Take Charge of Security With Two-Factor Authentication

take charge of security with two factor authentication
2 Factor Authentication

As attacks by hackers become all too common, it is increasingly important to ensure that accounts and passwords are protected. Two-factor authentication (2FA) provides an extra level of protection to accounts and is an important security option that all companies should consider. If you have questions or would like to learn more, AE Technology Group would be happy to help.

What is Two-Factor Authentication?

Two-factor authentication provides a method for ensuring that accounts are safe, even if a password is hacked or stolen. In addition to use of a password, 2FA requires that the account holder provide an additional piece of data or information to confirm the account. While there are many options for the second authentication factor, three common choices are:

  • A piece of information unique to the user, such as a password or PIN;
  • A physical object owned by the user, such as a smartphone or token; or
  • A biometric indicator, most commonly fingerprints verified by a fingerprint reader.

When an account needs to be verified, the system will first require that the user enter their password and then request their second form of authentication. For example, after a password is entered, the system may generate a phone call to the user’s smartphone.

What Are the Benefits of 2FA?

The most obvious benefit to 2FA is security. In the password/smartphone example used above, a hacker would only gain access to the account if they knew the account password and had access to the associated smartphone. 2FA also allows for increased flexibility for workers. Without having to worry about the safety of their devices, they can work remotely and in more locations – allowing them to maximize their time and productivity.

How Do I Implement 2FA?

AE Technology Group is perfectly poised to help your business implement 2FA.

Contact us today to get help improving safety and security for your business and employees.

What Is The Best Way To Protect Your Business From Hackers

what is the best way to protect your business from hackers

According to Small Business Trends online 43 percent of all small businesses across the United States face a cyber attack. In fact, over half of those businesses that suffer a cyber attack eventually fail. These known statistics make it necessary to protect your business from hackers. A hacker gains unauthorized use to your business data through your computer. The question is, what can you do to protect your business against a cyber attack?

What Does The AE Technology Group Do To Protect Your Business? 

IT Support Services

What is IT support services? Our IT services provides tech support against cyber bullies. When your operating system is under the threat of an attacker, we’re there to help. Our customers receive efficient monitoring of their operating system against hackers and other technical issues. We understand how effective IT support can keep your business productive. 

24 Hour Support 

There is no set time for a hacker to attack your operating system. The AE Technology Group is there to support your needs around the clock. Our customers receive 24/7 IT security, backup data services, disaster recovery, monitoring, and customized support IT software. 

Unfortunately, a hacker will go through great lengths to infiltrate your business data. Businesses that operate financial services are at a greater risk of a cyber attack. Cyber bullies are after data that can help them financially gain from your business. Basic anti-virus software isn’t enough to stop malware and the threat of spy software used by hackers. Get the backup and recovery services your business needs when you need it. We also provide in-office IT support services with Office 365 and VoIP. 

Amazingly, the AE Tech Group has proudly served the New York City area for over 17 years with a worldwide audience. We specialize in backup and recovery for small and medium size businesses. We’re there to protect you against ransonware, SQL injection, and worms used by hackers. You’re invited to contact us for more details on an exemplary 90 day trial to protect your business from unwanted hackers today. 

5 Security Tips for Mobile Device Use

5 security tips for mobile device use

Many businesses provide their employees with smartphones and/or tablets to use when they are on the go. Although having any time anywhere access to corporate systems is at minimum convenient, for some businesses it is absolutely necessary. For those companies who allow BYOD (bring your own device) access to corporate data, it is even more important to ensure that staff members follow proper security protocols when using their own devices. In this post, we’ll outline 5 tips for ensuring corporate mobile device use remains safe and secure.

Understand the Goal

Although it is always regrettable when a mobile device is lost or stolen, the loss of the physical device itself is not as important as the possibility of exposing valuable corporate data to hostile actors. Understanding that the goal of security and protection surrounding mobile device use is primarily about keeping data secure, helps companies clearly understand what it is they need to protect.

Craft a Comprehensive IT Policy

Most employees understand they need to follow security protocols when using company-owned desktop PCs, but the same goes for any corporate mobile use as well. Organizations should include mobile device usage in their corporate IT policies and instruct all their employees to follow those IT policies even when they are using mobile devices to conduct company business.

Security Software for Mobile Devices

As part of their formal IT policy, companies need to enforce the use of security software on all mobile devices used for corporate purposes. Hackers and data thieves know that mobile use is actually more prominent than traditional PC use, so it’s important to deter the increasing threats.

Use Data Encryption

It is possible to encrypt (scramble), confidential information such as corporate emails, documents,  photos, etc. that often reside on mobile devices. Ask your IT staff to install encryption software to protect these types of data on mobile units. 

Judicious Use of Bluetooth

Most mobile devices have the Bluetooth feature turned on by default. This means that any employee who visits a coffee shop, hotel lobby, or enters into another company with their mobile device, can potentially be exposing an unwanted connection to corporate data. To prevent this, companies need to instruct employees on how to enable security features so these scenarios won’t happen, or have them turn off the feature altogether.

If you would like to know more about creating a comprehensive mobile device security plan for your organization, please contact us.

A Review of Cyber Threats Affecting Businesses in 2018

a review of cyber threats affecting businesses in 2018

2018 was a banner year for hackers with widely publicized data breaches occurring in companies like Panera Bread, Under Armour’s data loss through their MyFitnessPal app, and reports of personal data from Facebook being distributed without consent. Then there is the recent attack reported by Marriott International Hotels, which affected nearly half a billion consumers over a 4 year period. Small companies will likely hear these massive data breaches and assume they can still quietly fly under the radar from hackers, but the numbers and statistics tabulated in recent years tell a different story.

What the Numbers Show

Cisco, one of the world’s leaders in the development and implementation of cybersecurity plans, recently reported that in 2017, 59% of medium-sized companies experienced at least one hacking event. In 2018, 39% of small businesses (employing less than 250 employees) reported a data breach, with downtime of over 8 hours occurring for approximately 40% of those affected.

Cisco concludes the biggest threats for small businesses include ransomware, advanced malware, and specially designed phishing campaigns targeted against corporate employees. In addition, a newer and increasing threat is cryptomining, which is the embedding and delivery of mining software through email campaigns. Cryptomining hijacks an unsuspecting victim’s computer processing power and uses it to mine for cryptocurrency. This hijacking of processing power drives up a company’s energy costs and decreases computer efficiency.

How to Prevent Attacks

Although large companies experience high-profile attacks, they also have the advantage of having extensive IT resources at their disposal to help clean up after attacks. Small and medium-sized companies rarely have the resources to support an in-house IT security team. Those with smaller resources however, rely on their corporate data just as heavily as larger companies and they need to have a plan to protect it. This is where a company like AE Technology Group can help. We can develop a comprehensive strategy to protect a company’s data, devices, employees and networks from both external and internal threats. We provide the technical and security expertise that small and medium-sized companies require, thus allowing them to focus on other important matters — like running their business.    

Summary 

If you are a small to medium-sized business and want to avoid becoming a data breach statistic in 2019, please contact us. AE Technology Group is committed to providing premiere, comprehensive security plans for all of our clients in 2019 and beyond.

How To Stay Safe On The Internet

how to stay safe on the internet

3 Things You Need To Do Now

With how many of our daily activities are making their way online, it is more important than ever to know how to stay safe on the internet and protect your personal information.

Every time you log in to your online banking, make a purchase from an online merchant, or even send an email with personal information, you are putting yourself at risk for identity theft and other information crimes if you are not taking the proper precautions.

Stop Using Weak Passwords

We know, your dog’s name or kids birthday is easy to remember, but it is also incredibly easy for any would-be identity thief to discover, especially if you are not employing good safety tactics on your social media. Never use the same password for multiple accounts, and don’t use names, birthdays, or other personal information as your password.

It may be more difficult to remember, but a random string on numbers and letters is often your most secure option. Trust us, remembering a better password is much easier than dealing with the fallout that can come from weak security.

Secure Your Social Media 

Your social media by nature is going to be a treasure trove of personal and sensitive information. Because of this, you need to make sure not everybody can see your every update. Change your setting so that the majority of your information can only be viewed by people you actually know.

An unprotected social media page can provide a potential hacker or identity thief with all the information they need to wreck your digital world. Keep your updates to your inner circle and screen all new additions carefully. It doesn’t hurt to actually verify an add request in person, fake profiles are an increasingly common tactic for cyber criminals.

Always Keep Your Antivirus Software Up To Date

Viruses and malware are ever evolving, and even a couple of missed updates can spell disaster for your internet security. One keylogger is all it takes to nullify every other security step you have taken.

Don’t forget to periodically run a full antivirus scan on your computer either. Sometimes bugs can slip past the first lines of defense. If at any point you feel your computer may be infected, whether or not your antivirus software is picking anything up, consult a computer professional right away. Your information security is nothing to take lightly.

For more ways to keep yourself safe and secure online, contact us today.