On Dealing With Ransomware
A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations.
For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed.
In the days and weeks since this attack, we have learned much. From the tools they use, to methodology and the exploits.
We Suffered No Incidents
At Triton Technologies, we were not affected at all. Not a single one of our clients’ computers, not a single compromise network, not even a rogue email. Not that we didn’t see a single remnant of it, but our technology, up dates and our near-religious security methodologies protected every single one of our clients.
That’s right, not a single person had a problem: business as usual. Just like with CryptoLocker.
Why We Weren’t Affected
The reason why? The exploits that were utilized by the WannaCry hackers dealt with old and unpatched systems. Every single one of our managed clients and their systems is patched daily and weekly. Every exploit mitigated, and every possible vector to enter into a network patched up.
We understand that has affected many businesses and many small business owners are freaking out. Not us. With the right managed plan and the right technology to head off potential disasters, issues like this will never affect the business. The proof is in the pudding, and not a single one of our clients is worried.
Managed IT services saves you money and protects your data. Contact Triton Technologies today and quit worrying about ransomware.
As the owner of Triton Technologies, I go through constant training when it comes to MSP services, products and support methodologies.
I was at a conference in Hartford Connecticut and listening to other business owners and I heard something that isn’t heard in our office:
“Cryptolocker is kicking our butts.”
We Take Security Seriously
I can barely remember the last time I had to deal with any type of crypto virus. It was early last year (1.5+ years) and it was a personal laptop someone brought into one of our clients to use when there was some downtime. The virus was actually running in the background and they had put it on standby and took it to work. When they opened it up, it continued but the network had all the necessary defenses to prevent it from being more than a blind annoyance.
Our network firewall, the antivirus on all machines, the SSL and third party confirmed certificate communication was all working to prevent it from getting in and it worked perfectly.
The Best IT Solutions are Proactive
The call when it came was a shock but after reviewing the logs, the firewall defenses and the internetwork logs, it was mitigated and shutdown before it did anything actually.
We implement the firewalls, the solutions, the antivirus, the backup, the monitoring and the third party patching because… IT WORKS. It just works, and it keeps the hackers, viruses and more at bay.
Some clients we work with thing we’re over-the-top when it comes to planning and security, but not one has been sad when they realized by taking our advice, they got the tech they needed for dealing with CryptoLocker and avoided having their own data being held hostage against them. If you’re looking for just that kind of solution, contact us.
No testimonials please.
If you have been around this website for any period of time, you’ll notice no testimonials. Why?
Testimonials are a source of pride for many but it is also a source of hacking and targets for their clients. You might be surprised to find out how much information a hacker can learn about a company through their testimonials.
Hackers Can Use Testimonials to Find Weaknesses
Every business does their own thing and does it slightly differently than the other people in the same field, IT services is no different. By analyzing what that person does and how that company does it a person could get into that client’s network and utilize their weaknesses get into their infrastructure.
So we don’t post any testimonials to our web page nor to our Facebook page. It is considered a medium risk when it comes to data security and compliance.
Once a hacker knows how the infrastructure is established and how the systems are setup that information could be used to penetrate and destroy that network.
Security Over Celebrity
In one of our previous blog posts, we posted about how a data breach at the source of an RMM service called Continuum caused havoc throughout the MSP world by giving them unfettered access to all the resources to all their MSPs.
That was bad and still continues to be bad for those affected clients.
You’ll never see a solicited post for a testimonial on our public pages. Think of us as the strong, silent type. Want to learn more? Contact us.