Blog

When it comes to the company network, cybercriminals are always looking for ways to infiltrate and uncover lucrative data that the can either sell on the Dark Web or use as reconnaissance fodder to plan follow-on attacks. And you don’t have to be a large business for threat actors to set their sights on you — small and medium-sized (SMBs) are just as targeted, if not more so, than their bigger rivals.

What’s also true is that company endpoints – the places where individual employees interface with both the internet and the internal company network – are among the weakest links when it comes to corporate security. So, while there are a lot of reasons to turn to a managed service provider (MSP) for your mission-critical IT and communications needs, endpoint protection should be at or near the top of the list.

Here are the basics that SMBs should know about managed endpoints and security. We’ve also put together a quick, two-minute video overview of what they are and why they need management:

1.What are endpoints, exactly? [0:11]

An endpoint is any device that is connected to your network that employees use to carry out their job functions. These include the web-facing servers that run the applications that power your business, as well as the desktop and mobile computers/devices that your employees use to do their jobs every day.

2.Why do endpoints matter? [0:32]

Think of unprotected endpoints as wide-open doors and windows to your business. If they’re not secured and managed properly, bad actors can easily get in, installing malware, monitoring employee communications or snooping around the files on a computer. They can also pivot, get onto the network, and reach other corporate resources beyond the endpoint itself. The result? Security breaches, frequent system crashes and performance issues, lost productivity, frustrated employees and possibly even competitive harm or legal trouble.

3.It sounds like I really need endpoint protection. Can I handle it myself? [0:54]

While many companies would love to handle things in-house, this is really only feasible if you have the right tools for the job and dedicated IT security staff who have the know-how to cover all the bases. Those bases include making sure every single application and operating system is patched and updated; running daily malware and antivirus scans; purchasing and maintaining the latest endpoint security software for intrusion detection and performance monitoring; ensuring employees are using only sanctioned cloud services; requiring strong passwords; and implementing employee education around things like phishing threats. Unfortunately, it’s often far too complex and expensive for small business owners to put all of these things into place on an in-house basis, especially the technology pieces.

4.Is there anyone who can help me? [1:32]

Yes! Fortunately, managed service providers (MSPs) can act as an extension of your staff, guaranteeing that all of the technical details – like patching and malware scans – are done and that all the tools in use are continuously up-to-date.

TPx, for example, has invested in the best endpoint management technologies, so you don’t have to. We manage troubleshooting and repair, and more, all at one cost-effective price. That way, you can focus on growing your business, with peace of mind that the doors and windows are locked.

If you’re looking for a reliable managed service that will keep your endpoints safe, consider TPx. Visit www.tpx.com/endpoints and contact your TPx representative to learn more.

 

About the Author

Joe Royer is the Product Manager for IT/Cloud services at TPx. He has 25 years of industry experience in sales, consulting, and product management for several leading MSPs.

How to avoid ransomware

Did you know that ransomware attacks worldwide rose 350 percent in 2017? Ransomware continues to be a scourge for businesses and individuals alike, as cybercriminals cast a wide extortion net in hopes of snagging a lucrative payday.

Made (in)famous around the world by the global Wannacry strike in 2017, the premise is simple: Crooks infect machines with malware that locks up all the files on a computer or business network, and then they demand a ransom (usually in the form of Bitcoin) in exchange for releasing the hostage documents.

The good news is that defenses are improving, giving businesses a host of great options for combatting the threat – which means that keeping current with the latest security tools is critical. Ransomware authors are hardly slinking away in the night: Instead, they’re evolving their tactics, using clever, targeted social-engineering techniques to get malware onto targeted machines and changing up their encryption schemes to make it more difficult for companies to unlock impacted files.

If you’re a victim, the conventional wisdom (which we agree with) is to not pay up – there’s no guarantee that the files will be released after the payment is made, plus it only encourages and funds the threat actors. But ransomware cleanup isn’t easy nor cheap – even after decryption (more and more tools are available to clean the compromised files).  Securing the integrity of the network post-attack is a lengthy process.

The best thing to do is avoid becoming a victim in the first place. Managed security from TPx automatically keeps your defenses up-to-date with the latest state-of-the-art technology to combat the latest threats. That provides real peace of mind, but here are some best practices that every business should always adopt to protect themselves.

1. Educate and Inform Users About Ransomware

Training staff to recognize fake emails and to be wary of unsolicited mails is critical in the fight against ransomware. Malware generally arrives in the form of an email attachment or a malicious link. These scam messages will come in many guises.

Sometimes, the email will purport to be sending an important invoice or information on a shipped package. In other cases, the mail will claim to be sending HR information or other business-critical data. As attacks become more targeted, attackers are even doing reconnaissance on the business before sending the emails, tailoring the message to make it seem legitimate. In all cases, the point is to encourage users to open the attachment or click on a link, after which the ransomware is downloaded and then starts spreading through the organization.

If you think you can easily spot fraudulent emails, think again. The success rate in targeting the average human worker can be almost 20% in some cases, depending on the lure. Also, often the sender’s address will appear to be an internal address; or, the sender may even be someone in a user’s address book. The best course of action is to pick up the phone and verify that an unsolicited message is legitimate before clicking on anything.

2. Use a Good Backup Solution

Back up your systems and data both locally and offsite. Today’s leading hybrid local/cloud backup solutions, such as TPx’s MSx Managed Backups service, can significantly improve the performance and reliability of backing up and restoring important data. They offer the ability to back up systems multiple times per day to minimize the impact of a disaster. Advanced security technology available in some systems can also help you identify and recover from ransomware attacks without having to pay a ransom.

3. Keep Systems Patched and Updated

A critical method for preventing ransomware attacks is to make sure to keep operating system and software updates current. Installing a system or security update doesn’t have to be a hassle or an annoyance and take you offline for a few minutes if you leverage an automated patching software.  And, it’s far better than the alternative: being open to a host of security threats, including ransomware.

That’s because attackers often deliver ransomware by exploiting unpatched security holes on a victim’s machine. When a visitor lands on a compromised website or opens a certain kind of file, the malicious code launches in the background to find these holes and infiltrate the system.

It’s also critical to note that Windows XP devices are no longer supported by Microsoft with security updates, so migrating off this platform to a more current form of Windows should be a priority.

4. Use a Good Antivirus/Anti-Malware Solution

Business-grade antivirus programs have the ability to scan files to see if they might contain ransomware or other threats. It’s critical to make use of them before downloading files or programs.

5. Consider Managed Security and Backup

While implementing user awareness training is up to you, you can implement other best practices with managed services.

The TPx managed security suite is designed to keep up with the latest protections. Gateway AV thwarts downloads of viruses, worms or other malicious content by checking all content for malicious code embedded within the payload and by blocking access to infected sites. The gateway security service also includes web content filtering and application control as well as intrusion detection/prevention (IDS/IPS), which uses SSL deep packet inspection to analyze even encrypted traffic which attackers now use in an attempt to circumvent firewalls. Two 24/7/365 Security Operations Centers staffed by A-list experts are always working to anticipate, prevent and respond to any attack.

TPx’s managed backup service, meanwhile, allows companies to back up complete systems locally and to the cloud on a continuous basis. That means you can resolve a ransomware attack by simply rolling back the affected systems to an earlier timestamp, to make it as if it never happened. This point in time rollback makes file restoration a breeze, and we’ll even work with you to get your backups restored.

We also offer help with system updates and patching with a managed endpoint service.  Our automated patching service ensures that key servers and workstations stay up-to-date with recommended security patches available for the Windows OS and supported third-party applications.

These tips are a good place to start, but of course it’s not an exhaustive list of precautions your business should take. Reach out to your TPx representative today to see how we can deliver peace of mind when it comes to ransomware and other threats.

 

About the Author

Jared Martin has been in the Information Technology world for more than 20 years. He co-founded a managed services voice and Internet service provider in 2001 and grew the business to significant revenue. In 2008, that company was sold to Tel West Communications, which in turn was acquired by TPx in 2012. Jared has been a technology leader in driving change and adoption of new technologies, such as Software-Defined Wide Area Networking. He is always looking for new ways to use technologies that are outside of the box and to influence TPx to innovate and to be on the cutting edge. In 2016, Jared took charge of TPx’s new MSx line of business, formed as a result of the merger of TelePacific and DSCI. This brought Jared back to his roots of providing managed services and a consultative sales approach to customers.

Managed Endpoints

When it comes to mission-critical technology in the workplace, much of the conversation revolves around digital transformation through broadband, cloud applications and enabling the mobile workforce. But there’s another footprint beyond this conversation that’s just as critical to businesses of all sizes: endpoints.

Your servers – which run the applications that run your business, and the workstations your employees use to do their jobs – represent a large business investment.  Managing these endpoint systems requires sophisticated tools, expert resources, and focused attention to keep them healthy, secure and performing optimally.  The unfortunate reality for many small and medium-sized businesses (SMBs) is that they are falling short on this important management task. This exposes them to significant business risks such as security breaches, downtime, and lost productivity.

Perhaps the most significant endpoint and workstation concern is security. Threats like ransomware, cryptomining and other viruses are becoming more prevalent and sophisticated all the time. Keeping ahead of the threat landscape starts with basic security hygiene: software patching to prevent bad actors from exploiting vulnerabilities on your systems, and keeping antivirus up-to-date with the latest threat intelligence. However, with the rise in the volume, complexity and frequency of cyberattacks, it also requires more sophisticated defense-in-depth approaches – like advanced behavioral heuristics to identify and protect against never-before-seen attacks, and real-time scanning to prevent phishing attacks (which are the number one cause of security breaches). Technology is sometimes not enough.  Removing threats to your endpoint security often requires more human intelligence. Remember QuickTime from Apple? This used to be the leading video player software and was once installed on millions of PCs. In 2016 Apple stopped releasing security updates for Quicktime. Shortly after, two critical new exploits of QuickTime hit. Companies who had a skilled support team in place were able to recognize this threat and ensure that the QuickTime application was removed from all of their PCs.

Another major concern is how to deliver efficient and effective support to end-users. There are several aspects to delivering great support. First, you must maintain expert resources that have the variety of skillsets needed to address a wide range of issues across all systems and applications. Next, you need to invest in the tools and technologies that allow these resources to perform more efficiently. This includes tools for remote monitoring and management (RMM), secure remote control, system inventory, advanced security protection, and reporting. And finally, effective support requires focused attention and a proactive approach. When you consistently perform system maintenance and identify and address issues quickly, you’ll significantly decrease the number of incidents that affect end-users, reduce the time to repair, and ultimately minimize unnecessary downtime and lost productivity.

If it seems daunting, don’t fret. Although most SMBs struggle with budget constraints that hamper their ability to deliver effective support, they can still stay ahead of the curve by adopting endpoint management solutions from a Managed Services Provider like TPx.

At TPx, we’re dedicated to ensuring that SMBs can keep up with the pace of change in technology. We invest in the latest security and management technologies so that you don’t have to – and then we package them as part of our cost-effective, fixed-price set of managed services.

Our managed endpoint services suite allows SMBs to tap into the power of having always-updated endpoint management technologies and a virtual team of skilled experts manning two 24/7/365 state-of-the-art security operations centers (SOCs) that ensures you get the right resources at the right time. You can rest easy knowing that we are keeping up with security patches and proactively maintaining your servers and workstations.  If a problem does arise, our team can react in real time to quickly resolve it.  With more secure, stable and available endpoint equipment, and less downtime, you stay productive and focused on your core business goals.

Bottom line? Servers and workstations run the applications that run your business. All of that endpoint technology represents a significant business investment. Given the range of threats that arise from a lack of proper management, your company has a vested interest in making sure it’s reliable, secure and performing at its best. Don’t be caught behind the curve. Call your TPx representative today to discover how we can help you with endpoint management.

About the Author

Joe Royer is Product Manager for IT/Cloud services at TPx. He has 25 years of industry experience in sales, consulting, and product management for several leading MSPs.