3 Things to Rely on for Ransomware Protection Before You Resort to Backup

Relying on backup recovery is a good backup option to have, but it’s equally important to invest in security approaches that help you avoid ransomware in the first place. Here are few things you can easily do to help ensure it doesn’t come down to you putting all your eggs in the backup basket:

  1. Use a multi-layered security strategy: No security tool is 100% effective, but using a multi-layered approach that includes firewalls, antivirus, and behavioral-based malware detection can help ensure that even if one layer doesn’t catch a threat another layer will.
  2. Conduct user training, and lots of it: Whether it’s through malvertising, phishing, or social engineering the biggest weak point attackers target is user behavior. Schedule regular training with your users to go over best practices and how they can avoid having their computers compromised by malware.
  3. Patch early, patch often: Security software needs regular updates and patching to keep up with new cyber-attacks. Make sure all your security software is regularly updated.

LammTech hopes you enjoyed this email blog and will Visit our blog page if you missed the other segments of this series.

Want to know more? LammTech is always available to discuss your data back up and data protection needs.  Call us at 660.827.9944 to discuss your needs and if you are protected.

Posted in Robert's Blog | Comments Off on 3 Things to Rely on for Ransomware Protection Before You Resort to Backup

3 Tips to Make Your Backup Ransomware Ready

While all this may look like a lot of bad news, the upside is that there are some quick tweaks you can make to your backup strategy that will make it more effective against ransomware.

  1. Embrace 3-2-1 backup: 3-2-1 backup is a backup strategy that requires you to have three copies of your data in two different locations, one of which is offsite. Making your backup 3-2-1 compliant ensures that even if one copy of your backup is encrypted by ransomware you’ll still have at least one off-site copy that can’t be touched.
  2. Use both image and file backup:  Image backup creates a snapshot of your computer that allows you to restore your computer to a state it was in at a previous point in time.

A single image file is easier to easier to manage and quicker restore than thousands of individual files which will help reduce your RTO. However, a file-based backup will allow you to recover single files more quickly than a whole system image. So, if your user needs a critical document right away you can recover it for them while you restore the rest of the image.

  1. Test, test, test: As a best practice, testing out how long it takes you to restore an individual endpoint from backup is a great way to help understand the cost in resources and time from a ransomware attack.

LammTech hopes you enjoyed this email blog and will follow along with the additional segments in the weeks to come.  The next installment will be “3 Things to Rely on for Ransomware Protection Before You Resort to Backup

Want to know more? LammTech is always available to discuss your data back up and data protection needs.  Call us at 660.827.9944 to discuss your needs and if you are protected.

Posted in Newsletter Articles | Comments Off on 3 Tips to Make Your Backup Ransomware Ready

LammTech Named to ChannelE2E Top 100 Vertical Market MSPs: 2018 Edition

Third-Annual List Reveals Accelerating Momentum for MSPs

In Healthcare, Government, Financial Services, Manufacturing & More

March 20, 2018, Sedalia, MO: LammTech has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research (http://www.channelE2E.com/top100) for 2018. The annual list and research (#Top100MSP) identify and honor the top 100 managed services providers (MSPs) in healthcare, government, financial services, manufacturing and additional vertical markets.

The Top 100 Vertical Market MSPs rankings are based on ChannelE2E’s Q4 2017 and January 2018 readership survey, and ChannelE2E’s vertical market industry coverage. MSPs featured throughout the list and research leverage deep vertical market expertise to drive annual recurring revenues (ARR) in specific market segments.

This year’s research revealed several key MSP market trends. Among the Top 100 Vertical Market MSPs for 2018:

  • Honorees generated a combined $277.3 million in vertical market annual recurring revenue (ARR) for 2017, up from $247.6 million in 2016.
  • Honorees are managing a combined 574 million users.
  • The most successful vertical market MSPs are zeroing in on healthcare and financial services, while manufacturing and legal sector activities are accelerating.

LammTech was ranked among the top vertical market MSPs in healthcare.

“We are proud of the team accomplishment of being recognized as a leader in the IT for healthcare market,” Said Robert Lamm, CEO, “Our security awareness offering has provided great value for the healthcare industry.”

“After Nines Inc. congratulates LammTech on this year’s honor,” said Amy Katz, CEO of After Nines Inc. “By diving deeper into vertical markets, top MSPs can increase their profitability and company valuations, while building stronger relationships in key market segments.”

About LammTech

LammTech (www.LammTech.com)is a network management, Cloud and systems technology integrator providing end-to-end solutions that ensure business integrity for small, medium and enterprise-level clients.  From design through deployment LammTech is an advocate for clients to strategically align their business and IT objectives.  We architect, implement and fully manage IT solutions spanning computing infrastructure, enterprise management, VoIP, security and cloud solutions.  The company is headquartered in Sedalia, Missouri.

Posted in News Alerts, Press Release | Comments Off on LammTech Named to ChannelE2E Top 100 Vertical Market MSPs: 2018 Edition

Using Backup to Recover from Ransomware: 4 Things You Must Consider – Part II

 

While it’s true that restoring from backup is the best option when you’re hit with a ransomware attack there are several things to think about when you use backup as the core of your ransomware protection strategy.

Recovery point objective (RPO): Recovery Point Objective is the timeframe dictating how often backups are created. It also informs the dates and times you can recover from. If you take weekly backups and you suffer data loss you can restore that computer exactly as it was a week ago. If you take daily backups and suffer data loss you can restore your computer as it was the day before.

It’s important to understand what your RPO is and how much data you could stand to lose if you were hit with ransomware and had to recover from your backup.

Ex: If your RPO is a week and your backups occur on Sunday, a ransomware hit on Saturday is going to wipe out a week’s worth of work. If your RPO is 24 hours, on the other hand, at most you’re going to lose a day’s worth of work.

Recovery time objective (RTO): Recovery Time Objective is the rough amount of time it will take to restore a computer from backup and get it back up and running. RTO is typically used to help your IT team estimate how long it will take to recover from any data loss.

However, you should keep in mind that this is an average. Depending on the type of data loss the time to recover the data might be longer than you anticipated.

The better the backup, the bigger the price tag: While it is possible to keep your RPO and RTO very low and improve your ability to recover more data faster, the price tag on those types of backup systems can go up very fast.

In most cases, it can be more cost effective and time efficient to invest in endpoint protection designed to identify and disrupt evolved threats in real-time rather than looking to upgrade your backup solution. You’ll stop more attacks and not be as reliant on backup.

Local backups can be encrypted by ransomware, too: If your backup solution is local and connected to a computer that gets hit with ransomware the chances are good your backups will be encrypted along with the rest of your data.

Ransomware such as CryptoFortress and Locky can encrypt connected network drives, so it’s crucial to have a backup that isn’t directly connected.

LammTech hopes you enjoyed this email blog and will follow along with the additional segments in the weeks to come.  The next installment will be “3 Tips to Make Your Backup Ransomware Ready

Want to know more? LammTech is always available to discuss your data backup and data protection needs.  Call us at 660.827.9944 to discuss your needs and if you are protected.


 

Posted in Newsletter Articles | Comments Off on Using Backup to Recover from Ransomware: 4 Things You Must Consider – Part II

Just Because you have a backup – Part 1

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options:

  1. Pay the ransom
  2. Restore from a backup
  3. Cut your losses and nuke the computer

Of those three choices, backup is obviously your best option. Assuming everything goes well, you’ll get your data back and you can get back to work knowing you dodged a bullet.

But remember, just because you have backup in place doesn’t mean you’re protected from ransomware. Recently, members of the Spiceworks IT community shared their experiences with ransomware in a brief survey. While most reported backing up their data, only 42% could fully recover everything that had been compromised or encrypted.

Relying solely on a backup as ransomware protection is like using your emergency brake for everyday driving: it may get the job done but it’s going to be messy.

The truth is, restoring from backup isn’t always going to go smoothly. There’s also no guarantee it’s going to be comprehensive. It’s a much-preferred option to paying the ransom, but to make sure it’s a viable option there are several things you need to prepare for and consider. Otherwise, if or when ransomware does hit, you may unfortunately find out you don’t have that choice after all.

LammTech hopes you enjoyed this email blog and will follow along with additional segments in the weeks to come.  The next installment will be “Using Backup to Recover from Ransomware: 4 Things You Have to Consider”

Want to know more? LammTech is always available to discuss your data backup and data protection needs.  Call us at 660.827.9944 to discuss your needs and if you are protected.

Posted in Newsletter Articles | Comments Off on Just Because you have a backup – Part 1

Updating Your Business’s Data Security Policies

As a business owner in the digital age, keeping your customers’ data safe should be one of your top priorities. As hackers get more sophisticated and begin targeting small and medium sized businesses with weaker security standards, an attack or leak is practically inevitable. To keep up, data privacy and security should be factored into the decision making in every department of your business. It’s important to take inventory of your current security systems, and make improvements where necessary. As we all spend more time and put more information online, there needs to be more efforts made to protect that data. Though this is just the start, take these principles into consideration for your business’s data security regulations.

Understand your data

To start, evaluate what data you have stored, where you store it, who it is shared with, and if you have any security measures currently in place. Creating, maintaining data inventories and data flows will help you stay updated on the changing data security landscape.

Don’t collect data you don’t need

Remember – no one can steal what you don’t have. When was the last time you reconsidered what data you collect from your customers? If you ask for email addresses and passwords when customers make accounts on your page, is that necessary? Don’t ask for information that isn’t directly related to your business. This could also help you gain more subscribers or customers, if your current system asks for information that people don’t feel comfortable sharing.

Hold on to information only if your retention policy requires

If you collect personal information, don’t keep it for longer than your approved retention policy. If you hold on to it for longer, you are putting your organization or customers at risk. Look for other areas where you are storing old personal data that you don’t need anymore, and dispose of it in accordance with your retention policy.

Control access to your data

Not every employee needs access to your most sensitive accounts and information. Consider using multiple user accounts so information is only given on a “need to know” basis. Adjust your protocols to ensure that only authorized employees with a business need have access to people’s personal information.

Require strict passwords

All employees should be required to use unique, complex passwords, and to use different passwords for every account. This is also helped by using multiple user accounts instead of one master login for administrative databases.

Store sensitive information securely

Use strong cryptography to secure confidential material during storage and transmission, through every step of its journey. If you store passwords for customers or employees, they should not be stored as clear, readable text that is easy for hackers to access. Your business needs procedures to store passwords securely and correctly. This can also be remedied by adopting two-factor authentication, which can help protect against password breaches. Make sure you are using the latest industry-standards for databases and other encryption. Trust that the experts have found the best solution, especially for securing data.

Secure remote access

Increasingly, employees are doing their work outside the office. Whether you work with freelancers or employees that sometimes work remotely, you need to take extra steps to secure access. Make sure every computer you send remote access to is secure and has the proper security in place. This includes employees and other businesses you may be working with. Make sure you install antivirus programs on all employee computers and that software is kept up to date.

Updating your practices for preserving data privacy can seem overwhelming, but it’s a necessity for business in the digital age. If you’re looking for support as you improve your own security measures, contact us for more security awareness assistance.

Posted in Newsletter Articles | Comments Off on Updating Your Business’s Data Security Policies

Internet Safety this Holiday Season – Tips for Parents

As the weather gets colder, that means more time stuck inside, and more screen time for the kids. Today’s parents face a difficult challenge as they keep their kids safe while they’re online, and teach them how to behave appropriately on the internet. Follow these tips to help your kids surf safely.

Internet Safety Tips:

Set Limits

Make sure your child knows the rules when it comes to the internet – how much time they can spend on it, what sites are allowed, and what they should and should not share. Consider signing a contract within your family that regulates internet use. The Family Online Safety Institute offers a sample on its website, and you can customize it as you see fit.

Supervise

Make sure you supervise children under age 10 while they are using the internet. Make sure the computer, tablet, or phone can only be used in a common area where it’s easy to check in on them. Pay attention to everything they’re doing online. As they get older, you don’t need to be staring at the screen with them constantly, but always check in.

Be Open to Communication

On the internet, it can be easy even for seasoned users to accidentally end up on the wrong site. Make sure your kids know they should tell you as soon as they find something that makes them uncomfortable. They should know it is not their fault, and that you won’t be angry with them if they end up on those sites. When they feel comfortable talking to you about what they might find, or what might be happening to them online, they’ll turn to you when they need help.

Add Parental Controls

Programs like Net Nanny give a pretty substantial parental control across Android, iOS, Mac and Windows devices. Set up filters, block inappropriate websites, and set timers that keep your kids safe. You can even view usage reports to see where your kids are visiting. As your kids get older, it’s important to tell them why you’re blocking certain sites.

Warn Children of Predators

Make sure your children understand that not everyone tells the truth online. Just because someone says they’re a child the same age as them, doesn’t mean that’s the case. It is essential that they tell you about any new people that they have met or have contacted them online. Hopefully you’ve set the standard and opened communication in a way that lets your child know you’re there to protect them online.

Internet Etiquette Tips:

Setting Up Accounts

Allow your child to set up their own email or other online account, and coach them through aspects like creating a strong password, and keeping their identity safe. Instead of adding their own picture, help them find a favorite cartoon or avatar to use. Their username can be fun, but should not reveal their identity, such as their school, age or full name.

What Not to Share

Your child likely will not understand the consequences of sharing their personal information online. But they should know:

  • Never to give their name, phone number, email address, password, postal address, school, or picture without your permission
  • Not to open e-mail or messages from people they don’t know
  • Not to respond to hurtful or disturbing messages
  • Not to get together with anyone they “meet” online

Keeping Behavior Appropriate

Remind your kids that whatever they post online, doesn’t necessarily ever go away. Make sure they know that comments or messages should be appropriate, and they should double-check what they’re sending. Anything can be screen-shot and sent to someone else. As kids get older and start using social media sites, they need to know the importance of being kind to others online

Set A Good Example

If you spend all your time on your phone or computer, your kids will want to do the same. Teach them proper etiquette by leaving your phone elsewhere when you sit down to eat dinner, or putting it down 30 minutes before bed. These devices are addicting, and you can help them (and yourself) by limiting time and focusing on the loved ones around you.

Posted in Newsletter Articles | Comments Off on Internet Safety this Holiday Season – Tips for Parents

Beware of Black Friday and Cyber Monday!

Beware: Black Friday is coming. What was once a one-day in-store shopping spree has become a week (or even month!) shopping marathon. The introduction of Cyber Monday and the rise of online shopping has led deal-seekers to make online purchases as they prepare for the holiday season.

In 2016, Thanksgiving, Black Friday and Cyber Monday online sales came in at $12.8 billion, a 15.2% bump from the same period in 2015.Cyber Monday made $3.45 billion in sales in 2016, making it the biggest day ever in U.S. e-commerce history. Almost 40% of sales on what was a brick-and-mortar shopping weekend occurred on a mobile device.

This year, 69% of Americans plan to shop over Thanksgiving weekend, and 84% of this year’s holiday shoppers will be shopping online, according to data from PricewaterhouseCoopers’ 2017 Holiday Outlook.

In all, Americans are expected to spend about $680 billion this holiday season, marking a 3.6 percent to 4 percent increase from last year’s $655.8 billion, according to estimates released by the National Retail Federation. Those figures are in line with last year’s 3.6 percent growth in holiday spending.

Before the sales days hit, businesses need to make sure their websites are ready, for the traffic of shoppers and the possibility of cyber-attack.

Holiday sales can bring a big surge of traffic to a website, so owners should ensure their sites can handle it. There are numerous sites that will simulate a traffic test for any URL, such as this one. You should consider contacting the web hosting provider and inquiring about the traffic limitations and cost of an upgraded server. Or, if you use Content Delivery Network (CDN), contact the provider to ensure they’ve planned for the increased traffic.

Unfortunately, getting a site ready for shopper traffic isn’t the only thing to prepare for. While this rise in shoppers is a boon for retailers and the economy, it comes with a certain risk. Cyber hackers know to follow the money, and as in years past, experts expect an increase in cyber-attacks this week. Some are predicting as many as 50 million global fraud attempts will occur in the next week as scammers look to capitalize on a busy shopping period to slip past fraud filters. Hackers have realized that by targeting busy shopping periods, it’s easier to hide their activity from e-commerce filters.

Due to consumer’s new shopping patterns, which continue up until Christmas itself, it’s difficult for retailers to notice the attacks have happened. A report from Verizon found it took a majority of businesses they studied two weeks or more to recognize that a crime occurred. In contrast, the holiday shopping period lasts for only eight weeks. More and more customers’ data may be at risk if it takes too long to identify that an attack has occurred.

Before the sales begin, monitor for malicious and unintentional changes affecting your network, with a solid Data Center Infrastructure Management (DCIM) solution that would flag outdated versions of software and firmware currently running on your assets that may pose security vulnerabilities.  This will address threats and provide time for risk mitigation before the big crunch on Cyber Monday.

If you’re planning on being a shopper yourself during the holiday season, take a few precautions to keep your data safe. Just like hackers start working overtime over the holidays, so will scammers looking to target consumers individually.

  • Only deal with retail companies you trust. Understand how they operate. More importantly, keep in mind that every entity can be spoofed in email or online.
  • Look for some sort of “Safe Shopping” badge on the site that shows they’re looking out for your safety
  • Remember to use a unique password for every online account. If you reuse passwords and the password file of the company with the least secure infrastructure is compromised, then your user ID and password combination are the keys to all your other accounts, especially for those that lack two-factor authentication.
  • Make sure the website is using HTTPS in the URL. This ensures that the data transferred between the web browser and the website is encrypted.

With the right precautions, you can walk away from Black Friday with great deals – and your data still protected.

Posted in News Alerts, Newsletter Articles, Robert's Blog | Comments Off on Beware of Black Friday and Cyber Monday!

What Section 179 Means for Your Business

Many small business owners are generally familiar with some of the small business tax deductions that can help you save money at tax time, but did you know that in 2016 Congress approved an expansion of a popular tax deduction for small business equipment purchases? This tax deduction is called the Section 179 deduction, and it was recently expanded to the $500,000 level and made permanent, according to the Protecting Americans from Tax Hikes Act of 2015 (PATH Act). This tax break for small businesses is intended to make it more affordable for small companies to buy business equipment, such as office furniture, vehicles, computers, machinery and other tangible capital investments, by allowing businesses to deduct up to $500,000 per year in qualifying business equipment purchases from their taxable income.

Section 179 has been around for several years, but the levels and availability of this tax deduction had been fluctuating. When it was first introduced, Section 179 deductions had an annual limit of just $10,000. Congress kept raising the limit year after year, but then in January 2015, the limit dropped from $500,000 to $25,000. When Congress passed the PATH Act of 2015 in December 2015, they returned the deduction limit to $500,000 and made it permanent – helping to resolve any uncertainty about the rules for this type of small business tax deduction.

Businesses were already allowed to deduct the value of eligible business equipment purchases, but under standard rules, they had to deduct only a portion of the value of the equipment each year. For example, if a business purchases $5,000 of new computers, they might have to deduct $1,000 per year for 5 years. Section 179 allows your business to deduct the full value of certain business equipment purchases in the same tax year that the purchases are made, instead of having to depreciate – or deduct the amount in portions – on a year-by-year basis over the useful life of the equipment. This can be a big advantage to your business, because it can enable you to reduce your taxes by a larger amount this year, instead of having to wait several years to get the full tax benefits of buying business equipment.

WHAT YOU NEED TO KNOW:

  • Section 179 has a $500,000 limit on the total amount of business property expenses that can be deducted per year.
  • Section 179 can only be used for new or used property that is purchased by your business – not for leased or rented property or property that is received as a gift or inheritance.
  • Section 179 deductions can only be used for property that is primarily used for business. You must use the property for business more than half of the time, and the amount of your deduction is reduced by the percentage of your personal use.
  • This deduction is highly focused on small and medium-size businesses, because the only companies that qualify for Section 179 are ones that spend less than $2 million per year on qualifying business equipment purchases.
  • Starting in 2016, Section 179’s $500,000 annual deduction limit and $2 million business investment limit will be indexed for inflation – so the amount of deductions will continue to adjust slightly each year along with overall prices in the economy.

QUALIFYING TYPES OF PROPERTY:

Section 179 deductions can be used for tangible personal property purchased for your business that the IRS has determined will last more than one year. Types of property include:

  • Computers
  • Software
  • Office furniture
  • Business equipment
  • Machinery
  • Business vehicles (weighing more than 6,000 pounds)

Section 179 cannot be used to deduct the purchases of other types of property, such as land, permanent structures attached to land, inventory, air conditioning and heating units and property used outside the United States.

For more information on Section 179 deductions and how they might help your business, check out this IRS website: http://www.section179.org

You can also sign up for this free Section 179 webinar hosted by the National Federation of Independent Business (NFIB).

DISCLAIMER: This article does not constitute professional tax advice; it is only intended to be informational and build awareness about possible tax deductions that business owners might qualify for. Individual tax circumstances may vary. Please talk with your accountant or other professional tax adviser before claiming any deduction

Posted in Newsletter Articles | Comments Off on What Section 179 Means for Your Business

CyberSecurity Awareness Month: Online Shopping

Here are a few things to consider when shopping online.

Make sure your computer and other devices are secure

When an update is available on your phone, tablet or other device, make sure to install it —software updates typically include any security flaws or potential problems.

Also, make sure your device is free of malware before making any online purchases.

Mobile security

Make sure your device is always running on the latest software. Apple frequently makes updates available, which often fix any potential security issues that could put you at risk. ensure that the latest patches or updates are applied.

Beware of fake email scams

Shopping online typically involves email confirmations related to any purchases you make, and scammers use several different email scams to trick consumers into handing over their personal information. Plus, record online shopping means a lot of packages are being shipped, and fake package tracking emails are a very easy way for scammers to steal consumers’ information.

Here’s how to spot a fake package tracking email.

If you receive an email that turns out to be a scam and you click on any links provided in the email, typically a virus or malware is immediately loaded on to your computer or other device. And then… nothing happens. You forget all about it while the virus lurks in the background — capturing your every keystroke to get access to things like your username and password for access to personal account such as banks or credit companies.

How thieves disguise scam emails as legit notifications

Thieves have found ways to make email scams look like they’re coming from legitimate groups and companies, including charities, retailers, credit card companies, banks, shipping companies (UPS, FedEx) and more.

So, if you receive an email you weren’t expecting — or even a “confirmation” email you were expecting — do not click on any of the links provided in the email. The safest way to find out if the information is legitimate is to open a separate browser, or even use a different device, and sign in to the company’s official website directly.

You can also call the company directly to confirm any information that was sent to you via email.

Never shop online using public Wi-Fi

Scammers can easily steal your information when you’re using an unsecured network. If you use a public computer, make sure to always completely log out of every website and the computer itself. When it comes to using free Wi-Fi networks, never sign in to any of your accounts that contain sensitive personal information, such as your bank account or any account that contains your bank, debit or credit card information.

Posted in Newsletter Articles | Comments Off on CyberSecurity Awareness Month: Online Shopping