13 05, 2019

Communicating after a Cyber Attack

2019-08-14T16:31:04+00:00May 13th, 2019|Tags: , , , , |

Organizations of all sizes are at risk for cyber attacks that can cripple operations and cause lasting damage. Businesses must have a plan in place for communicating with customers in the event of an attack so as to minimize losses. We are happy to share some information from our partners at Pronto Recovery about planning your communication and response after a cyber attack. The costs of a cyber crime The price tag of a security breach is staggering, with an average cost of $1.2 million. Cyber crime will cost the world in excess of $6 trillion annually by 2021 and financial costs are not the only consequences. Ransomware attacks are the #1 cyber threat to businesses and are growing at a yearly rate of 350%. These often start with a simple phishing email and can lead to the complete shutdown of business operations. One-third of companies surveyed claimed their company lost intellectual property due to a cyber-attack and 36% of them believe the attack reduced their competitive advantage. In today’s globalized business environment, organizations of all sizes face the prospect of falling victim to a cyber-attack or IT outage that could cause serious damage to its infrastructure and ability to operate. Despite the improvement of cyber-security techniques, criminals continue to develop sophisticated ways to disrupt systems and steal data. The need to prepare for cyber-attacks is more important than ever. According to Cisco’s 2017 Annual Cybersecurity Report more than one third of the organizations that experienced a cyber breach in 2016 reported a loss of customers, business opportunities and [...]

10 01, 2019

Cybersecurity Trends – BEC Phishing

2019-05-16T17:55:45+00:00January 10th, 2019|Tags: , , , , , |

Ransomware may be the number one cyber threat but there is another, newer cyber attack that is not being talked about enough. This threat can result in the loss of millions of dollars for companies who are affected by it and lead to the complete shutdown of their email systems – Business Email Compromise. We are happy to share some information from our partners at Pronto Recovery about BEC attacks and how you can protect your business. Business Email Compromise or BEC is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Unlike the typical phishing attacks that target everyone, BEC specifically targets high level business executives such as the CFO or corporate attorney to initiate a wire transfer. BEC scams have three main versions: The Bogus Invoice Scheme: this scheme involves a business that has an established relationship with a supplier. The attacker then requests a wire transfer for invoice payment to an fraudulent account via spoofed email, telephone, or fax. CEO Fraud: in this scheme, the attacker pretends to be a high-level executive or attorney who requests a wire transfer to be initiated with instructions to urgently send funds to their bank. Account Compromise: in this version, an employee’s email account is hacked and then used to make requests for invoice payments. And though not as common as the typical phishing email, an FBI announcement in 2017 confirmed that between October [...]

7 09, 2018

Facebook Building $1B Data Center

2019-07-05T17:19:27+00:00September 7th, 2018|Tags: , , , , |

On September 5 Facebook’s VP of Engineering Jay Parikh announced plans to build a new $1 billion data center in Singapore. This will be the first data center engineered by the company in Asia and will run on 100% of renewable energy. The planned 1.8 million square foot facility will employ evaporative cooling technology to minimize water and power consumption while maintaining the required temperatures without supplemental cooling, reducing water usage by 20%. Singapore’s location and more relaxed stance on the storage and transfer of data than surrounding countries has led many tech companies to build there including Google, who has 2 centers there already and is planning a third. Singapore currently has over 80 active data centers and the Singapore government is encouraging growth in the market. The data center is expected to begin operations in 2022, although the construction will continue past that date. ImagIT Solutions is a network engineering company that provides comprehensive IT services for channel partners, managed service providers and enterprise businesses with multiple locations. ImagIT was founded with the goal of providing comprehensive, IT services for multi-site organizations. Built on providing exceptional customer service with the most trusted technicians in the field, we continue to grow with our clients and expand internationally. Our team of 400 expert engineers and full PMO are ready to take on any type of networking engagement!  Whether its proactive support, an emergency call, long-term projects or ongoing break-fix services, ImagIT will deliver a solution that is customized to best fit your organization. [...]

15 12, 2017

Business Continuity and Disaster Recovery

2019-07-16T21:11:14+00:00December 15th, 2017|Tags: , , , |

As cyber threats increase and with so many natural disasters happening every month, it has never been more important for companies to be prepared for the unexpected. We are happy to share some information from our partners at Pronto Recovery about being prepared for disaster, because the only thing harder than planning for an emergency is explaining why you didn't. Is your business at risk? Natural disasters such as Hurricane Harvey, Irma, Maria, and the Mexico City earthquake (just to name a few) have caused billions of dollars in damages just in the past year. Meanwhile, cyber-attacks such as the WannaCry ransomware attack have affected computers, IT systems, and networks worldwide. Disasters happen every day and the extent of the damage they leave behind may vary, but with thorough and tested plans you can reduce the impact they have on your organization. A disaster doesn’t have to be a large-scale event like a natural disaster or cyberattack to compromise your premises, they can be any small-scale, man-made or accidental, internal or external events that affect your employee’s ability to continue operations. Companies should prepare for all possible disaster scenarios, which is where business continuity and disaster recovery come into play. While there are many similarities between business continuity and disaster recovery - and on many occasions the same team will be involved in both within an organization - BC and DR are two separate plans with similar yet different goals and objectives. Disaster recovery vs. business continuity Disaster Recovery is more reactive and focuses [...]