DatumBlog

How secure is your system?

 08/21/2015

Recently, Datum Consulting has received several phone calls in regards to compromised, unprotected, systems. The attacks came in many different forms. From simply downloading a nasty, Cryptowall/Cryptolocker virus to receiving calls from what was thought to be a "trusted" source, such as Microsoft or Norton Antivirus.

Remember all devices are susceptible to a variety of threats including Windows based, Android, and Apple/Mac devices. Not just desktops and laptops, but mobile phones and tablets, as well, can be affected. Though it is rare, it can still happen.

Here are just a few reminders to help keep you safe.

  • Companies like Microsoft and Norton will not call you or hire representatives to contact you if there is an issues on your PC. They will not hire a third party to "clean" your PC.
    • Do not call any numbers that "Pop-up" on your screen. These pop-ups tend to be Malicious Software (Malware) and can harm your PC and the numbers usually lead to bogus companies falsely representing trusted sources.
    • Remember they will not do anything for free so if someone is offering a "free" service be suspicious and hang up the phone
  • Viruses more commonly known as Cryptowall/Cryptolocker, will hold your files for ransom, this is called ransomware. This is real. They will make you buy a form of legal currency called a Bitcoin and will demand payment before you can regain access to your data, and there is no guarantee that they will release the information either. Many large corporations have actually paid the ransom to regain access to their files. Most anti-virus products on the market today cannot block this virus, due to it sophistication. Datum Consulting now offers one of the only AV products known to block/prevent ransomware viruses.
  • Do no give out your credit card/bank information or other personal information to anyone representing such companies.
  • Do not allow anyone to gain remote access to your PC/network.
  • If you think your system has been compromised, shutdown and unplug your PC and contact Datum Consulting immediately for further assistance.

Be proactive not reactive... that is the latest saying here at Datum Consulting.

  • Backup. Backup. If you have a proper backup we can easily restore your data, if it becomes compromised, corrupt, locked or infected. Contact us to help find the right back up solution for you.
  • Passwords: Keep your passwords complex and safe.
    • Do not write them down on a piece of paper left on your desk. Do not keep them on a spreadsheet or word document unprotected on your desktop. Do not keep the stored on your cell phone. There are many programs out there, such as Lastpass or Keepass, which will store your passwords and encrypt them so that no one else can access them without you knowing.
    • Get in the habit of using complex passwords. No not use the same password for everything. Easiest way to get hacked is by using password such as your pet’s name, Kids name or date of birth, or using generic password like “password” or “admin”. Use uppercase and lowercase letters, number and symbols. Try to keep the random.
  • Do not use free anti-virus software, just because you have been lucky in the past doesn’t mean you’ll be lucky forever. Paying for AV with a reputable company, ensures that Virus definitions are frequently updated allowing your AV to protect against the latest threats. We offer a few different types of AV that vary according to the level of protection you desire. Contact us for more details.
  • Be wary of suspicious articles and links within social media such as Facebook, Twitter, etc. Viruses tend to be embedded in the articles and are enabled when you download the articles to view.
  • Always verify the sender before opening an email and clicking on any links contained in the email.
  • Be wary of suspicious articles and links within social media such as Facebook, Twitter, etc. If the headline seems outrageous or shocking there’s is usually a reason. Viruses tend to be embedded in the articles and are enabled when you download the articles to view.
  • Use caution while searching for things on the internet. Some links may not be legitimate or may redirect you to pages you don’t want to be on. Use the commonsense rule, if it looks suspicious it probably is.

Datum Consulting specializes in network security and disaster recovery. We offer customizable managed service plans to help in these situations. With our managed service plans, we monitor your computer for suspicious activity, verify that Anti-virus software is enabled and up to date, and using out remote tools we can remove most vulnerabilities remotely. Most importantly, this is all done in the back ground so that you can rest easy knowing we are protecting your system 24X7.  Please contact us for more information about our Datum360 plans and let us help find the right plan for you.

Datum Consulting is always here for you. Contact our office if you have any questions about current or potential risks, or want to know more about the services we offer.

 

Wifi Security

Think your wireless network is safe? Better be sure.


Wifi security has been a hot topic over the last couple of years. And while there have been improvements in both the types of encryption and layers of security that go with it, wifi is by far one of the biggest security risks for your business.

Running a wireless network with poor security is akin to unlocking your door and hanging a sign inviting thieves to go inside and steal everything in sight. With long range wifi antennae's hackers can potentially reach your network from tens of miles away. Not only that, but with a little know-how, that hacker could crack your password within minutes. After the password is broken, it's really hard to say anything beyond that point is secure.


A couple of tips for improving your wireless security:

  • Do not run your wireless router with factory default settings
  • Use WPA/WPA2 or the Enterprise Version of WPA/WPA2
  • Do not enable PSK or Pre Shared Keys
  • Do not broadcast the SSID
  • Use STRONG passwords. 8 or more characters with letters, symbols, and numbers

Think your wireless network is secore? Contact us for an security audit.

Click here to request a quote

Strong Passwords and you

Your business's security is only as good as it's weakest password.

Most PCs and lots of personal data, such as bank records and Web mail access, are guarded only by a username and password. Usernames are fairly easy to guess and often pre-filled in, so you need to make sure your passwords are strong—not easily guessed or cracked by "dictionary" attacks that throw millions of letter combinations at the dialog. Many of the most widespread internet worms have built-in dictionaries of common passwords, and once they are running on your system, they can attack your computer and others on your network.

  • Don't use any part of your username, full name, address, birth date, and so on. This data is readily available to intruders.

  • Don't use English or even foreign words.

  • Make sure your password is at least six to eight characters long. In fact, the longer the password, the better.

  • Use different kinds of characters in your password. At the very least, your password should contain uppercase letters, lowercase letters, and numbers. If you're comfortable with non-alphanumeric symbols (such as #@!&) or extended ASCII characters (which you can access by holding down Alt and typing on the number pad), use them.

  • Change passwords every month to six weeks.

  • Don't write your passwords on a sticky note and post it on your monitor.

  • If you need to keep a repository of passwords, use a utility like RoboForm Pro (www.roboform.com)

  • Don't recycle old passwords or use the same one for several different applications.

  • Use a word you know, but substitute punctuation and numbers for letters. For example, coffee could become C0FF33 and Indiana_Jones could become 1nd1@n@_j0n3s.

  • Use a passphrase—a group of words, as opposed to a single word. If you're a Beach Boys fan, "It's not a big motorcycle, just a groovy little motorbike" might be a good passphrase.

Untangle - Unified Threat Management Firewall

Looking to enhance your network security, reduce spam, and control your network traffic?

Untangle is a multi-functional network appliance that aims to be a comprehensive security and traffic management system. Untangle offers protection from viruses, hackers, e-mail spam, and malicious/undesirable websites.

It also has the ability to keep your network running smoothly and efficiently with load balancing, traffic shaping, WAN Failover for redundant internet connections, time-based network policies, OpenVPN support, and more!

Take control of your network with Untangle.

Click here to request a quote

Security Camera Systems

Low cost, feature rich, internet ready security camera systems.


We are proud to announce a new set of products for managing the physical security of your business. Using state of the art High Definition POE Cameras and the powerful airVision software suite, we are able to install security cameras just about anywhere you need them. Allowing you to keep an eye on your business from anywhere you have internet access through a easy to use graphical interface.


Features include:

  • 3 Different Camera Types - Wall/Ceiling Mount, Dome, and Mini (dome/mini include audio)
  • Detailed Statistical Reporting -  Quickly assess important camera activity and NVR performance with easy-to-read visualized graphs.
  • Multiple Views - You gave the versatility to view and manage your surveillance system with a variety of different views.
  • Versatile Camera Settings - Extensive camera or NVR configuration and analysis can be easily accessed on each device from multiple locations.
  • Event Recordings - airVision provides a variety of options and settings to customize what your cameras record.
  • Advanced Analytics - Customize your own motion detection zones. You can place several zones and set their alarm sensitivities as high or low as the situation demands.

Click here to request a quote

Piwik Web Site Analytics

How do you know if your website is doing it's job?


Datum Consulting is now offering hosted Piwik Analytics.
With Piwik Analytics you can track just about everything that happens with your website. With hits, conversions, search rankings, E-commerce tracking, goal tracking, custom variables, e-mail reports, and more!

Click here to request a quote

New Customer Portal

To ensure the quickest and most accurate possible response from customer support team, we offer a Customer Web Portal that you can submit tickets, track projects, view hours billed, change contact information, and more!

In order to access to our Customer Portal please contact us to activate your account and retrieve your login credentials. You may also find a tutorial for the Customer Portal in the 'Product Tutorials' section of our website located under 'Support'.

Customer Portal: http://www.datum-consulting.com/portal.html

6 Tips on How to Protect Yourself Online

Any time you connect to the Internet you are vulnerable to cyber attacks. Hackers can steal your credit card numbers, tax records and passwords, or even completely disable your PC, smartphone, network, or servers. Follow these tips to help avoid problems:

1. Create strong passwords. Use Upper and Lowercase letters, numbers, and symbols.
2. Use email wisely, don't open attachments or click links you can't trust.
3. Be smart when using instant messaging (IM) programs. 
4. Shop safely, if you haven't purchased from a vendor, look at reviews, check the BBB.
5. Watch out for phishing scams. If it sounds too good to be true, it probably is.
6. Pay attention to your employee's online activities. Social networking, media sites, and other popular sites across the web are littered with malware, ad-ware, and sometimes viruses

Zimbra E-mail - Hosted Business E-mail

A full featured communications service featuring, e-mail, calendars, instant messaging and more! Sync all your contacts and e-mail to all of your devices with ease! Available on Windows, iPhone, iPad, Android, Windows Mobile and other popular platforms.

Don't get stuck using This email address is being protected from spambots. You need JavaScript enabled to view it. to conduct your business. Sign up for Zimbra hosted e-mail today and get your personalized e-mail today!

Click here to request a quote

Cloud Services

We offer a variety of Cloud-hosting solutions.

Our experience in hosting a variety of services and technologies on the Cloud offers you a wide array of flexibility for your business, such as:

  • Zimbra E-mail and Collaboration Services
  • Off-site backup and synchronization services
  • Web hosting
  • Off-site Virtualization of hardware
  • Hosted Application services
  • Monitoring and Alerting services

Click here to request a quote

Business Continuity

When disaster strikes, we are there to back you up.

Our comprehensive approach to IT services provides your business with top tier service to ensure your systems stay up and running even when disaster strikes.

Through the use of off-site backups, physical-to-virtual incremental off-site backups, and virtual standby technologies, your servers have an iron-clad solution that can reduce your recovery time to as little as five minutes!

Click here to request a quote

Proactive IT Services

We believe in being proactive instead of reactive.

Through the use of the following services and years of experience, we are able to keep watch on your entire network around the clock and stay ahead of would-be disasters.

  • 24/7 Active Monitoring and Alerting
  • Patch Management
  • Managed Antivirus
  • Regular network health auditing routines
  • Customized management of third party software

Click here to request a quote

Datum 360 Managed Services

We custom tailor solutions for you.

Datum 360 is our comprehensive IT services package that is custom-tailored for every aspect of your business. From e-mail and mobile communications to disaster recovery, we offer on-site and off-site backup solutions, managed antivirus, patch management, hosted services, public and private cloud services, and much more.

Datum 360 is a complete IT solution designed to fit your business.

Click here to request a quote

Areas covered Milwaukee, Brookfield, Delafield, Muskego,  New Berlin, Oconomowoc, Pewaukee, Waukesha, Cudahy, Franklin, Glendale, Greenfield, Oak Creek, St. Francis, South Milwaukee, Wauwatosa, West Allis, Milwaukee, Racine, Burlington, Fitchburg, Madison, Middleton, Monona, Stoughton, Sun Prairie, Verona, Edgerton, Beaver Dam, Fox Lake, Horicon, Juneau, Mayville, Waupun, Watertown, Hartford,

Web Statistics