• Skip to main content
  • (617)933-5060
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
Facebook-f Twitter Linkedin-in
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

business data

The Modern Office: Why a Strong IT Foundation Should Be the Basis of Your Business

August 27, 2019 by securewebsite

Business builds itself from the ground up. Your business internet technology (IT) is no different, which is why your foundation is so critical. The modern office revolves around having strong IT in place. From communications to automated business processes and protecting valuable company data, your foundation is imperative to your organization’s ability to not only thrive but survive.

Without a strong foundation, your business risks everything: Being hacked; watching valuable data be stolen, held ransom, or destroyed; and experiencing crippling downtimes when systems fail to function properly, costing your organization money every minute your employees can’t function. A strong foundation will help protect your company from experiencing such destructive problems and allow it to keep functioning smoothly even through inevitable IT bumps in the road.

What is Foundation in IT Terms?

At ORAM Corporate Advisors, we view the foundation as the nuts and bolts of your operation. We consider that to be your firewall, your switches, and your wireless access points. This is the core of your network. These are the things that have to be 100 percent reliable all the time and what literally makes the world go round for your business.

Firewalls as a Gateway

The gateway in and out of your network is your firewall. When it comes to the network security of the modern office, the firewall is your first and best line of defense. It monitors and controls both incoming and outgoing traffic on your network based on the security rules set for it. What rules are employed depends on how your company operates, the security it requires, and industry regulations. The best firewalls are “smart firewalls” which are capable of configuring, monitoring, and managing network traffic on the fly.

An average firewall is a hardware device or even a software program that is a barrier, a wall, between your systems and network and the internet. Its purpose is to limit unnecessary communication between your computer network and the internet.

Smart firewalls offer much to your business in terms of additional protections. Today’s modern office should employ smart firewalls as they include:

  • Antivirus, Antimalware, and Limited Spam Filtering
  • Deep Packet and Stateful Inspection
  • Packet, Adjustable Content, and “Default to Now” Traffic Filtering

The IT experts at ORAM can configure your smart firewall to maximize its protective benefits for the specific needs of your business. This ensures there are no gaps or vulnerabilities in your security settings that could allow a hacker to infiltrate your business system. We also take the time to keep your firewall current and patched.

Switches: Your Business Connection

Network switches are another important piece of your modern office network. This is the link, if you will, that connects devices on your network. It’s the switches that receive, process, and forward data moving in and out of your network so that it arrives at its proper destination.

The most common switch among business networks is one that handles Ethernet traffic. That is to say, the switches that connect your business to the internet. Without such switches, your business would become a proverbial island and your business data from email to invoicing may not function properly.

In addition to traditional managed switches, “smart switches” are an evolving option that can offer some management and security. They can be cost-effectively used in large networks as a supplement to managed switches or can be included as the main infrastructure in smaller networks. Smart switches can allow your business to segment its network into workgroups by creating a virtual local area network (VLAN).

Wireless Access Points

Wireless local area networks, or WLAN, are created by using a wireless access point device. These WLANs are typically found everywhere from homes and restaurants to modern offices and large buildings. They provide wireless access to the network for devices such as laptops, printers, and cell phones in a designated area such as your office. This enables your employees and customers to stay connected on a secure wireless network that is isolated from the core network in your office. You can also open or limit wireless guest access to specific applications or times of the day.

Recommended Foundation Hardware

The foundation of the modern office is also cloud-based. This allows you to know more about what your end users are doing and how traffic is flowing. Traditionally, you’d have to look back through logs and that is a time-consuming process. The modern office can’t afford to sit idle while the IT staff sifts back through logs to determine where things went wrong. Smart firewalls, switches, and access points provide real-time information through cloud-based systems that allow us to make the best decisions with up-to-date information.

At ORAM Corporate Advisors, we recommend using Cisco Meraki for all of those devices because it’s one of the most reliable cloud-based systems to date for business networks. This is important because it is the foundation of your business. User management, connectivity, and the like don’t matter if you and your employees can’t even access the internet.

Without a strong foundation, your business floor will drop out from beneath you. Commerce, trade, and services for your organization will come to a screeching halt without a strong foundation. Though integrating a strong network can be costly, it is the most important investment you will make to keep your business moving forward.

Ensuring a Strong Foundation

There are several key components to developing and maintaining a strong IT foundation in the modern office. Those include the following:

  • Make sure your firewall(s), switches, and wireless access points are current, up-to-date, and are running the latest firmware.
  • The hardware needs to be current as well. Is it still being supported and warrantied by the manufacturer?
  • Can your network handle your current business needs and still allow room for growth?

For everything you do or that your employees do, your foundation is key. By ensuring that you have the major components from your firewalls to switches and wireless access points in order, you can keep your business moving forward smoothly at all times. If you need assistance with building or bettering your business foundation, contact ORAM online or call us today at (617) 933-5060.

Filed Under: Blog Tagged With: access points, access the internet, Adjustable Content Filtering, antimalware, antivirus, automated business processes, business, business data, business needs, business networks, business system, cell phones, Cisco Meraki, Cloud, cloud-based, cloud-based systems, commerce, communications, computer, computer network, configuring, connectivity, controls, crippling downtimes, customers, data, Deep Packet Inspection, Default Now Traffic Filtering, defense, destroyed, destructive problems, device, devices, email, employees, ethernet traffic, firewall, firmware, gateway, growth, hacked, hacker, hardware, industry regulations, infiltrate, information, infrastructure, internet, Internet technology, investment, invoicing, IT experts, laptops, large buildings, limited spam filtering, link, logs, management, managing network traffic, manufacturer, modern office network, modern offices, money, monitoring, monitors, network, network security, network switches, no gaps, Oram, Oram Corporate Advisors, ORAM online, Packet Filtering, patched, printers, protect your company, protecting valuable company data, protective benefits, ransom, risks, secure wireless network, security, security rules, security settings, services, smaller networks, smart firewalls, smart switches, software program, Stateful Inspection, stolen, Strong IT, Strong IT Foundation, switches, systems, systems fail, The Modern Office, trade, traffic, virtual local area network, VLAN, vulnerabilities, wall, warrantied, wireless access points, wireless guest access, wireless local area networks, WLAN

The Modern Office and Security: What you need to know about protecting your business and its data

April 16, 2019 by securewebsite

One of the most critical components of the modern office environment for a healthy, scalable business infrastructure is security. It is the cornerstone of your IT for it protects the other components that your company needs to keep thriving and surviving in the modern marketplace. Today’s business security entails much more than just an anti-virus program and requires some pre-planning as well as a regular investment of time.

This blog covers the most important things every business should know about security. Additionally, it includes what business leaders should consider to best protect their organization, data, and clientele. As you will see, having the right security in place can make the difference between growing your business and shutting its doors permanently.

Secured Access

Every business should have secured access in place for both internal and external users on its network. As a modern company, both internal and external users will be accessing your data whether its email or highly-sensitive information not meant for prying eyes. This is important because data falling into the wrong hands can cost your business its reputation, revenue, and even its livelihood.

According to the 2018 Data Breach Investigations Report by Verizon, 73 percent of breaches were perpetrated by outsiders. This means your business data needs to be protected as much as possible and that external access to your network should be limited and monitored at all times. Hackers are always looking for a way to infiltrate networks. Phishing, ransomware, and malware were among the top means used by nefarious outsiders to access business networks in 2018. Of those breaches studied, 90 percent were motivated by monetary gain or strategic advantage (i.e. business espionage).

While you may believe that your business is too small for anyone to care about hacking its data, think again. A report by USA Today shows 61 percent of cyberattacks are aimed at small and medium-sized businesses. The same piece reported that a whopping 60 percent of small businesses close their doors for good within six months of an attack so it’s clear why security is so imperative to business survival in our modern society.

Though most breaches occur due to external sources, insiders can be just as dangerous to your business. Whether due to simple user error or something more insidious such as a disgruntled employee or cyber espionage, the aforementioned Verizon report concluded that 28 percent of breaches involved internal actors. Of those breaches, 12 percent involved privilege misuse. That’s why we always recommend implementing the practice of least privilege. This means allowing access to data only to those who require it to fulfil their job duties.

Email Security

Email is the bread and butter of communication for most modern offices. The use of email for both internal and external communications is a necessity for today’s businesses so securing it effectively is imperative. The issue is that it is also a major point of entry for many attacks.

A blog by CSO from IDG shows that 92 percent of malware is delivered by email. In addition, the blog stated that the average ransomware attack (which often occurs via email) costs a company $5 million. The same blog also stated that phishing attacks is one of the most common methods of email malware infection.

There is email and network scanning software available to help protect your business. At ORAM Corporate Advisors, we recommend Mimecast for email protection. It is a terrific solution to help organizations prevent email-borne ransomware as well as protect against the associated downtime and data loss such attacks can cause. ORAM recommends Mimecast because it “safeguards employee communication and reduces risk with targeted protection, data leak prevention, and enforced security controls.”

Mimecast, which I mentioned above for email and network scanning, is also an excellent solution for data loss prevention. Its data loss prevention solution scans all emails and file attachments and identifies potential leaks using flexible polices based on keywords, file hashes, pattern matching, and dictionaries.

Another piece of modern technology you’ll want to have in place is multi-factor authentication. Multi-factor authentication is a security system that requires more than one method of authentication to verify a user’s identity. This can range from requiring passwords that must periodically be changed by legitimate users to requiring a one-time PIN provided via smartphone for access. It adds an extra step for employees to access your network but it will help ensure your business’ data security.

In addition to software, we also recommend that employee training become a regular event. Every business should offer employee training during the onboarding process and at regular intervals throughout the year (every six months) to every employee. They should be trained not to click on email attachments or to follow links in emails from unknown or untrusted sources. Employees should also be taught to verify emails with links and attachments with a trusted source before opening them if something comes into their email that they weren’t expecting. While this training can take some time, it can prevent a costly breach later on.

Manage Your Network

While securing access to your network is important, managing your network is even more imperative to keep business operations running smoothly. Your network houses your most critical data while supporting the daily workflow and processes of your business. That means maximizing uptime, optimizing network capacity and utilization, and ensuring its protection.

There are a great deal of pieces that comprise your network and all of them need to be addressed on an ongoing, regular basis. Start with a network technology assessment and auditing. This will tell you where your network is in terms of optimization and data security. By assessing where your network is now and taking a full audit, you will be able to tell where your strengths and weaknesses are to tweak it to work at full capacity for your business needs.

In addition to regular assessments and audits of your network, you will need to plan ahead for storage, disaster recovery, business continuity, and more. Here are some of the things that go into managing a business network:

  • Email Continuity
  • IT Asset Tracking and Reporting
  • High Availability Services
  • Cloud Solutions
  • Network Design, Implementation, and Support
  • Data Assessment, Analysis and Recovery
  • Security and Monitoring Services
  • Workflow Assessment and Optimization

Up-To-Date Security

Your business should also have up-to-date technology security in place. You will want to ensure that your company has installed intrusion prevention software on all of its data networks to keep hackers from getting their hands on your information. You can check to ensure you have such software in place during the audit process.

The intrusion prevention system we use at ORAM is Cisco hardware that scans on a network level. It scans everything going into and out of your network to ensure that your network traffic is safe. This could catch someone maliciously trying to access your internal network, bad email attachments, and other threats.

In addition, you will want to put together policies for your employees that protect your business. Ensure you have a solid computer use and data loss prevention policy in place so employees know exactly when and for what purposes they can use their company devices. Make it clear what sites they should not visit and what the repercussions are for visiting non-work related sites on business devices.

You’ll also want to have a password policy in place so employees are not using the same passwords for multiple accounts or old passwords that could leave them at risk of being hacked. Passwords also need to be strong so encourage your employees to develop passwords that use letters (both lowercase and capital), numerals, and special characters. There is even software available to prompt your employees to change or update their passwords over time. You may even offer your employees a password manager so they can easily recall their passwords.

Many enterprise businesses are also moving to the cloud. Not only does this allow for greater flexibility for your employees, but it can offer greater data security. When you save both to your local network and the cloud, you have your data backed up. This is ideal in the event of a disaster and will get your business up and running again with less downtime or the worry that valuable information can’t be recovered.

Don’t Forget Your Physical Security

Remember that all data is not digital. Whether you have data files stored in locked filing cabinets or your HR employees are printing personally identifiable information (PII) during tax season, the physical security of your business is just as important as its digital security. You don’t want someone walking out with printed files or sifting through your garbage to steal information.

ORAM recommends that all businesses have a clean desk policy. This means requiring that all employees keep their desk clear of papers, notes, and other information that could lead to a breach or loss of information if it were to fall into the wrong hands. When they are not as their desk, employees should have a clean desk since everything should be put away, hopefully under lock and key.

Businesses should also limit physical access to certain areas such as file storage areas, server rooms, and other places where information is stored. If an employee doesn’t require that access to do their job on a regular basis, they shouldn’t have access. Such areas should be locked with limited persons possessing keys for access. We also recommend adding video cameras at data rich entry points to protect against a physical breach. This small addition will let administrators know who accessed the area(s) and when they did so which will help in an investigation.

Finally, you’ll want to ensure that all data is properly disposed of. Shred all hard copies before tossing paper information and consider hiring a disposal company that handles this type of waste. Don’t leave such waste out on the curb for anyone to take. Ensure the company will come in to gather paper for disposal. In addition, make sure that valuable paper data isn’t thrown into the recycle bin but is shredded before being thrown out. When it comes to cyber espionage, dumpster diving isn’t unheard of.

Have a Plan

Every business should also have a written information security plan (WISP) in place. It should include everything from regular IT audits to employee training. There are many mistakes that businesses make when it comes to backup that are completely preventable. Your WISP will outline effective administrative, technical, and physical safeguards specific to your organization to help prevent such mistakes. It will also define security measures for your business, protect against anticipated security threats, and unauthorized access. The WISP for your business will put safeguards into place to protect your data. It will also help you and your employees know exactly what to do and who to contact if disaster strikes.

If you need help with securing your modern office or want more information about building stronger security for your business, contact ORAM today at (617) 933-5060. Our experts are always here to assist you in bettering your business and data security.

Filed Under: Blog Tagged With: 2018 Data Breach Investigations Report by Verizon, access business networks, access to data, accessing data, administrative safeguards, administrators, Anti-virus, assessing network, attacks, audit process, auditing, authentication, Backup Mistakes Businesses Make, bad email attachments, Blog, breach, breaches, building stronger security, business, business continuity, business data, business devices, business espionage, business information technology, business reputation, business security, business' data security, Cisco, clean desk policy, click on email attachments, Cloud, Cloud Solutions, communication, company devices, cost of ransomware attacks, costly breach, critical data, CSO, cyber espionage, cyberattacks, data, Data Analysis, Data Assessment, data files, data leak prevention, data loss, data loss prevention, data loss prevention policy, data loss prevention solution scans, data networks, data recovery, data rich entry points, data security, desk, dictionaries, digital security, disaster, disaster recovery, disgruntled employee, disposal companies, downtime, dumpster diving, email, email continuity, email protection, email scanning, email security, Employee training, employees, enforced security controls, ensuring protection, enterprise, error, espionage, external access, external sources, external users, file attachments, file hashes, filing cabinets, flexible policies, full audit, greater data security, greater flexibility, hack, hackers, hardware, Have a plan, High Availability Services, highly-sensitive data, HR Employees, identifies potential leaks, IDG, infiltrate network, information, insiders, internal actors, internal network, internal users, intrusion prevention software, IT, IT Asset Tracking and Reporting, IT security, keys, keywords, letters, limit physical access, limited access, links, livelihood, local network, lock and key, loss of information, malware, malware infection, manage your network, maximizing uptime, medium-sized businesses, Mimecast, Mimecast email protection, modern business security, modern company, modern office, modern offices, modern society, modern technology, monetary gain, monitoring, moving to the cloud, multifactor authentication, multiple accounts, network, Network Design, Network Implementation, network level, network management, network monitoring, network scanning, Network Support, network traffic, non-work related sites, notes, numerals, old passwords, onboarding, opening email, optimizing network capacity, Oram, Oram Corporate Advisors, papers, password manager, password policy, passwords, pattern matching, Personal idenfication number, Personally Identifiable Information, phishing, phishing attacks, physical safeguards, physical security, PII, PIN, Plan, point of entry, policies, prevent a costly breach, printed files, printing, privilege misuse, process of business, protect data, protecting business data, Ransomware, ransomware attack, recycle bin, reduces risk, regular IT audits, repercussions, revenue, risk, safeguard, scalable business infrastructure, scan all emails, secured access, security, Security and Monitoring Services, security measures, security system, security threats, server rooms, shred hard copies, shredded, sifting through your garbage, Small business, smartphone, software, special characters, steal information, storage, storage areas, strategic advantage, strengths, strong passwords, targeted protection, tax season, technical safeguards, technology assessment, threats, trusted source, unauthorized access, unknown sources, untrusted sources, Up to date security, update, USA Today, utilization, valuable paper data, video cameras, weaknesses, WISP, Workflow, Workflow Assessment, Workflow Optimization, written information security plan

Budgeting for Technology in the New Year

January 24, 2019 by securewebsite

How to squeeze the most out of your IT and save your business money

With the New Year in full swing you’re probably preparing to implement your updated information technology (IT) plan. As a business owner or leader, you probably have many questions such as, “How much should my business budget?” You may also be wondering if you’re making the most of the IT you already have in place. In this blog, we break down what every business should be budgeting at the very least as well steps for ensuring your business has the technology it needs and that your network is as secure as possible.

Cloud Computing
If your business has not yet migrated to the cloud for your email and other services, now is the time to do so. There are several reasons it is best for businesses to move to the cloud. From saving money to better data security, cloud computing offers a ton of benefits to modern businesses.

To begin, establishing and maintaining your own data storage is expensive. Not only do you need to purchase the right hardware and software, but you have to hire people to install it and set it up. Cloud computing allows you to pay for just the services you use and can reduce your IT costs. It is so affordable that is was estimated in research by McAfee that nearly one-third of worldwide enterprises would be using software-as-a-service (SaaS) by the end of 2018. Cloud providers typically charge based on the features you choose, storage used, and number of users. Most also charge for time and memory space. This means you get to select the package that best suits your IT budget.

Cloud computing also allows you both flexibility and scalability. Cloud computing lets your employees work from anywhere they have internet access through virtualization. Giving employees the option to work remotely means you can cut the number of workspaces at the office further reducing your costs. In addition, scaling Cloud computing services is a cinch. You don’t have to spend a ton of money on new servers, storage, and licenses as your business grows. With the cloud, you just sign up for additional storage space or features as your business needs them.

If you store your own data, a breach or disaster such as a fire could devastate your business’s valuable information. With the cloud, your data will always be available as long as users have internet access. Many businesses use the cloud specifically for backup and disaster recovery for this very reason.

Data security is also a top priority in this day and age of hacks, breaches, and ransomware. Email is the lifeblood of most businesses to ensuring it is secure should be a top priority. Storing data and using email on the cloud is often more secure than storing it or hosting on physical servers and data centers in your office. Laptops and desktops can be stolen as can other hardware. Data on the cloud can be deleted remotely or moved to a different account and hackers face a greater challenge in breaching cloud platforms so your data is simply more secure. As a matter of fact, 85 percent of enterprises keep sensitive data in the cloud according to Vormetric.

Finally, cloud computing is one of the most effective ways to promote collaboration and it gives you a wide variety of service options to choose from. Your employees will be able to easily share data, collaborate on projects, and provide updates in real time from the field. Time wasted on repetitive tasks such as data entry are no longer an issue and you get to choose the services your business really needs whether it is abundant storage or software from a wide range of providers.

Leveraging Your Existing IT
Hardware and software can be hugely expensive investments for many businesses. Your business needs to get the most out of every bit of IT it has invested in. For example, you may already be using Office 365 for email but is your business using it for file sharing or collaboration between teams? A network assessment and IT audit can tell you where you have room for improvement, opportunities for growth, and options for cost savings.

A study by Bank of America in 2017 revealed small business owners found the greatest barrier to achieving a balance between work and their personal life involved administrative tasks. Perhaps you have software that can help you automate administrative tasks to help your business free up time. For example, Intuit’s QuickBooks Self-Employed software has an expense management system built right into it. An independent IT auditor can show you how to best use what you already have to meet your organization’s needs without spending more money unnecessarily.

Hardware Replacement
Most businesses cannot afford to replace their desktops and laptops all at once. This is especially true when the average lifespan of a desktop today is between three and five years according to a piece by Chron, an online news source.

“Of course, this number is just a generalization and a number of factors play into lifespan, ranging from the computer’s quality, care, and room for upgrades,” according to the blog, “What is the Life Span of the Average PC?” “For small business owners, every new computer is an expense and an investment, one whose worth over time largely depends on how you use it and care for it.”

Laptops are also a typical expense for most businesses. According to a blog by TechGuided, the lifespan of a laptop will depend on the quality of the product you purchase, how often it is used, and how it is maintained. “A mid-range laptop should probably last around four to five years, though, give or take a year or two depending on how you use it,” advises the piece.

To make such updating of your IT more affordable, we recommend making replacements in quarterly cycles rather than all at once. Your IT personnel or your IT auditor can make recommendations as to which hardware needs to be replaced immediately, which can hold off for a few months, and which pieces still have a good life ahead of them. Based on these recommendations, you can schedule a plan for cycling out old hardware each quarter on a regular basis. This serves to level out your IT spending rather than investing a ton of money all at once.

According to an article by Business.org, businesses should “expect to pay between $400 for a basic model with limited storage space to $3,500 for a top of the line desktop with a large hard drive. Desktops also range in price based on operating system as well. For example, models that run Windows may be less expensive than Apple models. Apple desktops vary in cost from $1,500-$3,500, depending on which features you need.”

The same piece also stated that laptops “range from $300 for the most basic models to $3,000 for high-speed models with large storage capacity. Similar to desktops, laptops also vary in cost depending on which operating system you prefer. Apple laptops tend to fall towards the middle of the price scale, ranging in cost from $1,000 to $2,500. Laptops that run Windows have a wider price range, and cost depends mostly on features and brand.”

The Latest Software
In addition to hardware, businesses will also need to consider the software they are using. When you purchase software, it is licensed to your business and may have an end date to your user agreement. Additionally, software changes over time and there may be upgrades that could benefit your company or even new software that is better than what you have.

This is where the IT audit can once again assist your business with saving money. Your IT auditor can evaluate your existing needs versus the software you have in place. They can determine if you have the latest software or if the software you have simply needs to be patched or updated. A real IT expert can educate you about software to help you achieve your business goals while saving you money. Based on their recommendations, you can choose to either use what you already have or purchase better software to save your business money over the long term.

Email Security
As we mentioned before, email is as critical to business continuity as breathing is to life. That means you need to have quality security for your email. Software such as Microsoft Office 365 and other programs can scan for threats, identify phishing attempts, and filter spam. Programs such as Mimecast offer many of the same advantages and can also aid employees when it comes to identifying websites as safe or unsafe to visit based on URL reputation. Anti-virus, anti-spam, and firewall software are also good to include in your IT plan.

The cost of software will vary by brand and product. For example, a one-year subscription to Office 365 Unlimited Professional is just $99.00 online. That cost covers up to five desktops, five tablets, and five mobile devices such as smartphones. There are also monthly subscriptions to Office 365 Business for as little as $8.25 a month. What you spend will ultimately depend on what software you purchase or subscribe to, how many devices you need to cover, and for what length of time.

Technology Awareness Program
All of the hardware and software in the world won’t protect your business if your employees are not technology savvy. Any IT expert will tell you that regularly-scheduled, ongoing employee education is the cornerstone of securing your business data. This is something that every business should budget for because it’s your employees that can make or break your business.

The cost of security awareness and end-user training will, again, vary from business to business. This is because most companies that handle Technology Awareness Training programs, such as Oram Corporate Advisors, base their rate on how many people are being trained, how in depth the training will be, and how frequently you host trainings. Ideally though, businesses should train every new employee as part of their onboarding process with all-staff training every six months to keep employees updated on the latest threats and how to avoid or combat them. This investment in training will pay off in dividends as each employee becomes more aware of the threats they face and their role in protecting your business.

At the end of the day, how much your business should budget for technology this year will depend on a variety of factors from how you store your data to what hardware and software you have as well as your business goals. If you would like more information about IT asset management, network assessments and IT auditing, or other IT support services, please contact Oram at (617) 933-5060 or visit us online. We can even schedule a free technology assessment to get your business started off on the right foot in 2019.

Filed Under: Blog Tagged With: 2019, anti-spam, Anti-virus, Apple, breach, breaches, Budgeting for Business IT, Budgeting for Information Technology, Budgeting for IT, business, business data, business information, business IT, business leader, business owner, business savings, business technology, business to business, Chron, cloud computing, cloud platforms, collaboration, cost of desktops, cost of laptops, data, data centers, data disaster, data recovery, data security, data storage, desktops, email, email security, Employee training, file sharing, filter spam, firewall, flexible, free technology assessment, hack, hackers, hardware, information, Information technology, internet, internet access, IT, IT Audit, IT auditor, IT awareness training, IT personnel, IT training, laptops, lifespan, malware, McAfee, Microsoft, Microsoft Office 365, Mimecast, mobile devices, modern busness, network, New Year, Office 365, operating system, Oram, Oram Corporate Advisors, patches, phishing, phishing attempts, project collaboration, proprietary data, providers, Ransomware, ream collaboration, replacements, SaaS, save money, scalable, servers, share data, smart phones, software, software as a service, spam, storage space, tablets, technology, technology assessment, Technology Awareness Training, technology lifespan, technology replacements, updates, virtualization, viruses, Vormetric, websites, Windows

Password managers: What you need to know about generating and securing passwords that work

October 26, 2018 by securewebsite

Password Managers

By Ryan O’Ramsay Barrett

Being in IT, we hear about it all of the time. A client calls us in distress because they used the same password on multiple websites, social media platforms, and their email and now they’ve been hacked. The bad guys have access to several of their digital platforms, if not all of them, and things are a mess. The worst part is, the entire scenario could have been easily avoided.

One of the simplest and most commonly recommended cybersecurity practices promoted by experts to prevent problems like the one above is for people to use a password manager. Some are free and others cost a small annual fee but all of them are highly recommended over not using one at all.

What is a Password Manager?
A password manager is a type of software that assists in generating and retrieving complex passwords with the goal of improving your cybersecurity. One of the greatest issues is that most people either use the same password on multiple accounts or their passwords as just too simple. Using the same password for multiple sites can increase the risk that you will be hacked or that your business will experience a data breach. Overly simple passwords also make people more susceptible to being victimized by cyber criminals who would love to get their hands into our bank accounts, business data, and personally identifiable information (PII).

Consider a password manager as a vault of sorts, able to store multiple passwords in an encrypted database or produce them on demand. This means you don’t have to reuse the same password for various accounts, memorize them yourself, or write them down.

Regardless of how many passwords you have or how complex they may be, a password manager can keep track of them for you. Additionally, when you need a stronger password for a new account or to better secure an existing one, a password manager can generate a new, complex password for you.

Security Benefits
According to MyGlue, more than 60 percent of all data breaches are the result of weak or stolen passwords. By using more complex passwords that feature uppercase and lowercase letters, numerals, and special symbols, that are unique to each of your accounts, you are protecting vital online information from credit card numbers to the answers to your security questions. Not only is this important in your personal life but it is imperative to your business as well. Password managers help by generating unique, complex passwords that will not be easily guessed by bad actors.

Another sobering statistic is that more than 30 percent of employees keep track of passwords by writing them on Post-it Notes, according to MyGlue. This is not a secure or suggested form of storing passwords. With a password manager, you only have to remember a single master password to access your “vault” with all of your passwords in one place.

Business efficiency is also improved with the use of a solid password manager because employees won’t have to waste time resetting passwords or searching for that sticky note that disappeared. There will also be a reduction in requests to IT for password resets.

Password managers can also simplify shopping. Payment information can be stored in your password manager so that it’s all at your fingertips when you are ready to shop online.

Risks of Password Managers
I know what you’re thinking. If a hacker gets access to your master password, that would allow them access to all of your accounts. Bad actors have also been known to breach the central vault of password managers. The good news is that there are defenses available to address both of these concerns.

First, any password manager worth its weight is going to employ multifactor authentication. This means that when you, or someone else, attempts to access your “vault” of passwords, you will be sent a text or email with an authentication code to log in. If someone were to steal your master code, you would find out via a text message or email. No one can access your credentials without having both the correct password and the right authentication code. This gives you time to change your master password and notify your password manager should a problem arise.

Vendors usually protect master vaults as well by encrypting your password information locally. That information is encrypted and stored, on servers operated by the vendors who, in most cases, employ some of the best cybersecurity measures available. Some of the free password managers don’t offer the same higher level of security that paid password managers do. Be sure to do your research before signing up with a company or touch base with us at Oram so we can recommend one that works best for your needs.

The Cost of Better Security
There are a multitude of password managers available. Some offer free versions but when it comes to the security of your business, remember that you often get what you pay for. With that in mind, at Oram we recommend paying for a password manager as many don’t cost much.

Most password managers offer some sort of free trial period and range from $12 per year to upwards of $50 a month. The cost may depend on the number of devices or users the program is being employed for.

What Oram Recommends
There are so many password managers available that it can be hard to choose one. Some offer features such as photo login options (a form of multifactor authentication), phone support, and use across a wide variety of operating systems. The two that we recommend to our clients are MyGlue and LastPass.

We highly recommend MyGlue because it offers so many options for a low price. First, as a business owner, you will know who accesses what password and when. MyGlue is easy to use, functions well with multiple operating systems and allows you to share training material with your team for the program so no one is lost. Finally, you can avoid hackers by using strong passwords that are secure, keeping your business information such as the PII of employees and clients and your proprietary data safe. MyGlue also employs the highest security measures available.

If MyGlue doesn’t fit your needs, LastPass is the next best option. LastPass works on iOS, Android, Windows, Mac, and Linux operating systems. It offers a variety of subscription options from a single user to families, teams, and enterprises and all are quite affordable. With LastPass, you can simplify online shopping, store digital records, and share passwords and notes with others securely in addition to storing and generating passwords.

If you have lingering questions or concerns about the use of password managers, please call Oram today at (617) 933-5060 or visit us online. Our team is happy to help you select and engage a password manager that meets all of your business needs.

Filed Under: Blog Tagged With: authentication code, bad actors, bank accounts, breach, business cybersecurity, business data, complex passwords, credentials, credit card numbers, cybercriminals, cybersecurity, cybersecurity practices, data breach, digital platforms, email, encrypted, encrypted database, free trial, hack, hacker, hackers, IT, LastPass, mutlifactor authentication, MyGlue, online, online shopping, operating systems, Oram, password management programs, password manager, Password Managers, Personally Identifiable Information, phone support, PII, resetting passwords, securing passwords, security, security benefits, social media platforms, software, stolen passwords, text, websites

  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

© ORAM Corporate Advisors 2019. All rights reserved | Policy & Privacy