How Safe is Your Data When Your Staff Works from Home?

The Coronavirus crisis has changed the world as we know it. With social distancing, lockdowns, and work from home becoming the new normal, cybercriminals are exploiting the situation to their gains. This blog discusses how the cybercrime landscape is likely to shape up in the current and post-pandemic world, and how businesses can safeguard themselves against it with better cybersecurity when staff works from home.
Continue reading How Safe is Your Data When Your Staff Works from Home?

4 Things to Consider Before Starting a WFH Initiative

While setting up a Work from Home (WFH) Initiative is a vital part of making your office more resilient – or, in some cases, sustainable such as COVID-19 or during natural disasters. However, there can be significant security, IT, and compliance issues that can arise if you’re just sending employees home to work on their laptops. In this blog, we address four interrelated issues that need careful consideration.

1. Having the Right Equipment for Employees

It should be outlined what equipment and utilities employers and employees are responsible for providing and maintaining. Will internet bandwidth be a reimbursable expense? Will laptops, phones, etc. be provided by the business, or will this be a “Bring Your Own Device” – BYOD – project where employees will use their personal devices?

2. Maintenance and Upgrades on Hardware

If technology is provided by the employer, what is the employee’s responsibility to keep it maintained, upgrades installed, etc.? Even if you have a BYOD policy, are employees required to bring their devices in for upgrades and security checks?

3. WFH and the Fair Labor Standards Act

Just because an employee works from home, it doesn’t mean overtime laws go out the window. The Fair Labor Standards Act (FLSA) creates a framework for paying wages above the law’s definition of a 40-hour workweek that includes overtime pay for work performed beyond that threshold.  Under FLSA, two basic classes of workers are defined: those employees who must be paid overtime when working over forty hours (non-exempt employees), and those who are not required to be compensated for work done beyond the 40-hour limit (exempt employees)

Diving Deeper into FLSA and Remote Work

The problem FLSA presents is that non-exempt employees must be paid for all work, including any work activity outside regular working hours.  An example of the liability that is created for an employer are employees who respond to texts and emails from home outside “office hours.” This is compensable work and needs to be counted under the 40-hour threshold. Policies that protect you from any violation of FLSA should be articulated clearly in writing. Because they are not physically in the building, it becomes trickier to observe and limit their work activity.

4. Silos and Compliance

When developing a WFH initiative, the above issue of FLSA points out that effective WFH  planning and implementation requires collaboration, and not just between individual managers and employees. Is it an IT issue-who is supporting all of this off-site technology and maintaining data security? Is it a human resource issue-will performance measurements that need to be tweaked? What about FLSA and similar laws? Is it a legal issue-how is data governed by federal and state laws such as HIPAA and FERPA being handled? Is Wi-Fi permitted? And remember, if you’re operating in Massachusetts, you have to deal with the strict MA Data Privacy laws.

It is extremely important that companies look into the legal and cybersecurity angle before opting for the work from home setup. WFH can prove beneficial to both the employer and the employee if planned well and implemented properly, but just like the work itself, your policies and IT need to adapt.

Triton Technologies has spent years getting clients and their employees onto the cloud, from hosting to VoIP alongside every conceivable WFH initiative and setup. If you’re looking for a remote worker setup that keeps you and your employees safe and productive, contact us today for an IT consultation.

Hotels are Now The Hottest Ransomware Target

We have been working with the hospitality industry for quite some time. We’ve taken what we’ve learned and applied it to an industry we feel has been under-secured. Rightfully so. Now ransomware is targeting hospitality clients, from small privately-owned hotels and resorts to the biggest chains and names in the industry. Front desks, reservation systems, and even Wi-Fi is now under active attack for their valuable credit card information – and potentially even more valuable payoffs if the locked-down client pays.

Ransomware Prays on Unsecured Hospitality Networks

Nothing makes a more attractive target than a network that is filled with active and useful credit card information for current and past clients. Those credit cards can be compromised within a second’s notice, and then payment derived worldwide.

Also Beware Virtual Skimmers and Data Breaches

Some ransomware targets are no longer waking up the network, but instead are actively skimming the credit cards as they interact with the usually front desk machines.

What You Can Do to Increase Hotel Cybersecurity

We’ve been providing managed IT for the hospitality industry for many years, from wireless network installations to full cybersecurity. Here are some of the most common issues we encounter and what we suggest for solutions.

To our current hospitality clients: please contact us for further information and about upgrading your existing workstations and managed plans with us. To new hotels, resorts, and others in the hospitality industry looking for the best IT solutions to this problem: Triton Technologies can help. Reach out to us for a consultation.

Ransomware Insurance is Fueling Ransomware

Why cyber insurance is keeping the ransomware industry in business.

As all good managed IT companies and manage security providers do, we are in constant training. From daily check-ins, weekly trainings and monthly seminars, we are kept apprised of the latest trends, threats and how to mitigate them. For us, it has worked incredibly well for many years. But a new threat has arisen that we didn’t expect: ransomware insurance from insurance industry. Continue reading Ransomware Insurance is Fueling Ransomware

It’s War: How MSPs are Being Targeted

It’s been some time since I made a post, but it needs to be made.

There is a war going on.

Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the keys, passwords, access, controls, etc. We are entrusted to protect and defend our client’s networks as their managed service provider (MSP) under contract.

Someone has taken notice. Continue reading It’s War: How MSPs are Being Targeted

Network Firewall Security: Stop Port Forwarding

As a Massachusetts-based company, and as a managed IT provider, we look out for our clients’ best interests all the time. By giving them the best firewall, antivirus, defenses, and technology, we make sure their networks are safely secured and keeping their intellectual property in their control. It’s all part of our managed IT support. However, we can only keep secure what our clients don’t open up intentionally. Hence this blog and its straightforward plea. Continue reading Network Firewall Security: Stop Port Forwarding