Today, March 31st, is World Backup Day. No you don’t get it off from work and normally wouldn’t be going to any Backup Day parties, but it is a good reminder to revisit your backup solutions. Today is a good day to ask yourself… Is all the critical data you want being backed up? Are your backups working the way they should be? When was the last time you tested your backup solution? Do you even have a backup plan at all?
Keep in mind the 3, 2, 1 rule. Best practice is to keep 3 copies of your data, on 2 different storage mediums, with 1 offsite. If you are doing local backups to a hard drive it is best to backup to 2 drives alternating and keeping them in different secure locations. Another thing to keep in mind is even if you are backing up locally, it’s recommended to backup to the cloud as well. This way if a disaster such as a fire, theft or ransomware attack happens, your critical data is safe in the cloud.
World Backup Day happens once a year, but your backups should be running daily. It is important to make sure your backups are working properly and can be ready for retrieval when you need them.
MTSi can provide you with the best solution that fits your needs, call our specialists today!
508.324.9475 • www.mtsolutions.net
MTSi is very pleased to introduce our new Client Service Coordinator, Christine Dixon. Christine recently moved to the New Bedford area after spending the last year in Chicago, IL but is originally from the Tampa, Florida area. She has spent the last 3 years in the IT Staffing industry, in both recruiting, sales support and coordinator roles. Combining that experience and her previous experience in the cable and communications industry, we felt Christine would be a great fit for our company. Please help us in welcoming her to our team!
FierceHealthcare reported Advocate Heath Care was hit with $5.55 million in penalties from a settlement with the Health and Human Services Department’s Office for Civil rights. This is the largest HIPPA enforcement action yet against a single entity.
Among OCR’s findings against Advocate:
- It failed to fully assess the potential risks and vulnerabilities to its patient data.
- It did not apply proper security policies and procedures.
- It failed to implement physical access controls at a large data support center.
- It did not obtain security agreements with its business associates.
Read the full story here.
This goes to show how important IT Security Policies are. A security policy helps provide the framework for keeping your company at a security level desired by you. In addition it also helps with compliance and audits.
In addition to a Security Policy businesses should also consider having a vulnerability assessment done. These assessments are run by IT Security professionals and analyze vulnerabilities on a business’ network. This analysis will identify security holes in your infrastructure. From there reports are developed to assign levels of importance and can be used for planning remediation.
Check out MTSi’s IT Security page to see how we can assist in keeping your environment protected and in compliance.
Visit our website here.
For those readers unfamiliar with the concept of Bitcoin ransomware, we should take the time to briefly explain what this phenomenon is all about. Whenever a computer is affected by ransomware, nearly all necessary files will be locked – or encrypted – with a particular password. The end user has no idea what this password could be, nor can they regain access to their files.
The – allegedly – only way to restore file access is by paying a sum of money to the person responsible for infecting one’s device. In most cases, this amount can only be paid in Bitcoin, which a lot of people see as an anonymous digital currency, even though it is not. Hackers feel safe accepting Bitcoin payments, as they think people will not be able to trace the funds. Unfortunately for them, the blockchain keeps track of all resources in real-time, and is publicly accessible, making the digital currency anything but anonymous.
As one would come to expect, consumers and even IT professionals tend to panic when they are infected with Bitcoin ransomware, as they see no other option than paying the money. However, there are certain precautions people can take to either ignore the infection altogether or obtaining the decryption key – or password – to regain access to their files without paying anything.
Source: PC World and http://www.newsbtc.com/author/jp-buntinx/
Needless to say, computer security is of the utmost importance to any user, regardless of whether it is a home computer or company machine. Regular backups are needed in every type of situation, and Bitcoin ransomware is a scenario in which a backup will be extremely useful.
Rather than paying the ransomware fee itself – which should always be a last resort – one can just regain access to their files by reverting to a backup before the Bitcoin ransomware infection took place. While this may lead to some missing information, at least the computer becomes usable once again. Reverting to an earlier backup saves a lot of time and money, instead of paying the Bitcoin sum.
Which brings us to the final piece of information users need to keep in mind at all times. Even if one were to pay the Bitcoin ransomware sum, there is no guarantee the hacker will give the password or decryption key to restoring access to one’s files. There are plenty of preventive measures to take, and users have no excuse to justify paying in Bitcoin when their PC is infected with ransomware.
Find out More about MTSi Remote Backup
It is no secret how ransomware attacks will only occur due to a mistake by the end user. Similarly to how most of the malicious software in the world reaches critical mass, computer users need to stop clicking unknown links, especially when they are sent via social media or email. Even if that message comes from a family member or friend, never click any link included in the message to avoid ransomware, malware, or any other type of software infection.
Secondly, there is no need to install new software when prompted to do so. If a user is opening a link to a video on a website, and a popup appears to install additional software, click it away or leave the site immediately. Nearly all of these popups and websites are created for malicious purposes, such as spreading ransomware.
Granted, there is only so much that can be done regarding preventive measures. Now and then, someone will click a link they shouldn’t have, or open an email attachment containing Bitcoin ransomware. But when disaster strikes, there is still no need to start panicking all of a sudden. There are other precautions to take in the event of getting infected with this ransomware, but restoring access to files without paying the Bitcoin amount.
Comcast Business has recently added a new voice line to their services. Comcast’s Voice Mobility Line allows the functionality of an office phone on the go. Voice Mobility offers many calling features like Simultaneous Ring, Sequential Ring, and BeAnywhere. These features are easy to manage in your online account or through your smartphones. The Voice Mobility app is compatible with your iOS or Android devices. Now you can easily take your office calls even when you are not at your desk. Learn more about Voice Mobility here.
To learn more about MTSi’s Carrier Services or to request a quote visit our website http://www.mtsolutions.net/internet.html
We have announced the winner of the $50 Gift Card in this month’s newsletter! Congratulations!
Be sure you check out this month’s newsletter and learn how you can win a $50 Gift Card!