Category Archives: Cyber Security

Managing Backups

Managing Backups of Your Data

VICTOR IS A SYSTEMS ENGINEER AT THE AME GROUP, MANAGING BACKUPS FOR OUR CLIENTS AND OUR OWN!  WE ASKED HIM, WHAT IS IMPORTANT TO KNOW ABOUT BACKUPS AND RECOVERY? Backups are something everyone wishes they had when technology goes south. Like the insurance policy, you didn’t size right or bother to purchase. The need for backups AND reliable data recovery is becoming the number one priority for many businesses, and it should be. Even hard drive companies are starting to build data recovery services into their warranties and obviously at

MSPAlliance Member Logo

The AME Group Becomes Member of MSPAlliance®

The AME Group joins vibrant global consortium of cloud, managed service providers and technology enabling vendors. October 3, 2020 — The AME Group announced that it has become a member of the oldest managed services group. MSPAlliance is the oldest Managed Services group and the only Accrediting and Standards based body created specifically for the Managed Services Industry. With thousands of members worldwide, the MSPAlliance is a very powerful and influential global network of IT professionals. MSPAlliance works in a collaborative effort with service providers, technology enabling vendors, governmental bodies

security

Security and Disaster Recovery: What You Need to Know

Outsourcing IT is a wise business choice, especially for the small business owner. But make the wrong choice and you just ramped up the security threat to your network. A lot of small business owners choose their outsourcing based on price alone, which can be a critical error. Network security threats are unlike physical security threats. There are literally threats around every corner in the cyber world. You have groups that are dedicated to hacking into networks and causing chaos as a pastime. Data security management for business has to

Think Before You Click

National Cybersecurity Awareness Month To reduce your risk of falling for a phishing scam, Think Before You Click! Start to look at emails from a new perspective Look at the email address Even if it is from a name you recognize, Think Before You Click! <somelongname8825@gmail.com> – Most business emails do not come from a GMAIL account – be suspicious. <info@amazonn.com> – Perhaps there is a spelling error that can easily be overlooked if rushing – be suspicious. TIP – on a phone email app, you don’t always see the

Suit of armor guarding entrance

Who is guarding the gatekeepers?

This is a timeless concept from roman times, passed down in popular culture, and can be applied to your business information systems security plan. Companies of even modest size and complexity rely on some form of IT to support their computer systems and data. Although, most companies trust their IT department or Managed Services Provider to include security as a baseline component of their work, how do you verify your IT security is dong what you THINK it is doing? A Risk Assessment is a valuable tool. Trust but verify.

Why You Need to Outsource Your IT Department

Many business owners overlook the importance of their IT department. However, implementation of technology solutions for business is essential to help a business’s overall wellbeing and growth. A high-quality outsourced IT department can help with network security problems, provide you with a trained staff and be cost-effective. Access to a Qualified and Experienced Staff While there are many businesses who may overlook IT altogether, there are others who spend a lot of time training their IT professionals. Worse yet, they may even hire inexperienced individuals to act as their IT

Credential reporting

WHAT TO DO WHEN YOUR CREDENTIALS ARE FOUND ON THE DARK WEB

Sites are hacked every day. Your Information IS for sale on the DarkWeb.  It travels quickly across the world and is viewed by thousands in a weeks’ time[1].    Once on the internet, whether on the surface internet (what we know of as the internet) or on the deep/dark web, you cannot erase it.  Many evil things happen on the dark web, it’s not just about stolen credentials.  Drugs are sold; people are sold; counterfeit money is sold; access to your server is sold.   Your stolen PII / PHI can be

Getting Ready for New CMMC Requirements Now

CMMC: You Might Not Realize the Impact on Your Business

Cybersecurity Maturity Model Certification (CMMC) The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector.  Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement.  Standardization in security compliance is a win for businesses trying to juggle multiple requirements. Impact of

Welcome to another episode of Ask the Security Expert!

We have more questions for Joe about the security concerns of working from home.  To start with, how many AME employees are working from home, and what types of adjustments have you made from a technical/cybersecurity perspective?   We have almost 200 AME employees working from home.  Sixteen offices have a staff person present to receive shipments.  AME was well-positioned with laptops and secure connectivity to all of our applications (including our phone system) we need to provide 90% of our services remotely.  Our staff is fortunate to have home

How to Cause a Data Breach in 10 Easy Steps!

STEP 1: Make sure to click on every link, and download every attachment sent to you via email. On mobile, feel free to trust links sent to you in random text messages. STEP 2: Disable antivirus and other security apps on every device, especially your work computer. STEP 3: Ignore security policies. They’re more like suggestions than hard guidelines anyway. STEP 4: Plug in that random USB flash drive you found. It could have some good information on it! STEP 5: Feel free to download sensitive information to a personal