How Can You Protect Your Business Data During Logins?

how can you protect your business data during logins

The more inconvenient you can make it for would-be criminals to get your business and customer data, the less likely they are to try. Unless they are specifically targeting your business, there is almost always lower hanging fruit. Here’s how to tighten security with just a few simple changes:

Have two-step password recovery or logins.

If you’ve ever forgotten your password to an account through Google or ADP, you’ve been given an extra passcode for extra authorization. More and more companies are turning to adding a second, manual step to prevent mass password reset requests and to prevent typical bots from being able to complete the process. So add this extra step for when your customers need new passwords and when your employees log in.

Never give out forgotten passwords.

Several years ago, you would be sent your password if you forgot it. But companies and online services gradually started switching to password resets instead. This isn’t necessarily because it’s any easier on the hacker’s end to recover the password instead of resetting it. But the fundamental architecture of old password recovery systems was a spreadsheet. You’d enter your username as part of your password recovery request, the system would find that string of characters in the ‘username’ column, and then you’d receive an email with whatever was in the ‘password’ column. If hackers know how your information is organized, it’s that much easier to steal.

Use a physical key for administrative access.

A physical token is also an icon of early Internet security. Instead of two-step verification apps like Duo, people used to get remote network access through their computer login and by plugging in a token that provided a long string of randomized characters: one of the most secure passwords.

For truly crucial information and access portals, like your server administrator’s or CTO’s computer, use a token. They’ve become more and more secure, and the element of physical security makes it that much harder to break into.

For more security tools, go to AE Technology Group.

 

What Are Managed Services for New York Businesses?

what are managed services for new york businesses
Managed Services

If you are new to owning a business or perhaps have just never considered using IT services you are missing out on a service that could make the operations of your business run a lot more smoothly. AE Technology Group offers managed services to New York and Long Islands businesses. We specialized in providing services to small to medium businesses that don’t want to deal with the hassle of managing IT in-house.

Managed services offer both preventative and on-demand IT support to our clients. The are many benefits to hiring AE Technology Group to provide your IT services. The first is that we always have on-demand support. IT issues are rarely convenient and need to be repaired as soon as possible to keep your business running smoothly. Thanks to today’s technology, almost any IT problem can be fixed remotely. So if you give us a call we can help solve your problem quickly without having to make a trip into your workplace.

Another benefit of managed IT services is that it saves your business money and space. Having your own in-house IT takes up space and hiring full-time IT staff might be more costly than hiring outside support. And an additional benefit is that managed IT services come in packages depending on what you need. You will probably find many of your IT needs fall under one of our packages provided at a low monthly rate.

For more information about managed IT services, contact us today at AE Technology Group.

Cybersecurity for Business: Here’s How to Secure Your Technology Now!

cybersecurity for business here how to secure your technology now

No matter what size business you run, adequate cybersecurity for business is likely at the top of your to do list this year. Cyber-criminals are targeting both small businesses and large businesses alike.

Cybersecurity for business

In addition, most people don’t realize that what’s attracting cyber-criminals to their targets is,

  • Simple and unprotected entry points,
  • Weaknesses,
  • Vulnerabilities, and
  • Outdated hardware and software

The only way to truly know where your business’ vulnerabilities lie is to work with an expert team.

In May of 2016, several large banks experienced breaches across the various financial networks they use to transfer money like SWIFT. Cyber-criminals transferred money illegally across these networks after they gained access to the data via old bank computers that had been compromised some time ago. The computers also had no modern protections installed. Staff never destroyed the computers or took them offline.

In addition to weak hardware, cyber-criminals spot weaknesses in human nature and gain easy access to your organization using social engineering tactics. In fact, higher-level executive employees are more likely to fall for phishing scams called whaling.

For the most part, handling your own IT is not the best way to handle modern risk.

There are new cyber threats every day. It’s financially impossible to hire all the staff you need to ensure your company’s bases are covered. When you work with an MSP, you work with a professional IT services company that manages and secures your technology.

This offers your organization:

  • Advanced productivity and technology performance,
  • The best security,
  • Reliable connectivity and redundancy. (Your staff can get more done with fewer outages and downtime).
  • Plenty of room for one or several servers in our world class data center, and
  • Support for all the devices and operating systems you use

At AE Technology, we believe in proactive tech support. That means we monitor your network 24/7/365, and complete routine systems maintenance every few months. Because of this, issues don’t catch us off guard. We apply patches and updates regularly; and your system is always updated with the latest tools and technology. We equip your software to resist all new cyber threats.

The only way to have access to the resources your business needs is to work with a qualified MSP. Contact us today to get started!   

Enjoy the Benefits of Remote Support

enjoy the benefits of remote support

Enjoy the Benefits of Remote Support

Have you ever had one of those moments at work when your computer is just not doing what you want it to do? You are sure that if you were an IT professional it would only take you a moment to figure it out. But you aren’t. So instead you waste an hour of your time trying one thing after another, web searching for a solution, and still aren’t able to resolve the problem.

You are not alone!

This is a very common frustration with computers and technology. Large businesses generally have their own IT department. But what about all those small to medium businesses out there? Hiring IT support is a great solution and many IT companies offer remote support. The benefits of remote support are endless.

Remote support enables your IT company to remotely log into your computer and fix the problem as if they were sitting right there. It really is a sight to see if you haven’t experienced it before. It is like all of a sudden a ghost is operating your computer. Only it isn’t a ghost. It is an IT professional who can more often than not fix your problem. This saves both of you time because they don’t have to travel to you and you don’t have to wait for them to get there to be up and running again.

For more information about remote IT support in New York City and Long Island, contact us at AE Technology Group today. Of course we also offer on-site support when needed, but let us open your eyes to the wonders of remote support.

How to Create a Password to Protect Your Computer

Password to protect your computerA password is a word or string of characters you use for user authentication. You must know it in order to prove your identity or gain approval to access an account. A hacker is a person who illegally gets access to a computer system and tampers with the information.

Tips on how to protect your computer from hackers are below.

  • Do not use a password that contains parts of your name or email address.
  • Do not include personal information or use consecutive numbers in your password.
  • Avoid using a password that has familiar slang terms or phrases.
  • Use variations on numbers, punctuation, capitalization and spelling. A secure password is lengthy, random, and unique.
  • Use the Bruce Schneier’s Method. It was created by a security expert who recommends that you take a sentence and turn it into a password. Take the words from the sentence, then abbreviate and combine them.

It is also important to protect your computer from viruses by using antivirus software. There are several commercial products that can help protect your computer from various viruses, worms, Trojans and other hacker tools. Your software must be configured to update its database on what to look for. Use a firewall as well because it tries to block hackers from entering or using your computer. Firewall examines electronic data coming in or out of your computer and compares it to the rules. If the data matches the rules, it is permitted to pass. If it does not, it is blocked.

For more information please contact us.