Networking and Security

Networking and Security

Do you feel confident that your networking and security are configured and working correctly? If you have a simple network, then it probably is. But if you have a small company or are a high tech family, you probably have too many holes in your network that a cyber criminal can drive a truck through.

We are experienced in networking and security design making sure it is as secure as possible. We work on simple and advanced networking gear and can easily design a proper solution for you.

If you are moving to a smart home, having a high performance and very secure network is critical and the foundation to any smart gadgets you want to deploy. We can link all of your technology onto a home network, allowing you to access the various parts of your home system. From lights to your television, we can help you to create a secure network that will allow you to enjoy the technological options available.

No matter if you have a small business or a smart family, we can help you have the most secure, most reliable network around. Some of the services we provide are:

Network Design, Installation, and Management

Need a network designed in your office or large home? Looking to improve your WiFi performance or extend your WiFi range? We know how and can design and implement the perfect solution for you.

Do you have multiple locations or houses and want to connect them together? Do you have remote workers that need access to local resources? Creating a site to site VPN or even client to site VPN is a great solution we can install for you.

Firewall Installation and Management

The firewall is the front door to your digital life. If its a business firewall, it needs to provide features well beyond the residential grade FW provided by your ISP.

Professional firewalls require a good amount of knowledge and experience to make sure its setup right and is properly protecting you. For residential firewalls, its a lot easier and you can use the one from your ISP and stick with a standard configuration. Don’t take chances, give us a call and make sure its done right.

Anti-Virus Management

Not all anti-virus software are equal. There are free packages, ones built into windows, and corporate versions with central monitoring and management. The features between each are critical in managing your ability to protect yourself.

At Totland Computer Services, we offer you the ability to remotely monitor and manage the computers in your office or even home and make sure the anti virus protection is current and up to date. We also make sure that the computers on your network are patched.

Don’t rely on your employees and computer users to both do their jobs and keep their technology safe. Hire a professional to monitor and react to cyber security issues and let your employees focus on your customers.

Password Management

If the firewall is the front door to your cyber life, then the passwords you use are the keys. We strongly recommend all our customers switch to a password manager and make sure every site uses a unique and very complicated password.

Using a corporate password manager allows you to make sure everyone is setting the bar high and making it very hard for cyber criminals to break in to your environment.

We also strongly recommend 2 factor security and can enable it on a lot of our tools and devices. Does this all seem too complicates or hard to deploy, we can help and make sure its a success.

Data Backups

With ransomware on the rise, data backups has never been more important. Not only does it protect you from hardware failures, but when you get hacked, it will save you thousands of dollars in ransom trying to get your data back.

We provide both local, remote, and offline backup solutions for your data so you can feel safe your data is protected. We also provide services that will monitor and make sure your backups are running and can be relied upon when needed.

VOIP Phones

Looking to save money and move your business or home to VOIP phones. We love the Ubiquiti UniFi Phone systems. These are beautiful phones that have all the features you would expect and even offer video phone features.

If you are on a budget, you can easily switch to a google phone number with a simple Obi SIP device. Seems complicated, give us a call and we can take care of it.

Wondering if you need a network or security overhaul? Here are some best practices to follow:

8 Networking and Cyber Security Best Practices for Home and Business

Most people and small business owners think that cyber criminals are not interested in breaking in to your computers and networks because there is little value there.

In reality, the U.S. Congressional Small Business Committee found that over 70 percent of cyber-attacks happened at businesses with less than 100 employees

Even more shocking is that the 2016 State of SMB CyberSecurity Report by Ponemon and @Keeper found that 50 percent of small and medium businesses have had a security breach in the past year.

How confident are you about your protections in place today?

How can your business avoid being a victim of a cyber-attack? Here are 8 cyber security best practices for business you can begin to implement today.

<strong>Use a firewall</strong>

One of the first lines of defense in a cyber-attack is a firewall. The Federal Communications Commission (FCC) recommends that all SMBs set up a firewall to provide a barrier between your data and cybercriminals. In addition to the standard external firewall, many companies are starting to install internal firewalls to provide additional protection. It’s also important that employees working from home install a firewall on their home network as well. Consider providing firewall software and support for home networks to ensure compliance.

<strong>Document your cyber-security policies</strong>

While small businesses often operate by word of mouth and intuitional knowledge, cyber security is one area where it is essential to document your protocols. The Small Business Administration (SBA)’s Cybersecurity portal provides online training, checklists, and information specific to protect online businesses. The FCC’s Cyberplanner 2.0 provides a starting point for your security document. Consider also participating in the C3 Voluntary Program for Small Businesses, which contains a detailed toolkit for determining and documenting cyber security best practices and cyber security policies.

<strong>Plan for mobile devices</strong>

With 59 percent of businesses currently allowing BYOD, according to the Tech Pro Research 2016 BYOD, Wearables and IoT: Strategies Security and Satisfaction, it is essential that companies have a documented BYOD policy that focuses on security precautions. With the increasing popularity of wearables, such as smart watches and fitness trackers with wireless capability, it is essential to include these devices in a policy. Norton by Symantec also recommends that small businesses require employees to set up automatic security updates and require that the company’s password policy apply to all mobile devices accessing the network.

<strong>Educate all employees</strong>

Employees often wear many hats at SMBs, making it essential that all employees accessing the network be trained on your company’s network cyber security best practices and security policies.

Since the policies are evolving as cyber criminals become savvier, it’s essential to have regular updates on new protocols. To hold employees accountable, have each employee sign a document stating that they have been informed of the policies and understand that actions may be taken if they do not follow security policies.

<strong>Enforce safe password practices</strong>

Yes, employees find changing passwords to be a pain. However, the Verizon 2016 Data Breach Investigations Report found that 63 percent of data breaches happened due to lost, stolen or weak passwords. According to the Keeper Security and Ponemon Institute Report, 65 percent of SMBs with password policies do not enforce it.  In today’s BYOD world, it’s essential that all employee devices accessing the company network be password protected.

In the Business Daily article “Cybersecurity: A Small Business Guide,” Bill Carey, vice president of marketing and business development at Siber Systems, recommended that employees be required to use passwords with upper- and lowercase letters, numbers and symbols. He says that SMBs should require all passwords to be changed every 60 to 90 days.

<strong>Regularly back up all data</strong>

While it’s important to prevent as many attacks as possible, it is still possible to be breached regardless of your precautions. The SBA recommends backing up word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files.  Be sure to also back up all data stored on the cloud. Make sure that backups are stored in a separate location in case of fire or flood. To ensure that you will have the latest backup if you ever need it, check your backup regularly to ensure that it is functioning correctly.

<strong>Install anti-malware software</strong>

It’s easy to assume that your employees know to never open phishing emails. However, the Verizon 2016 Data Breach Investigations Report found that 30 percent of employees opened phishing emails, a 7 percent increase from 2015. Since phishing attacks involve installing malware on the employee’s computer when the link is clicked, it’s essential to have anti-malware software installed on all devices and the network. Since phishing attacks often target specific SMB employee roles, use the position-specific tactics outlined in the article “5 Types of Employees Often Targeted by Phishing Attacks” as part of your training.

<strong>Use multi-factor identification</strong>

Regardless of your preparation, an employee will likely make a security mistake that can compromise your data. In the PC Week article “10 Cyber Security Steps Your Small Business Should Take Right Now,” Matt Littleton, East Regional Director of Cyber security and Azure Infrastructure Services at Microsoft, says using the multi-factor identification settings on most major network and email products is simple to do and provides an extra layer of protection. He recommends using employees’ cell numbers as a second form, since it is unlikely a thief will have both the PIN and the password.

Security is a moving target. The cyber criminals get more advanced every day. In order to protect your data as much as possible, it’s essential that each and every employee make cyber security a top priority. And most importantly, that you stay on top of the latest trends for attacks and newest prevention technology. Your business depends on it.

Networking and Security