(817) 439-3051

Monthly Archives: February 2018

How to Keep Your Customers and Salvage Your Business’s Reputation after a Data Breach
How to Keep Your Customers and Salvage Your Business’s Reputation after a Data Breach

 

Bad things can happen to good companies — and one misfortune that businesses might experience is a data breach. Discover what you can to do to rebuild people’s confidence in your company if the unthinkable happens.

Bad things can happen to good companies — and one misfortune that businesses might experience nowadays is a data breach. This type of cybercrime is increasing at an alarming rate. In the United States alone, the number of breaches rose 45% in 2017 compared to 2016.

A data breach can erode customers’ confidence in a company, which can result in lost business. It can also erode the general public’s confidence, which can result in lost business opportunities. Understandably, the size of the breach and the types of data stolen affect the level of confidence people have in a company that has been hacked. But there is another important component in the confidence-level equation: How a business responds to the crisis. For this reason, companies that have experienced a data breach need to be transparent, communicate effectively, and follow through on promises.

 

Be Transparent

While they might not like it, most people understand and accept the fact that data breaches occur. However, if you are caught trying to cover up a breach or intentionally mislead people about its size or severity, irreparable damage might be done to your business’s reputation.

This is why you need to be transparent about the data breach. In other words, you need to fully disclose information about the event in an accurate and timely manner. It is much better if news about the breach comes from official channels in your company rather than being leaked by someone else inside or outside your organization. You should inform your staff, customers, suppliers, and anyone else who needs to know about the event. When telling them, it is important to be honest about the size of the breach and the types of data stolen.

To further enhance transparency, you might consider bringing in third-party experts to conduct an independent investigation of how the breach occurred and what can be done to prevent future occurrences. Plus, an independent investigation will help show that you are taking the breach seriously.

 

Communicate Effectively

Simply telling everyone there has been a data breach is not enough if you want to keep your customers and salvage your business’s reputation. A lot of thought should go into what to say when you notify the various groups. Be sure to:

    • Take responsibility for the breach and apologize.
    • Let people know that your company is taking the breach seriously.
    • Empathize with the victims.
    • Provide details about the type of data that was lost and how it was lost, unless prohibited by law.
    • Discuss what steps you are taking so that this type of incident does not happen again.

 

When notifying the victims of the breach, you will also want to include:

    • The options or next steps they can take (e.g., signing up for a complimentary identity protection service)
    • Where they can get more information (e.g., calling a toll-free number or visiting a website you set up)
    • How to detect fraud (e.g., monitor bank and credit card accounts)

The timeframe in which to notify breach victims and authorities is often regulated by country, region, or industry-specific agencies. For example, the European Union General Data Protection Regulation (GDPR) mandates that customers be notified within 72 hours of first becoming aware of a breach. These agencies might also dictate what needs to be included in those notifications.

 

Follow Through on Promises

To rebuild people’s trust in your company, you will need to follow through on the promises you made to them. Besides fixing the problems that led to the breach, you will need to act on any additional measures recommended by the people who investigated it. You also need to deliver on any assistance you promised to the breach victims.

 

It Will Take Time

Even when you act responsibly after a data breach, gaining back your customers’ and the public’s confidence will take some time. One study found that it can take anywhere from 10 months to more than 2 years to restore a company’s reputation following a breach of customer data. As a result, it is best to take all the measures you can to try to prevent a breach. We can assess your IT environment and make recommendations on how to protect it from hackers who want to steal your data.

 

4 Signs It Might Be Time for a Tech Update
4 Signs It Might Be Time for a Tech Update

Using older tech devices saves money, but there is a point at which it can hurt business operations. Here are four signs that it might be time to update or replace some tech devices.

Small and midsized businesses usually have limited tech budgets, so it’s common for them to continue using their devices as long as possible. However, there is a point at which outdated tech devices become a burden and hurt business operations.

Here are four signs that it might be time to update or replace some tech devices in your business:

1. Employee Productivity Is Suffering

If your staff members have a lot of idle time because they are waiting for devices to perform tasks, it might be time to update or replace those items. For example, if employees have to constantly wait for data to download from shares on your wireless network, you might need a new Wi-Fi router. Older routers that support only the 802.11g, 802.11b, or 802.11a wireless specification have slower signal speeds compared their modern counterparts.

Similarly, if employees have to wait for resource-intensive apps to perform tasks, they might need computers with larger and faster hard disk drives or even solid state drives. Older computers typically have less RAM and processing power, so they might not be able to efficiently handle resource-intensive apps.

Employees might not even have the devices they need to do their jobs. For instance, employees who often travel for business might not have the mobile devices they need to work or stay in contact with the office when they are on the road.

2. Incompatibilities Are Encountered

It might be time for change when you cannot use new items with your existing tech devices because of incompatibilities. For example, you might not be able install the latest operating system on employees’ computers because those computers do not meet the minimum hardware specifications. Even worse, you might not be able to install a new business app on their computers because the operating system is outdated, but you cannot upgrade the operating system since the hardware is old.

Incompatible plugs and ports can also signal that it is time for new devices. For instance, you might have a new peripheral device that requires a USB-C plug, which your computer does not have. Or, you might not be able to connect a new computer to an existing monitor because the monitor has a VGA plug while the computer has an HDMI port. Although adapters can solve some incompatibility issues, they often result in slower speeds and lower resolutions.

3. A Device Is Constantly Experiencing Problems

If an older device is constantly experiencing problems, it might be time to replace it. For example, files might mysteriously go missing on a computer and apps might constantly freeze or crash for no apparent reason. These are signs that a computer’s hard drive might be failing.

4. Sales Are Suffering

If sales are suffering because of intermittent technology issues on older devices, it might be time to update or replace them. For instance, customers might be turning to competitors because your old website server slows to a crawl during peak usage times. Deciding whether to replace or update an older device that still works — but not very efficiently or effectively — can be a tough decision. However, it is usually worth it in the long run.

Is Outdated Technology Hurting Your Business?

Sometimes, it is obvious when problems occur because of outdated technology. Other times, it is not that cut and dry. We can assess the situation to determine whether the problems are due to old tech devices or some other issue.

 

How the Repeal of the Net Neutrality Rules Might Affect Your Business
How the Repeal of the Net Neutrality Rules Might Affect Your Business

 

The U.S. Federal Communications Commission’s repeal of the net neutrality rules has made many people apprehensive about how it will change Internet access and content. Here are two schools of thought on how it might affect businesses.

On December 14, 2017, the U.S. Federal Communications Commission (FCC) repealed the net neutrality rules it had put in place in 2015. The repeal has made many businesses, consumers, and even politicians apprehensive about how it will change Internet access and content.

To understand the possible effects that the repeal will have, you first need to know what net neutrality is referring to. Net neutrality is the idea that Internet service providers (ISPs) must treat all data equally. This means that ISPs cannot:

    • Block websites’ content, applications, and services (provided the sites do not break any laws).
    • Intentionally slow down (i.e., throttle) websites’ content, applications, and services.
    • Charge fees for favored treatment. In other words, they cannot create “fast lanes” of Internet traffic to and from websites for web content producers willing to pay extra for it. ISPs have to offer producers the same service for the same price.

It is too early to tell how the repeal of the net neutrality rules will affect Internet access and content. Here is a look at what both proponents and opponents think will happen.

Proponents’ Viewpoint

People who support the repeal believe that it will:

    • Spur innovation. New services (e.g., gaming) will pop up because web content producers can be guaranteed access to a fast lane of Internet traffic.
    • Allow ISPs to set fairer pricing. From the ISP perspective, all web content is not created equal. For example, live streaming a program requires much more of an ISP’s resources than loading a web page. Allowing ISPs to charge web content producers based on how much bandwidth they consume or how fast their content must be delivered will be a fairer system than having all the web content producers pay same price.
    • Lead to improved services. ISPs will be able to use the extra revenue generated to improve their networks. As a result, customers (both businesses and consumers) will have faster and better access to web content and services.
    • Reduce red tape and costs. Getting the government out of the Internet regulatory business will reduce red tape and regulation-related costs. This will enable ISPs to spend more time and money on improving their networks.
    • Promote the free market. With no regulations to get in the way, the free market will prevail, benefiting both customers and ISPs.

 

Opponents’ Viewpoint

People who oppose the repeal believe that it will:

    • Stunt innovation. Many innovators and startup companies will not be able to afford a fast lane for their web content. Having slow connections and their content buried in search engine results could lead to their downfall.
    • Increase the cost of doing business. To be on equal footing with competitors already in the fast lane, companies will have to pay for a fast lane. Businesses that do not have the money for this preferential treatment run the risk of losing existing customers and not attracting new ones.
    • Cost customers more money. Companies that pay the ISP fees to get in the fast lane will ultimately pass those costs onto the businesses and consumers that use their products and services.
    • Make ISP investors and executives richer. Most of the money generated from fast lanes will go straight into the pockets of ISP investors and executives rather than being used to improve networks.
    • Control what people see online. With no regulations prohibiting ISPs from giving preferential treatment to some websites while limiting the content of others, ISPs will have the ability to control what people see online, especially given that some telecommunications conglomerates own both ISPs and web content producers. For example, Comcast owns both Comcast Cable Communications (an ISP and cable TV provider) and NBCUniversal Media (a web content producer that operates many cable networks such as the USA Network and MSNBC). In these cases, ISPs will have incentive to limit or throttle competitors’ web content and give their own content preferential treatment.

 

Only Time Will Tell — But Maybe Not

It will take some time before we really know how the repeal is affecting Internet access and content — but there’s a chance we may never find out. Opponents are already taking action to try to reverse the decision. For example, the attorneys general of more than 20 states, several consumer groups, and even Mozilla have filed lawsuits to block the FCC’s repeal. Plus, some states are taking action at the local level. For instance, the governor of Montana has signed an order that says telecommunications companies cannot receive state contracts if they interfere with Internet traffic or favor higher-paying websites or apps.

There is one thing for certain, though. You will be hearing a lot more about net neutrality in the months to come.

 

Hackers Are Trying to Trick Android Users into Downloading Powerful Spyware
Hackers Are Trying to Trick Android Users into Downloading Powerful Spyware

 

To get Android users to download the Skygofree spyware, cybercriminals have been spoofing wireless service providers’ websites. Discover what you can do to prevent your business’s Android devices from becoming infected.

 

Hackers have been setting up fake web pages that mimic wireless service providers’ sites in an effort to get Android smartphone and tablet users to download spyware called Skygofree. The web pages tell users they are downloading a network configuration update that will prevent malfunctions to their Internet connections so they can keep navigating the web at maximum speed.

 

Skygofree has been around since 2014, but hackers have now developed it into one of the most powerful spyware tools ever seen for the Android platform, according to researchers. Hackers can use it to remotely carry out 48 different commands.

 

What Hackers Can Do on Infected Devices

 

Like most spyware, Skygofree allows hackers to capture calls, upload calendar events, steal contacts, and collect other types of data about the devices and their users. However, Skygofree has additional advanced capabilities that make it quite dangerous.

 

For example, hackers can use Skygofree to steal the files of any app installed on an infected device. Researchers believe that mobile device management (MDM) software is of particular interest to the cybercriminals because the name of the process that captures app files is AndroidMDMSupport. MDM software is used by businesses to secure and control mobile devices.

 

Cybercriminals can also use the spyware to track an infected device’s location and start recording audio clips when it is in a specific place. For example, hackers might have the device start recording audio clips whenever the device’s owner takes it to work.

 

Hackers can even connect an infected device to their Wi-Fi networks, regardless of whether the owner disabled Wi-Fi connections on the smartphone or tablet. Once connected, cybercriminals can collect information, such as what websites the owner is visiting and the login credentials being used to access those sites.

 

To make sure that Skygofree can run uninterrupted, cybercriminals designed it to work around an Android feature that could interfere with the spyware’s operations. Starting with version 8.0, Android automatically disables background processes that are running but idle. To prevent Android from disabling its background processes, Skygofree periodically sends system notifications.

 

How to Protect Your Business’s Android Devices

 

Although Skygofree is advanced spyware, some basic preventative measures can protect your business’s Android devices:

 

    • Let employees know that legitimate wireless service providers won’t ask users to manually download and install configuration updates. The updates are automatically sent to users’ devices.

 

    • Make sure that the security software installed on your mobile devices is up-to-date.

 

    • Make sure the devices’ firewalls are configured to block known malicious websites.

 

We can make sure that all your mobile devices are properly configured and have the latest security software updates.