Network Firewall Security: Stop Port Forwarding

As a Massachusetts-based company, and as a managed IT provider, we look out for our clients’ best interests all the time. By giving them the best firewall, antivirus, defenses, and technology, we make sure their networks are safely secured and keeping their intellectual property in their control. It’s all part of our managed IT support. However, we can only keep secure what our clients don’t open up intentionally. Hence this blog and its straightforward plea. Continue reading Network Firewall Security: Stop Port Forwarding

Network Security: First, Middle and Last

We had the fun privilege this week of doing a security check for a restaurant.

We have agreements with banks, credit card processors and more to analyze a network for security issues or make changes to a client’s network because of a new point of sale system to be installed or modifications to existing ones.

The Restaurant’s Network

It was a simple restaurant, 5 workstations, a router and on-screen credit card swiping.

The meeting was to discuss security, and how to implement it in a manner that doesn’t impact the business. I arrived early with the credit processor and sat down.

Gaining Entry to the Network

Within a minute I had on a Samsung Tablet, logged into his wireless, logged into his router, cataloged his entire network, logged into the music system and started playing “The Pinacolada Song” through the overhead speakers.

With the next two minutes, I logged into the into the point of sale computer, copied the outstanding credit card batches report, locked all the workstations, and had the HP printer print out the lyrics to “I’m a little teapot.”

By the time the manager sat down, the network was in our total control with the ambiance now the melodic sounds of Rupert Holmes which were heard throughout the restaurant.

Complete Takeover: Under 5 Minutes

Total time, 4 minutes. Complete network take over without any advanced tools.

As I explained this in front of his credit processor, I could see the blood leave the face of the manager. And to show I truly did have control, I changed the music to “The girl from Ipanema.”

You could hear their collective jaws drop as they hit the table.

What You Need for Network Security

Over the next hour, we talked about securing the network using Sophos Firewalls, Ubiquiti Wireless Access, and a Cisco switch to VLAN everything together. Proposal accepted in FULL.  

Security is no joke, and it should be the first thing you consider when designing a network. It’s not a burden when it protects what you have, your clients data and can keep your business working especially when the banks can giveth and taketh away your credit card processing ability. Contact us today if you’re interested in knowing how secure your business network is.

Dealing with CryptoLocker: Why We Do What We Do

As the owner of Triton Technologies, I go through constant training when it comes to MSP services, products and support methodologies.

I was at a conference in Hartford Connecticut and listening to other business owners and I heard something that isn’t heard in our office:

“Cryptolocker is kicking our butts.”

We Take Security Seriously

I can barely remember the last time I had to deal with any type of crypto virus. It was early last year (1.5+ years) and it was a personal laptop someone brought into one of our clients to use when there was some downtime. The virus was actually running in the background and they had put it on standby and took it to work. When they opened it up, it continued but the network had all the necessary defenses to prevent it from being more than a blind annoyance.

Our network firewall, the antivirus on all machines, the SSL and third party confirmed certificate communication was all working to prevent it from getting in and it worked perfectly.

The Best IT Solutions are Proactive

The call when it came was a shock but after reviewing the logs, the firewall defenses and the internetwork logs, it was mitigated and shutdown before it did anything actually.

We implement the firewalls, the solutions, the antivirus, the backup, the monitoring and the third party patching because… IT WORKS. It just works, and it keeps the hackers, viruses and more at bay.

Some clients we work with thing we’re over-the-top when it comes to planning and security, but not one has been sad when they realized by taking our advice, they got the tech they needed for dealing with CryptoLocker and avoided having their own data being held hostage against them. If you’re looking for just that kind of solution, contact us.