Page 1

YES! your Business

Is At Risk. Steps you must take to prevent data breaches or data losses and save your business lots of time and money.

Caleb I.T Solutions

www.CalebITSolutions.com 1


Pproduced By

Evolve Media Group Inc. For Caleb IT Solutions Evolve Media Group inc. 1444 Hamilton Street Suite 103- Allentown, PA 18101 brandbuilding@theemgi.com www.theemgi.com

2 Caleb I.T Solutions


YES! your Business

Is At Risk. Steps you must take to prevent data breaches or data losses and save your business lots of time and money.

www.CalebITSolutions.com 3


YES! YOU ARE A SITTING DUCK You, the CEO of a small business, are under attack. Right now, extremely dangerous and well-funded cyber crime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of small businesses like yours to steal credit cards, client information, and swindle money directly out of your bank account. Some are even being funded by their own government to attack American businesses. Large companies like Sony, Home Depot and Target are wellknown today for more than just their popular brand names; they’ve been the well- publicized victims of vicious cyber-attacks. Once relegated to the IT or security department, cyber security now has the attention of senior executives worldwide. The impact of cyber intrusions can run deep into an organization and bring about devastating loss of business, reputation and create liability on an unheard of scale. And it’s not only large organizations that are at risk; in the past few years, cyber criminals have focused their efforts on small and medium-sized companies in a big way. The 2012 Data Breach Investigations Study by Verizon shows that 71% of data breaches happened in businesses with less than 100 employees. And according to security expert Symantec, cyber-attacks on smaller 4 Caleb I.T Solutions


businesses are on the increase: over 40% of the cyber-attacks the company prevented in early 2012 targeted companies with less than 500 employees. All sizes and types of business are fair game for cyber criminals today, with smaller organizations often viewed as a much easier target. Small and medium-sized enterprises (SMEs) don’t usually have the in-house expertise or resources to deal with cybercrime, and most are too focused on the day-to-day of growing and running their business to deal with the risk. But smaller businesses are often ripe opportunities in the eyes of a criminal, loaded with valuable intellectual property, customer payment info and cash in the bank. Other reasons smaller businesses are so attractive to cyber criminals? In spite of recent highly-publicized hacks, large companies have invested heavily in sophisticated security strategies and teams and are now harder to penetrate. Cyber criminals have become increasingly sophisticated too; they often see the smaller vendors and partners of large companies as an easier way in, a stepping stone to the databases, networks and customer information of major corporations.

www.CalebITSolutions.com 5


WHAT IS CYBERCRIME AND WHO’S AT RISK? Cybercrime refers to any criminal activity that’s conducted using the internet. Attacks of this sort can include stealing bank accounts, intellectual property and trade secrets, confiscating and distributing confidential business or financial information, disrupting everyday business operations, planting and spreading malicious computer viruses and more. Any business that uses computers, smartphones, email, websites, social media or cloud-based services provides a point of entry for hackers and thieves. And, if your business creates, collects, stores or processes payment info, client names or records, intellectual property, has access to a business partner’s website, personal information or other sensitive financial or proprietary information, you are a potential target with much to lose.

HOW CYBERCRIME CAN IMPACT A BUSINESS

Cyber-attacks are a serious matter for company of any size, but their impact can devastate a smaller organization. A cyber-attack can: • Damage or destroy your company’s brand image and reputation 6 Caleb I.T Solutions


• Result in the loss of sensitive and proprietary information and intellectual property immediately and negatively impact sales volumes and market competitiveness • Perpetrate fraudulent activity in the name of your company, leaving you open to lawsuits, fines and penalties • Cause Leave company owners/directors vulnerable to lawsuits and personally liable for damages and fees • Be the cause of class action lawsuits by customers • Expose a company to the tremendous financial burden of litigation costs, compensatory actions and awards, business interruption and brand name restoration, to name a few. According to a 2012 nationwide study by digital security company Symantec and the National Cyber Security Alliance (NCSA), cyberattacks cost small and medium- size businesses an average of $188,242. Not surprisingly, many of these companies are forced out of business within months of being attacked. And while the number and frequency of major data breaches continues to increase overall awareness of the cybercrime threat, the study reports that the majority of small and mediumsized businesses have a false sense of security about their own chances of being victimized. While 77% of businesses studied say that strong cyber security is critical to their operations and brand success, nearly 60% have no plan for dealing with an attack if it were to occur.

www.CalebITSolutions.com 7


TAKE A PROACTIVE APPROACH TO YOUR SECURITY Today we use our computers to do so many things. We go online to search for information, shop, bank, do homework, play games, and stay in touch with family and friends. As a result, our computers contain a wealth of personal information about us. This may include banking and other financial records, and medical information – information that we want to protect. If your computer is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information. Spammers could use your computer as a “zombie drone” to send spam that looks like it came from you. Malicious viruses or spyware could be deposited on your computer, slowing it down or destroying files. By using safety measures and good practices to protect your home computer, you can protect your privacy and your family. The following tips are offered to help you lower your risk while you’re online. 8 Caleb I.T Solutions


Install a Firewall A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the Internet the way some telemarketers automatically dial random phone numbers. They send out pings (calls) to thousands of computers and wait for responses. Firewalls prevent your computer from responding to these random calls. A firewall blocks communications to and from sources you don’t permit. This is especially important if you have a high-speed Internet connection, like DSL or cable. Some operating systems have built-in firewalls that may be shipped in the “off” mode. Be sure to turn your firewall on. To be effective, your firewall must be set up properly and updated regularly. Check your online “Help” feature for specific instructions.

Use Anti-virus Software Anti-virus software protects your computer from viruses that can destroy your data, slow down or crash your computer, or allow spammers to send email through your account. Anti-virus protection scans your computer and your incoming email for viruses, and then deletes them. You must keep your antivirus software updated to cope with the latest “bugs” circulating the Internet. Most anti-virus software includes a feature to download updates automatically when you are online. In addition, make sure that the software is continually running and checking your system for viruses, especially if you are downloading files from the Web or checking your email. Set your antivirus software to check for viruses when you first turn on your computer. You should also give your system a thorough scan at least twice a month.

www.CalebITSolutions.com 9


Use Anti-spyware Software Spyware is software installed without your knowledge or consent that can monitor your online activities and collect personal information while you surf the Web. Some kinds of spyware, called keyloggers, record everything you key in – including your passwords and financial information. Signs that your computer may be infected with spyware include a sudden flurry of pop-up ads, being taken to Web sites you don’t want to go to, and generally slowed performance. Spyware protection is included in some anti- virus software programs. Check your antivirus software documentation for instructions on how to activate the spyware protection features. You can buy separate anti-spyware software programs. Keep your antispyware software updated and run it regularly. To avoid spyware in the first place, download software only from sites you know and trust. Piggybacking spyware can be an unseen cost of

Use a Strong Password –and Keep it to Yourself Protect your computer from intruders by choosing passwords that are hard to guess. Use strong passwords with at least eight characters, a combination of letters, numbers and special characters. Don’t use a word that can easily be found in a dictionary. Some hackers use programs that can try every word in the dictionary. Try using a phrase to help you remember your password, using the first letter of each word in the phrase. For example, HmWc@wC2 – How much wood coulda woodchuck chuck. Protect your password the same way you would the key to your home. After all, it is a “key” to your personal information.

10 Caleb I.T Solutions


Secure Your Wireless Network. If you use a wireless network in your home, be sure to take precautions to secure it against hackers. Encrypting wireless communications is the first step. Choose a wireless router with an encryption feature and turn it on. Computer, router, and other equipment must use the same encryption. If your router enables identifier broadcasting, disable it. Note the SSID name so you can connect your computers to the network manually. Hackers know the pre-set passwords of this kind of equipment. Be sure to change the default identifier on your router and the pre-set administrative password. Turn off your wireless network when you’re not using it. Remember that public “hot spots” may not be secure. It’s safest to avoid accessing or sending sensitive personal information over a public wireless network. You may also consider buying a mobile broadband card that will allow you to connect to the Internet without relying on Wi-Fi hotspots. A mobile broadband card is a device that plugs into your computer, laptop, PDA, or cell phone and uses a cell phone signal to provide high- speed Internet access. They are sold by cellphone companies and require a monthly service plan.

Be Careful if You Share Files Many consumers enjoy sharing digital files, such as music, movies, photos, and software. File- sharing software that connects your computer to a network of computers is often available for free. Filesharing can pose several risks. When connected to a file-sharing network, you may allow others to copy files you didn’t intend to share. You might download a virus or bit of spyware that makes your computer vulnerable to hackers. You might also break the law by downloading material that is copyright protected. www.CalebITSolutions.com 11


Shop Safely Online When shopping online, check out the Website before entering your credit card number or other personal information. Read the privacy policy and look for opportunities to opt out of information sharing. (If there is no privacy policy posted, beware! Shop elsewhere.) Learn how to tell when a Web site is secure. Look for “https” in the address bar or an unbroken padlock icon at the bottom of the browser window. These are signs that your information will be encrypted or scrambled, protecting it from hackers as it moves across the Internet.

Protect Your Bank Account Did you know your COMPANY’S bank account doesn’t enjoy the same protections as a personal bank account? For example, if a hacker takes money from your business account, the bank is NOT responsible for getting your money back. (Don’t believe me? Go ask your bank what their policy is on refunding your money stolen from your account!) Many people think FDIC protects you from fraud; it doesn’t. It protects you from bank insolvency, NOT fraud. So here are 3 things you can do to protect your bank account. First, set up email alerts on your account so you are notified any time money is withdrawn. The FASTER you catch fraudulent activity, the better your chances are of keeping your money. In most cases, fraudulent activity caught the DAY it happens can be stopped. If you discover even 24 hours after it’s happened, you may be out of luck. That’s why it’s critical that you monitor your account daily and contact the bank IMMEDIATELY if you see any suspicious activity. Second, if you do online banking, dedicate ONE computer to that activity and never access social media sites, free email accounts (like Hotmail) and other online games, news sites, etc. with that PC.

12 Caleb I.T Solutions


Remove all bloatware (free programs like QuickTime, Adobe, etc.) and make sure that machine is monitored and maintained behind a strong firewall with up-to-date anti-virus software. Finally, contact your bank about removing the ability for wire transfers out of your account and shut down any debit cards associated with that account. All of these things will greatly improve the security of your accounts.

Parents, Take Control Don’t let your children risk your family’s privacy. Make sure they know how to use the Internet safely. For younger children, install parental control software that limits the Web sites kids can visit. But remember – no software can substitute for parental supervision.

Manage Your System and Browser to Protect Your Privacy Hackers are constantly trying to find flaws or holes in operating systems and browsers. To protect your computer and the information on it, put the security settings in your system and browser at medium or higher. Check the “Tool” or “Options” menus for how to do this. Update your system and browser regularly, taking advantage of automatic updating when it’s available. Windows Update is a service offered by Microsoft. It will download and install software updates to the Microsoft Windows Operating System, Internet Explorer, Outlook Express, and will also deliver security updates to you.

www.CalebITSolutions.com 13


Have An Excellent Backup. This can foil the most aggressive (and new) ransomware attacks, where a hacker locks up your files and holds them ransom until you pay a fee. If your files are backed up, you don’t have to pay a crook to get them back. A good backup will also protect you against an employee accidentally (or intentionally!) deleting or overwriting files, natural disasters, fire, water damage, hardware failures and a host of other data-erasing disasters. Again, your backups should be AUTOMATED and monitored; the worst time to test your backup is when you desperately need it to work!

Prohibit employees to access company data with personal devices Don’t allow employees to access company data with a personal device that cannot be monitored and secured by YOUR IT department. The use of personal and mobile devices in the workplace is exploding. Thanks to the convenience of cloud computing, you and your employees can gain access to pretty much any type of company data remotely; all it takes is a known username and password. Employees are now even asking if they can bring their own personal devices to work (BYOD) and use their smartphone for just about everything. But this trend has DRASTICALLY increased the complexity of keeping a network– and your company data – secure. In fact, your biggest danger with cloud computing is not that your cloud provider or hosting company will get breached (although that remains a possibility); your biggest threat is that one of your employees accesses a critical cloud application via a personal device that is infected, thereby giving a hacker access to your data and cloud application. 14 Caleb I.T Solutions


So if you ARE going to let employees use personal devices and home PCs, you need to make sure those devices are properly secured, monitored and maintained by a security professional. Further, do not allow employees to download unauthorized software or files. One of the fastest ways cyber criminals access networks is by duping unsuspecting users to willfully download malicious software by embedding it within downloadable files, games or other “innocent”-looking apps. But here’s the reality: Most employees don't want you monitoring and policing theirpersonal devices; nor will they like that you’ll wipe their device of all files if it’s lost or stolen. But that’s exactly what you’ll need to do to protect your company. Our suggestion is that you only allow employees to access work-related files, cloud applications and e-mail via company-owned and monitored devices, and never allow employees to access these items on personal devices or public WiFi.

www.CalebITSolutions.com 15


CALL IN THE REINFORCEMENTS! We are prepared to help you implement the necessary tools needed to create a secure business. At no cost or obligation, we’ll send one of our security consultants and a senior, certified technician to your office to conduct a free Security And Backup Audit of your company’s overall network health to review and validate as many as 14 different data-loss and security loopholes, including small-print weasel clauses used by all 3rd-party cloud vendors, giving them zero responsibility or liability for backing up and securing your data. We’ll also look for common places where security and backup get overlooked, such as mobile devices, laptops, tablets and home PCs. At the end of this free audit, you’ll know: • Is your network really and truly secured against the most devious cybercriminals? And if not, what do you need to do (at a minimum) to protect yourself now? • Is your data backup TRULY backing up ALL the important files and data you would never want to lose? We’ll also reveal exactly how long it would take to restore your files (most people are shocked to learn it will take much longer than they anticipated).

16 Caleb I.T Solutions


• Are your employees freely using the Internet to access gambling sites and porn, to look for other jobs and waste time shopping, or to check personal e-mail and social media sites? You know some of this is going on right now, but do you know to what extent? • Are you accidentally violating any PCI, HIPAA or other dataprivacy laws? New laws are being put in place frequently and it’s easy to violate one without even being aware; however, you’d still have to suffer the bad PR and fines. Is your firewall and antivirus properly configured and up-to-date? • Are your employees storing confidential and important information on unprotected cloud apps like Dropbox that are OUTSIDE of your backup? It is natural to want to think, “We’ve got it covered.” Yet we can practically guarantee our team will find one or more ways your business is at serious risk for hacker attacks, data loss and extended downtime we have just seen it all too often in the businesses we’ve audited over the years. Even if you have a trusted IT person or company who put your current network in place, it never hurts to get a 3rd party to validate that nothing was overlooked. we have no one to protect and no reason to conceal or gloss over anything we find. If you want the straight truth, we will report it to you.

www.CalebITSolutions.com 17


4 Big Reasons Why Businesses Outsource Their Computer IT Support To Us:

1. FLAT RATE SERVICE

Eliminating 100% of your unpredictable and unplanned IT costs.

2. NO Nickel-And-Diming Or Fine Print

Our service agreements aren't full of weasel clauses and exclusions; you'll know exactly what you're paying for and what you can expect - no "gotchas" or hidden fees.

3. You'll Get A Professional Team, Not A "One-Man-Band"

Many IT businesses only have a few technicians on staff, which means you might be left waiting for hours or even DAYS to get your computer problems resolved because they're short staffed or too busy trying to serve all their clients.

4. Live Support 24/7:

You'll always have our technical support team available to you, day or night

Schedule Your FREE Consultation TODAY! Caleb I.T. Solutions

1444 Hamilton Street Suite 103* Allentown PA 18102 Phone: (866)-647-3331 | Email: Information@CalebITSolutions.com www.CalebITSolutions.com

Yes! Your Business Is At Risk.  
Yes! Your Business Is At Risk.  

You, the CEO of a small business, are under attack. Right now, extremely dangerous and well-funded cyber crime rings in China, Russia and th...

Advertisement