- All
- Cybersecurity
- Networking
- Data Protection
- Disaster Recovery
- Web Design
- Social Media
- VoIP
Is cybersecurity really an issue?
Yes. People all around the world are actively trying to breach or damage your networks.
What needs protected?
Networks, Data, Emails, Operating Systems, Applications, Servers, Client Computers, Mobile Devices, Wireless Access Points, Routers, Switches, and other Controllers, backups, and the list goes on!
How do I begin securing my systems?
Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.
How can Custom Internet Services help my company with cybersecurity?
Custom Internet Services has the expertise to help your organization progress down the road towards better Cybersecurity. We can help you and your business implement the areas appropriate to your situation. Specifically, we can address the following issues for your business :
Cybersecurity Planning & Implementation
Who wants into my network?
There are generally five types of bad actors.
1) First are people who are simply mischievous.
2) Second are those looking for criminal or financial gain.
3)Third are nation states attempting to gain a strategic advantage.
4) Fourth are the ‘hacktivists’ who do hacking in support of a cause.
5) And fifth are those who simply want to destroy stuff.
As you can imagine, there are plenty of people who want into your network.
Why does anyone want into my network?
We often think of bank or credit account information as valuable, and it is. But a computer with network access is by itself valuable. A bad actor can use your computer as a launch point to attack someone else, pivot from your computer into another network, or ‘rent’ your compromised computer to someone else for criminal use (all without your knowledge).
Can hackers do damage through my network?
Yes. Besides stealing personally identifiable information (PII), hackers can damage physical infrastructure, corrupt data files, and pivot from one device to another across the network. Hackers can also use your network as a launch point for attacks against others. But damage to your network is only the start of potential consequences.
What are the potential consequence of an insecure network?
Besides the loss of public confidence when the breach becomes known and the monetary costs associated with containing the damage, the network owner may also be legally liable if the hacked network is used for illegal activity or as a launch point to attack others. We’re also seeing lawsuits from people who had their information stolen against companies who’s networks have been hacked. This will likely only increase.
What is disaster recovery?
Disaster recovery is the ability to continue work after a catastrophic event. This includes a crippling computer virus, hardware malfunction or even a natural disaster such as a fire or a flood. Disaster Recovery differs from Data Backup–simply having a copy of your data is insufficient to get your business back up and running should something happen.
Why do I need disaster recovery?
The odds of something happening to your data are high. The costs of restoring your system are even higher. According to the National Computer Security Association, without having an adequate backup solution in place it takes:
19 days and $17,000 to recreate just 20 MB of lost sales/marketing data
21 days and $19,000 to recreate just 20 MB of lost accounting data
42 days and $98,000 to recreate just 20 MB of lost engineering data
What do I need to backup?
People are often amazed at the variety of data that needs backed up and protected. While not an exhaustive list, you will likely find that you need to backup these types of data –
Email archives or Exchange data stores
Laptop/Desktop files
Network device configuration files
Tablet/Mobile device documents
Documents stored in cloud services
Databases
SharePoint files.
Virtual Machines
Server/Laptop system images
Photos
What do I look for in a backup provider?
The top things to look at include :
1) Certified Data Centers
2) Encryption
3) Easy To Use
4) Versioning
5) Ease Of Recovery
Why do I need a website?
Your website is to the web what your storefront is to foot-traffic. It is where people can find you, your products and information about your business.
What do I include on my website?
You need your contact information, business details, products (if you sell them). Make your website fit your business and customer needs.
What is the process for building a website?
Our web designers have broken the website design process down into four simple steps:
- Make Plans
- Let Us Create!
- Go Live!
- Keep Things Current
How do I choose a domain name?
Here are four tips for selecting a domain name:
1) Use your business name.
2) Be careful using numbers, symbols, or creative spellings.
3) Keep it simple.
4) If you are still unsure about choosing a domain name, discuss your options with our web designers during your initial meeting.
Why is my online presence important?
Just like finding your storefront, customers need to be able to easily find you online. Search Engines like Bing and Google are able to offer users search results based on their current location. If you do not have an online presence you could be missing out on customers.
How can I check my online presence?
1) Do a search for your business on your website and see what you find.
2) Setup a time with our web design/social media team for us to do this for you.
Why should I worry if my online presence is up-to-date?
If your information for your business is not up-to-date then you run the risk of missing business opportunities. Make sure potential customers know how to contact you and when to contact you, so you don’t miss opportunities.
How often should I post on social media?
Depending on the Social Media Platform the amount of times you should post and when will vary. If you feel that your time is already stretched to far, contact us and ask how we can help you.
Are VoIP phone systems HIPAA-compliant?
Yes. For HIPAA-compliant accounts we limit some functionality to protect private patient data. Doing so helps businesses stay in compliance without any changes on their part.