybersecurity and military professionals that they next major war between world powers may not involve the firing of a single kinetic weapon. The SolarWinds Orion hack may just be the first known attack to rise to this level.

As of this writing, all indications seem to be pointing to a unit of the Russian SVR, the equivalent of the US CIA, as the actor behind this hack. However, I can’t state this too strongly, it is still very early in the analysis and this assessment may change. For now, it does appear that this is a cyberattack backed by the Russian government against the United States and other Western nations. If this is true, this could be classified as an act of war and when and how the U.S. responds will have profound implications for the world.

Read More ›