Thinking of hiring a Managed Service Provider (MSP), but not sure how to go about it? Here are a few things to do before you zero in on one. Continue reading Do Your Homework: 3 Things To Do When Looking for an MSP
Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common, attacking governments and all manner of business as well as non-for profit institutions. If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you.
What to Do After a Ransomware Attack
Why is ransomware so nasty? Because it steals the most important thing your business possesses. Data. Worse, once infected, there isn’t generally a way out. No one can “disinfect” your machine. You aren’t going to be able to call in IT support to solve the problem. Basically, you have three options.
Do What the Hackers Ask
Pay the ransom. This payment is usually via credit card or bitcoin (a digital currency). Some ransomware viruses even provide helplines if you’re having trouble. Of course, there are no guarantees you will get access to your data – these are thieves you’re dealing with. Plus, you’re going to only ensure more ransomware attacks will happen.
Refuse to Pay to Get Your Data Back
Don’t pay and lose your data – This has its obvious downsides, unless…
Being Prepared with a Backup
You have a safe, clean backup. In that case, you are stuck with the nuisance of restoring your data with the backup, but you aren’t out any money. However, this comes with a caveat: your backups have to be clean. The problem with ransomware viruses is that just making backups may not be sufficient to protect your data, as the backups can be infected also.
Ransomware Requires Prevention and Backups
As you can see, the first two options aren’t very favorable solutions. The only real defense against an attack is the third option. You have to be prepared ahead of time with a safe, segregated backup. Be sure to get the advice of a specialist on how to protect your data from this very serious threat to your business. In addition, you can bolster your cybersecurity through:
- Managed IT: Our clients with our managed IT have never suffered a ransomware breach. Better cybersecurity with network protection like firewalls keeps them safe.
- Avoid Phishing: Many ransomware attacks start with phishing. Make it harder for your company to be targeted by avoiding publishing individuals’ contact information and with better email procedures.
- Stay Updated: Many hackers work through security vulnerabilities that are patched, but that doesn’t help you unless you update your systems. Always run updates or get them managed.
It’s been some time since I made a post, but it needs to be made.
There is a war going on.
Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the keys, passwords, access, controls, etc. We are entrusted to protect and defend our client’s networks as their managed service provider (MSP) under contract.
Someone has taken notice. Continue reading It’s War: How MSPs are Being Targeted
One of the most intense discussions we get into with clients is their background check for IT staff.
With events such as a managed IT company holding hostage a client’s data, a rogue IT person hacking into one of their client’s networks to steal customer data, and many cases over the decades of IT people being allowed to access sensitive information, you need to ask your IT person and/or company for background checks.
You Must Be Able to Trust Your IT Support
As the owner of a managed IT company, we work with many diverse clientele. From banks, government, schools, hospitals and more. We cannot just allow any IT person to join our ranks without having an extreme background check. We cannot hire a person in good faith when they literally have the keys to the kingdom’s when they were convicted of a crime in an industry they are now servicing.
Below is an exerpt from our previous blog on the subject, The Importance of a Clean Background in IT.
A Real Life Example
Why are we discussing this? As we grow, we submit proposals for clients. In some proposals we win and some proposals we lose, that’s the nature of the game. We had submitted a bid to a client and lost. It happens. About two weeks later we received an email from the company asking us to come in. We did.
What was explained to us was the company we lost against had failed its background checks for its technicians. Due to the nature of the client, the risk was too great and the contract could not continue. So we picked up where they had started and the businesses continues to be a client to this day. Due to the sensitive nature of the information all of our technicians and personnel had to be background check, which ours did with flying colors.
The next time you are looking to change companies, services, pricing and the backgrounds of your IT people should be considered when making your decision. Read more about this in our first piece on background checks, The Importance of a Clean Background in IT, and how Triton Technologies can provide only the best support. Contact us today.
How the lack of a vendor follow-through hurts business.
For unknown reasons we are encountering a lot of clients reaching out to us due to a failure of vendor follow-through. Basically, they set up a solution such as a cellular router, printer, security system, or of some variant of the above and it would not get finished or completed. Let’s talk about how vendors not following through is an example of how IT project implementation can be.
The Vendor Who Couldn’t
We had the pleasure of dealing with a new client last week who was a logistics company and immediately after examining the network we found many flaws. Many of them can be attributed to the failure of a completion of ongoing IT projects from their current vendors. As the business owner who has multiple employees and whose responsibility is to follow through with projects and outstanding service agreements, nothing irks me more than a person not finishing the job they are paid to do.
Finishing Up the Halfway Projects
So this client sought us out, we examined their network and created the solutions plan to bring them up to speed. Within a few days, we had finished the outstanding projects, got them redundant Internet as they had been promised, and was able to put in a long-range tracking system for their vehicles, which also was halfway finished and not completed when we took them over. Within a few days, it was done.
The Most Complex Part of New Technology is Implementing It
Managed IT is not entirely about just service when it comes to your technology. Many times it is about finishing projects that were stagnant, not completed, or incorrectly implemented. Like I tell our clients, the technology is there to do what you want, implementing it is the most complex portion of any project, and that is where we find a lot of our competitors are failing. They make the initial quick sale and then drop off the face of the earth.
Project management, control, vendor management, and organizing them all together within a single unifying project is no simple task, but when it is done right, it is something to be remembered. If you’re looking for that service and not currently getting it, contact Triton Technologies. We’ll help you manage your current or next IT project.