Quantcast
Channel: The AME Group

How to Use a Password Manager

$
0
0

First select a Password Managerthis blog shares some options. This example is using 1Password, but it’s a very similar process with all of them. It will show you the basics of how to use any password manager.

You will need to download the application for your phone and your computer. You will also need to download it for all the browsers you use.

It may be easiest to setup the account on a computer. You will start with a login username and password. Create a strong password by using a passphrase. A passphrase is several unrelated words strung together or an actual sentence.

creating a passphrase is more secure.  examples shown like "rabbit Long gong MAY 57"

When you add the Password Manager to your browser, you will need to login to your account.

You can add new items manually, or you can add them when you log into the account online.

For new sites, the password manager will recognize the password fields and automatically suggest one.

When you click on the suggested password, it will enter it into the field and allow you to save a new login.

It makes it easy when you return to the online site. The password manager remembers the URL (website name) and auto-fills the username and password.

YOU only have to remember ONE password!

Learn how to use a password manger and let the app do the hard work for you.

Once you master the password manager, you will wish you invested in one long ago!

The post How to Use a Password Manager appeared first on The AME Group.


What is a Password Manager?

$
0
0

Today, nearly every adult and child has at least one password. Most have nearly 100! The statistics around password management are rather grim. The most commonly strategy is writing them down in a notebook (31%). Remembering passwords is also a popular technique reported by 26% of the participants. (NCA). The most startling stat is only 45% of adults would change a password after a breach. (Google). The reason is it is hard for people to create and manage their passwords using only their memory. It’s time to change your strategy and use a Password Manager.

What is a Password Manager?

A Password Manager is an application that securely stores credentials used to login to websites and apps. It generates random passwords that are long and complex and far more secure than what people create themselves. It doesn’t matter if you cannot remember the password because the application stores it and enters the login and password for you.

Why is using a Password Manager important?

People create weak passwords and reuse them. Those weak passwords are already known by hackers or can be easily breached by computer programs. This puts all your accounts at risk – including important ones like banking and work accounts.

Let’s revisit some statistics for this one.

81% of the total number of breaches leveraged stolen or weak passwords. (LastPass)
61% of employees use the same passwords for multiple platforms. (LastPass)

How are the benefits of using a Password Manager?

Password Managers lets you manage hundreds of unique and strong passwords for your online accounts. It also:
SAVES TIME. You don’t have to reset your password as often because you forgot it.
PROTECT YOUR IDENTITY.
Works across all your devices and systems.
Notifies you of potential phishing or spam websites.
Alerts you to weak or breached passwords.

How is a Password Manager different than storing passwords on a browser?

It is similar in that it stores your login information and automatically fills it in. Browsers may be storing the logins on your device, or they may be in the cloud (for syncing between devices). You are usually always logged into your browser, so your passwords are always available. Your password to log into your browser may not be strong since we really don’t think about a browser like we do our bank accounts. Also, what if you use more than 1 browser? Your passwords will not be available to use. This is also a limitation of the Apple Keychain – it’s only useful on Apple Devices.
Bottom line is browsers are NOT as secure as Password Managers.

What if my Password Manager is breached?

A Password Manager is far safer than using browsers, notebooks, storing passwords on computers or creating your own passwords. Feeling like they are unsafe to use is very misguided.

There are a couple things you should do when setting up your Password Manager.
1️⃣ Create a long passphrase that you can remember as your Password Manager login.
2️⃣ Turn on multi-factor authentication

Password Managers encrypt all data stored in them. This means, if they are stolen, they cannot be decoded easily. The only access to the passwords in your manager is by using the ONE password only you know.

Password Managers does not know your main password. It is not kept on the system’s servers, so only YOU know it. This means you must remember just 1 good password.

Options for Password Managers

There are many different free or paid password managers available for personal or business use.
Some examples include: 

1Password  
LastPass       
Keeper 
Bitwarden 
NordPass  
Dashlane  

Look at trustworthy guides to compare the different password managers

Consumer Reports  
PC Mag  
CNET  
Tom’s Guide  
Global Cyber Alliance: passwordmanager.com

        

Learn the basics of using a password manager.

The post What is a Password Manager? appeared first on The AME Group.

How Does Ransomware Work?

$
0
0

Ransomware is a major problem for companies around the globe. Did you know businesses lose about $8,500 per hour because of ransomware-induced downtime, according to Comparitech? The CISA reports that, even though agencies and governments remain vigilant to uphold data security, malicious actors continue to reinvent their ransomware tactics. According to KPMG, the Covid- 19 pandemic opened doors to a surge in ransomware as cyber criminals targeted the less fortified computer systems belonging to people working remotely.

For a ransomware attack to be successful, it first needs to gain access to the system and encrypt the targeted files. From there, it is a matter of the attackers making their demands and the victims working tirelessly to prevent the attack from being publicized. Thankfully, a system with robust data security features can quickly steer clear of an attack. However, if the contrary is true, the system could easily become a victim of a cyberattack. Here is how ransomware works and why you need to protect yourself and your employees.

First Step: Gaining System Access

Like any malware, ransomware first gains access to the system. The attackers usually use a few target points (also known as infection vectors) like malicious emails or remote control. For example, they may send an email containing a link to a website and, once clicked, the website starts a malicious download. If the person involved falls for the phish, the ransomware loads and executes on the computer, compromising data security.

Second Step: Encrypting the Files

Once the infection vector has been successfully executed, the ransomware starts encrypting files. The process involves accessing files and using an attack-controlled key to mangle the accessed files. To finalize the attack, the ransomware then replaces the original files with the encrypted versions. Other high-level attackers will go a step further and delete any backups of the original files to make recovery almost impossible.

Final Step: Making the Demand

Once the attackers are sure the file encryption is complete, they show themselves using a display background containing a ransom note. Typically, the note contains the demand, which may be a set amount of crypto or any other asset in exchange for the files. If the victims comply and complete the transaction, the ransomware operator may share a key to decrypt the files, then move on to their next victim.

Understanding how ransomware compromises data security is just the first step in prevention. You probably don’t know how to protect yourself. In this case, you should partner with one of the best data security companies. At The AME Group, we will check the security of your current system and carefully comb through it for any vulnerabilities. We offer computer security solutions that you can trust. Contact us today and we’ll help you steer clear of any online attacks.

The post How Does Ransomware Work? appeared first on The AME Group.

How to Spot a Phishing Email

$
0
0

First, you must train yourself to spot the signs of a phishing email. Second, you must practice. Then, you can protect yourself and your company.

STOP and ask yourself, am I expecting this email?
When you are in a rush or on a phone email app, STOP and ask yourself, can this wait until later to check more closely?

If it doesn’t seem quite right, or expected, question it. If it appears to be from a co-worker, don’t reply, call them to verify any requests.

Phishing emails can look just like the real thing – pulling logos and formatting like real companies.
Here are some tips on spotting a scam.

  • Contains an offer that seems too good to be true. (You have won a car!)
  • Language that is urgent, alarming or threatening. (We suspended your account!)
  • Request to send money or personal information.
  • Notice asking you to log into an account to correct and issue. (Your account will be cancelled. Log in now to correct the problem.)
  • Strange or abrupt business request. (Buy a gift card and send it now.)
  • Urgency to click on an unfamiliar hyperlink or attachment. (The attached invoice is overdue.)
  • Sending email address doesn’t match the company it’s coming from. Maybe just 1 character is different.
  • Greetings are generic or strange.
  • Poorly crafted writing with misspellings and bad grammar. We see this less often because criminals are much more sophisticated now.

What to do if you receive a Phishing Email

  • Do NOT open attachments or click on links.
  • Contact the sender if you know them.
  • Report the email to your IT department.
  • Delete the email.

If you are tricked by a scam and you click on an attachment, follow a link, or enter login credentials, notify your IT department immediately and disconnect your computer from the network (WiFi, docking station, ethernet cable).
Ask your employer for cybersecurity training!

The post How to Spot a Phishing Email appeared first on The AME Group.

Do You Have Insurance Coverage Blind Spots?

$
0
0

The answer is YES, there are often “blind spots” in your business insurance policies. Due to the high incidence of ransomware attacks last year, insurance premiums have increased as much as 40% and polices may have limitations to further protect the insurer.

Mind the Gaps in Your Insurance Policy

Recently, our Strategic Advisor in Evansville, IN gave us a few tips to better understand insurance policies. You should ask the following questions about your business’ Cyber Liability Insurance policy.

Does my insurance coverage have sublimits?

A sublimit is the maximum payout for specific types of incidents.  This limits the insurance company’s risk.  If your policy says “$500,000 in coverage”, it also has sublimits for certain types of damage or certain items.  For example, you may have a sublimit of $250K for business income loss, or $25K for ransomware.

Can my carrier go above $1M?

$1M is an insurance industry standard.  Many companies have experienced breaches that surpass this limit. 

Does my policy include ransomware coverage?

Will the policy specifically cover ransom paid out?  Most cyber liability policies include ransomware, but there isn’t a standard, so coverage varies with each insurer. The limits are often much lower than the policy amount. We can go back to the question about sublimits – often ransomware can be as low as $25K.

How will my policy help with the cost of reputational harm?

This one is HUGE. Very few policies cover this in the months following a breach.

What type of breaches fall under war exclusion?

Many polices exclude acts of war, or state-sponsored cyber operations. For example, because the NotPetya malware was used by governments to attack other governments, it didn’t fall under the policy.

How will my policy help if my employee wires money to a fraudulent account?

Not every insurance policy covers wire transfer fraud.  The money is often seen as voluntarily transferred.  When covered, there is usually a limit of $250K. This type of crime has skyrocketed and is the costliest to businesses.  Business Email Compromise is most often associated with this type of fraud.  This is where multi-factor authentication, employee training and policies go far in preventing being scammed.

These are the top things that insurance companies will try to get out of paying.

The post Do You Have Insurance Coverage Blind Spots? appeared first on The AME Group.

How to Budget for Your Business IT

$
0
0

Give yourself plenty of time to review your IT budget to ensure your business has the resources it needs to continue to grow and prosper in the coming year.

Business now know technology cannot be an afterthought. You need to have a clear and well-defined Strategic Business IT Roadmap to reduce unanticipated technology issues that could cause trouble.

IT BUDGET: Assess, Document and Plan

As technology advances at a fast pace, routine technology refreshes become increasingly essential for any company hoping to stay successful. Rather than simply assuming you’ll need the same IT solutions with the same IT budget, take the time to assess your current needs, as well as how upgrading or moving to different platforms might help your company meet those needs.

Can your current state support your business goals?

Focus your IT budget to improve these four areas:

 

Monitoring and Maintenance

Weaknesses in your IT infrastructure compromises your business and can come with a heavy cost.  Hackers are always scanning for vulnerabilities in your business network. Identify your weaknesses with a network audit or security risk assessment. Make sure your devices have “next generation” software to continuously monitor your network and respond to threats.  Use a vulnerability scanning solution to identify potential problems and develop the best preventive measures.

Projects

Businesses frequently neglect critical IT projects.  IT Projects today strengthen security, improve customer experience, and allow for flexible work environments. 

Check out this infographic on “IT Budgeting Tips for Small Businesses” 



Refreshes

Keeping legacy systems may appear to be the easiest and most economically sound option, but it usually decreases employee productivity and harms your bottom line.  Older equipment reaches a point where it cannot be updated or patched. This greatly increases the risk of hacking. As a result, planned technology refreshes are critical to ensuring the optimal performance of your IT infrastructure.

Accidents or incidents

You’ll need a plan in place to tackle an accident or incident, such as a cybercriminal demanding a ransom. Discovering that hackers have encrypted all your systems can be disastrous, not just financially but also in terms of your reputation. When planning your technology budget, focus on strengthening your cybersecurity posture to prevent attacks.  It is vital to understand your insurance policy and have a disaster recovery plan.

Consult an IT Service Provider

An IT service provider can play a vital role in guiding you through anything IT-related, including cybersecurity, backup, compliance, budgeting and more.  It is often more cost-effective to engage an IT company than to maintain your own IT personnel.

An IT service provider can help with:

Internal support: Internal IT department or IT team

A common type of technology support is through an internal IT department or team.  Businesses with a committed IT team are enterprises with large IT budgets and needs.  Small businesses often have one IT staff member or use someone as needed. 

External support: Outsourced IT service provider

An external IT service provider, like us, supports your business in multiple ways.  We assess your IT infrastructure, help you create a strategic business IT roadmap to drive budgeting decisions, provide advice on the best IT solutions, and assisting with implementation, setup, continual monitoring, and support.

Hybrid support: A combination of internal and external IT services

Businesses with an internal IT team engages external specialists for areas they cannot cover, like security or projects.

Outsourcing your IT needs or opting for hybrid support alongside your internal IT team can reduce a great deal of stress.  Our specialists can help lighten the load and prepare a budget.

To get started, contact us today for a no-obligation consultation.


Related Posts

Man in T-shirt that says 4 Common Mistakes in Technology Budgeting_The AME Group

4 Common Technology Budgeting Mistakes

Do you have an IT Budget? If so, congratulations! You’re ensuring the success of your business. Budgeting for technology can be tricky. Threats persist and evolve as fast as technology changes. Avoid the most common budgeting mistakes to get the most bang for your buck! Here’s a list of the most common technology budgeting mistakes. Mistake #1: The cheapest option is always the best Your business technology shouldn’t be an afterthought. Investing in high-quality technology can significantly improve your bottom line. Excellent Reasons to Invest in High-Quality Technology 1⃣ Streamlining

How and IT Provider can Simplify Budgeting_The AME Group

How an IT Service Provider Can Simplify Budgeting

Do you find budgeting for IT challenging? If so, you aren’t alone. Here’s some tips to simplify your budget. While the IT budgeting process can be tricky for small businesses, it can be especially difficult for those trying to do it all by themselves. With so many aspects to consider, it can be tough to prioritize each and everything and still have funds left over for other crucial matters. One solution is to partner with an IT service provider like us. We can help you budget for all your IT

Customized Syndicated Content from Kaseya, used with permission from Powered Pro Services.

The post How to Budget for Your Business IT appeared first on The AME Group.

4 Common Technology Budgeting Mistakes

$
0
0

Do you have an IT Budget? If so, congratulations! You’re ensuring the success of your business. Budgeting for technology can be tricky. Threats persist and evolve as fast as technology changes. Avoid the most common budgeting mistakes to get the most bang for your buck!

Here’s a list of the most common technology budgeting mistakes.

Mistake #1: The cheapest option is always the best

Your business technology shouldn’t be an afterthought. Investing in high-quality technology can significantly improve your bottom line.

Excellent Reasons to Invest in High-Quality Technology

  1. 1️⃣ Streamlining workflows
  2. 2️⃣ Increasing employee productivity
  3. 3️⃣ Improving customer satisfaction
  4. 4️⃣ Avoiding business interruption
  5. 5️⃣ Avoid frequent repair costs
  6. 6️⃣ Improve your bottom line

Just as you would not attempt to run a marathon with inadequate preparation, don’t run your business with lousy technology. The right choices make a difference. 

Mistake #2: Last year’s IT budget will work for this year

As technology and cybersecurity threats evolve and advance, businesses need to stay up to date to succeed. This can be challenging because budgets are often tight, and it can be hard to justify spending on new technology when old systems are still operational.

You can overcome this barrier by conducting internal assessments to identify friction points and areas where upgrading to a new system or platform could improve business outcomes. This information can help make a case for the necessary expenditure to stay relevant and improve your company’s long-term success.

Mistake #3: One person can handle all my IT needs

Even an IT genius needs the occasional vacation or day off. Augmenting internal resources with an IT service provider can help bridge gaps and give relief to your internal resources. This can help improve job satisfaction and employee retention since your team members will feel appreciated and empowered to take time off, when necessary, without jeopardizing your company’s IT infrastructure.

Mistake #4: Thinking short-term

Always keep your overall business objectives in mind when budgeting for IT needs. Purchasing solutions that cannot grow with you is wasteful. You will end up spending more money in the long run. You can avoid potential roadblocks and extra costs by planning ahead as much as possible.


Related Posts

Piggy Bank and Money_Tips for IT Budgeting

How to Budget for Your Business IT

Give yourself plenty of time to review your IT budget to ensure your business has the resources it needs to continue to grow and prosper in the coming year. Business now know technology cannot be an afterthought. You need to have a clear and well-defined Strategic Business IT Roadmap to reduce unanticipated technology issues that could cause trouble. IT BUDGET: Assess, Document and Plan As technology advances at a fast pace, routine technology refreshes become increasingly essential for any company hoping to stay successful. Rather than simply assuming you’ll need

How and IT Provider can Simplify Budgeting_The AME Group

How an IT Service Provider Can Simplify Budgeting

Do you find budgeting for IT challenging? If so, you aren’t alone. Here’s some tips to simplify your budget. While the IT budgeting process can be tricky for small businesses, it can be especially difficult for those trying to do it all by themselves. With so many aspects to consider, it can be tough to prioritize each and everything and still have funds left over for other crucial matters. One solution is to partner with an IT service provider like us. We can help you budget for all your IT

Customized Syndicated Content from Kaseya, used with permission from Powered Pro Services.

The post 4 Common Technology Budgeting Mistakes appeared first on The AME Group.

How an IT Service Provider Can Simplify Budgeting

$
0
0

Do you find budgeting for IT challenging? If so, you aren’t alone. Here’s some tips to simplify your budget.

While the IT budgeting process can be tricky for small businesses, it can be especially difficult for those trying to do it all by themselves. With so many aspects to consider, it can be tough to prioritize each and everything and still have funds left over for other crucial matters.

One solution is to partner with an IT service provider like us. We can help you budget for all your IT needs — both big and small. We help you find ways to save funds on your IT budget. Saving in one area frees up financial resources for other areas of your business.

Our checklist “IT Services You Should Consider” provides a list of critical IT services that should be included in your IT budget.

HOW WE HELP BUSINESSES WITH TECHNOLOGY

Network Assessments

Through network assessments and discussion, we understand your business’s technology requirements and recommend solutions that improve efficiency.

We provide support and maintenance for your business’s IT infrastructure. Our services may include making sure your systems are up and running smoothly. We can also help with any technical problems you may experience. We simplify managing your IT.

Also, we help you plan for future growth by studying your business’s long-term needs and suggesting solutions based on that vision.  Partnering with us means you can rest assured that you have the right tools and support to be successful.

We help you create a Strategic Business IT Roadmap.

We tailor-make a 3 to 5-year plan based on the needs and goals of your business. This plan helps determine which technology solutions are best suited for your company. Planning also includes how to implement them in ways that meet your budget and time constraints.

Facilitating compliance with a cyber insurance policy

Cyber insurance coverage is more vital than ever. We help you comply with your policy and increase your chance of receiving a payout when needed. By partnering with us, you better understand what your policy covers and what it doesn’t. We help you decide what measures you need to take to be in alignment with your policy. We can monitor and manage your compliance on an ongoing basis.

Offering a flat monthly price for everything

We offer a fixed monthly rate for our services, helping you create a budget and estimate your monthly IT expenses. Like any industry, you might find service providers who underquote their prices and later charge you additional fees.

Let’s join forces to make sure your business succeeds

Technology is constantly evolving and keeping up with the latest trends can be difficult. A technology budget can help ensure your company has the required resources to stay ahead of the curve.

Our team helps simplify your technology budget for the upcoming year by identifying your needs and putting together a budget that meets your specific business goals.

Contact us today to set up a consultation.


Related Posts

Piggy Bank and Money_Tips for IT Budgeting

How to Budget for Your Business IT

Give yourself plenty of time to review your IT budget to ensure your business has the resources it needs to continue to grow and prosper in the coming year. Business now know technology cannot be an afterthought. You need to have a clear and well-defined Strategic Business IT Roadmap to reduce unanticipated technology issues that could cause trouble. IT BUDGET: Assess, Document and Plan As technology advances at a fast pace, routine technology refreshes become increasingly essential for any company hoping to stay successful. Rather than simply assuming you’ll need

Man in T-shirt that says 4 Common Mistakes in Technology Budgeting_The AME Group

4 Common Technology Budgeting Mistakes

Do you have an IT Budget? If so, congratulations! You’re ensuring the success of your business. Budgeting for technology can be tricky. Threats persist and evolve as fast as technology changes. Avoid the most common budgeting mistakes to get the most bang for your buck! Here’s a list of the most common technology budgeting mistakes. Mistake #1: The cheapest option is always the best Your business technology shouldn’t be an afterthought. Investing in high-quality technology can significantly improve your bottom line. Excellent Reasons to Invest in High-Quality Technology 1️⃣ Streamlining

The post How an IT Service Provider Can Simplify Budgeting appeared first on The AME Group.


What is a Disaster Recovery Plan? Here’s What to Know

$
0
0

Business owners should be thinking about disaster recovery for work continuity. Every business owner should have reliable backups for their business. A DRP (disaster recovery plan) should be in place for your business. Learn what a DRP is and how you can formulate one.

What is a DRP?

A DRP for your business is a well-structured, written plan that outlines how your business will start working again after a disaster. It is a part of your business continuity plan. It will include reliable backups, how you will restart work, and other details about recovering from an unplanned incident. A disaster can be any incident that stops workflow. It can be a natural disaster like a hurricane, it can be a local disaster like a fire, and it can be an IT disaster where all your data has been compromised.

A Focus On Minimizing Effects Of The Disaster

A well-defined DRP can help to minimize the effects of a disaster. The plan should include a setup that will allow critical functions of the enterprise to continue during the disaster or to resume shortly after the disaster. Reliable backups are key to your plan.

Part of the Plan is to Test Your Plan

It is important to have a written plan that provides directions. However, you should test the plan every few months to ensure that it works. For example, test your backups. According to TechT, about 25% of organizations do not ever test their DRS (disaster recovery system). You do not want any surprises in the case of a disaster. Test your DRS to ensure it is functional.

Plan for This

There are several incidences that your organization should include in the DRP. Power outages, communication failures, natural disasters, regional problems, global disasters, campus, and building disasters, and cyber attacks. Each one of the aforementioned events could shut down your business if you do not have a plan in place for work continuity and a DRP.

Get Prepared

Before you design your plan, be sure that you have the tools in place to carry out your plan. Do you have reliable backups? If not, it is time to put them in place.

In today’s world you never know what could happen. Be prepared. Reach out to a company like us at The Ame Group that can help with your disaster recovery plan today.

The post What is a Disaster Recovery Plan? Here’s What to Know appeared first on The AME Group.

5 Benefits of Cloud-Based IT Infrastructure

$
0
0

Most businesses, regardless of size or industry, are gradually turning to cloud services. They have realized they can benefit in many ways by making the switch. What helps is that cloud-based digital infrastructure is growing. According to Zippia, about 67% of enterprise infrastructure relies on cloud computing. With that said, some businesses are yet to embrace this technology as they don’t understand the benefits. The article below highlights some of the advantages of using cloud-based IT infrastructure.

Enhanced Data Security

One of the benefits of using cloud storage is improved data security. Most businesses are concerned about the safety of their data. With the way cybercrimes have become common, no one wants to risk a data breach. Cloud comes with multiple security features that protect your data.

Collaboration at the Workplace

When you’ve hired several employees, you should prioritize collaboration. After all, what’s the point of having a team if your workers don’t collaborate? Incorporating a cloud-based infrastructure makes collaboration easy. Team members can share and view information securely even when not in the same location. Collaboration might be possible without this technology, but it’s not as effective or easy.

Versatility

All businesses are different, so it makes sense that all companies will have unique IT needs. Using the cloud allows businesses to scale up and down based on their business demands. Cloud-based solutions are suitable for businesses with fluctuating demands. When your needs increase, you can increase your cloud storage and vice versa.

Prevention of Data Loss

Besides data security, most companies are also concerned about data loss. Cloud storage companies often guarantee your data will be safe and always available. This is why companies rely on cloud computing for most of their tasks. With cloud infrastructure, once you upload your data, it will always be there. All you need is the internet and your computer or phone, and you can access the data you want.

Instant Business Insights

Cloud-based IT infrastructure allows you to retrieve or access data as soon as it’s uploaded and collected. This promotes better decision-making in the organization. At the same time, it gives you a better idea of what the future holds for your company based on historical data.

Now that you know the benefits of cloud-based IT infrastructure, are you ready to incorporate it into your business? Discover more about how this technology can help you grow your business.

The post 5 Benefits of Cloud-Based IT Infrastructure appeared first on The AME Group.





Latest Images