I.T., Blog Deidre Frith I.T., Blog Deidre Frith

PROTECT YOURSELF FROM ZERO-DAY ATTACKS

If you have been watching the news lately, then the term 'Zero-Day' probably has surfaced a time or two. So, what exactly is this type of attack and how does RealTime protect your business from them?

zero-day-attack.png

If you have been watching the news lately, then the term 'Zero-Day' probably has surfaced a time or two. So, what exactly is this type of attack and how does RealTime protect your business from them?

ZERO-DAY ATTACKS EXPLAINED

Zero-day attacks affect anyone indiscriminately, but most of the damage is suffered by businesses that are not prepared to face such a cyber threat.  And, it's extremely difficult to detect zero-day attacks, especially with traditional cyber defenses.

Traditional security measures focus on malware signatures and URL reputation. However, with zero-day attacks, this information is unknown. Cyber attackers are extraordinarily skilled, and their malware can go undetected on systems for months, and even years, giving them plenty of time to cause irreparable harm.

A ZERO-DAY ATTACK TIMELINE

A Zero-Day attack happens when that flaw (software/hardware vulnerability) is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability—hence “zero-day.” Here's a quick timeline to explain the process: 

  • A company’s developers create software that unknowingly contains a vulnerability.
  • The threat actor* spots that vulnerability either before the developer does or acts on it before the developer has a chance to fix it.
  • The attacker writes and implements exploit code while the vulnerability is still open and available.
  • After releasing the exploit, either the public recognizes it in the form of identity or information theft or the developer catches it and creates a patch to staunch the cyber-bleeding.

Once a patch is written and used, the exploit is no longer called a zero-day exploit. These attacks are rarely discovered right away and that is why it's important to ensure that your business is protected. 

zero-day-2.png

HOW IS MY BUSINESS PROTECTED?

How does RealTime protect your business and what are some best practices to keep you safe?

  • Install Firewalls with advanced security features - this is your first line of defense. 
  • Protect yourself with antivirus and antimalware that protects against known and unknown threats. 
  • Keep software applications and operating systems up-to-date.
  • Create and keep backups in the event something can't be "cleaned".  This is basically your safety net in case the worst happens. 
  • Use an Email protection service that filters out junk and spam before it gets to you.
  • Practice safe computing practices such as being mindful on what links you click and what websites you are visiting. The 'Human Firewall' is the single biggest factor of whether or not you will get infected. 

Want more information?

fill-out the form below and we will follow-up with you shortly.

 

*A threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security. In threat intelligence, actors are generally categorized as external, internal or partner. - Wikipedia 

Read More
Blog Deidre Frith Blog Deidre Frith

Top 10 Gift Ideas for Techy Friends/Family

The holidays are here and RealTime has complied a gift list for the Techy's in your life! Here are the top 10 gift ideas as suggested by the RealTime team...these include everything from gift cards to GPS fishing gear! 

The holidays are here and RealTime has compiled a gift list for the Techy's in your life! Here are the top 10 gift ideas as suggested by the RealTime team...

 

10. Steam gift card $20+

Our NOC Support Technician, Anna, suggests a Steam gift card. Steam is a gaming community for multiplayer gaming, video streaming and social networking services. Steam Gift Cards work just like gift certificates, which can be redeemed on Steam for the purchase of games, software, hardware, and any other item you can purchase on Steam. Visit https://steamcommunity.com for more information.

 

9. USB Desktop Aquarium - Mini Fish Tank with Running Water $37.79+

Who doesn't need an aquarium on their desk? Josh, our Service Desk Manager, likes the idea of stress-reducing fish in the workplace...especially ones in a tank run by USB. We found this one on Amazon but I'm sure you can find them other places as well. 

 

8. Netflix Gift Card $25+

David, our Account Manager, suggests a gift card to Netflix for those scared to purchase real tech stuff. Gift them Netflix movies & TV shows online or streaming right to their smart TV, game console, PC, Mac, mobile, tablet and more. It's not possible to buy an actual subscription for others, but if you have an Amazon account, you can buy gift cards online, which can be used as prepaid Netflix subscriptions. Find more information here

Netflix Gift .jpg

 

7. Apple Watch series 3 with cellular $399+

Our CEO, Elaine, can't live without her Apple Watch and she suggests giving the latest series 3 with cellular. This watch lets you leave your phone behind. Answer a call from your surfboard. Ask Siri to send a message. Stream your favorite songs on your run. Now you have the freedom to go with just your watch. https://www.apple.com/apple-watch-series-3/

Apple Watch Series 1 .jpg

 

6. WD Passport External Hard drive 1 TB $58+

McSwain, RealTime Service Desk Tech, suggests every household needs a good external hard drive with at least 1 TB. Equipped with WD Backup software so you can automatically back up photos, videos, music and documents. Set it to your schedule. Just pick the time and frequency. Built-in 256-bit AES hardware encryption with WD Security software helps keep your content private and safe. Find it on Amazon. 

 

5. Minn Kota i Pilot GPS Trolling System $2100+

RealTime Service Desk Tech, Jason, combines his love of fishing with his tech side. This trolling system lets you use GPS to lock onto fishing spots, record and retrace paths, command speed and steering, and set cruise control. The wireless remote features an LCD screen. Build your own now on their website https://www.minnkotamotors.com/Trolling-Motors/Freshwater-Bow-Mount/New-Ulterra/

 

4. Beats Studio Wireless headphones $349.95

Our Controller, Stacey, says wireless Beats are on the top of her sons list. Beats and Apple are changing the way you listen to music with the Apple W1 chip in Beats Studio3 Wireless headphones. Incorporating the efficient W1 chip brings seamless setup and switching for your Apple devices,* up to 22 hours of battery life for all-day fully-featured playback with Pure ANC on, and Fast Fuel technology for 3 hours of play with a 10-minute charge. Take calls, skip songs, control your volume and activate Siri using the convenient multi-function on-ear controls. https://www.beatsbydre.com/headphones/studio3-wireless

 

3. August Smart Lock, 3rd gen technology - Silver, Works with Alexa $149

If your Tech friend is creating a smart home, then a front door lock is at the top of their list. Our Systems Engineer suggests the August Smart Lock that allows you to lock and unlock your door with your phone. Give keyless entry to family, friends or even the dog walker. Its compact design easily attaches to your existing deadbolt so you can still use your keys. We found this one on Amazon. 

 

2. Wi-Fi Mesh System $228.99+

Get better wifi at home. If you are like our VP of Information Technology, Todd, then you have more connected devices than that wireless router you bought a few years ago can handle and still maintain performance. PC Magazine did a review of Wi-Fi mesh systems for 2017 https://www.pcmag.com/roundup/350795/the-best-wi-fi-mesh-network-systems and Todd ended up buying the NetGear Orbi AC3000 (RBK50) because the devices connected to the remote unit get much better speed than all but the top rated system. This one got more expensive just in the past couple of weeks as it's very popular. Google has a more price effective one, but it didn't rate as well.

Google Wirless Access Point.png

 

1. Ring Video Doorbell $179+

Chad, RealTime President, loves the Ring Video Doorbell. It works on every home - with or without a doorbell. Quick and easy self-install. You get instant alerts when visitors press your Doorbell or trigger the built-in motion sensors. Then use the free Ring app to see, hear and speak to guests from your smartphone, tablet or PC. Motion-activated alerts, base model has 720HD video and two-way talk with noise cancellation. Four different models available https://shop.ring.com/collections/video-doorbells

Ring Video Doorbell .jpg
Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Protect yourself on Cyber Monday

If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.

If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.

  • Use a clean machine – make sure all your software, apps, and virus protections are up to date before starting your online purchases. This helps keep malware from stealing your account information.
  • Watch out for phishing emails claiming unauthorized account activity or the need to verify details. Always contact the financial institution directly.
  • Another phishing attempt may come in phony ads and offers that appear to be from companies you already shop with. A few letters off in the address bar can lead to Identity Theft. Be extra careful when clicking links in emails. When in doubt contact the company directly to verify the deal.
  • Only enter your personal info into websites that begin with https://. This indicates the site offers a secure connection for the transfer of sensitive information.
  • If you find an incredible deal on a new website – do some research and check reviews before shopping with the site.
  • Only give the information needed to complete the transaction, the required fields.
  • Don’t make purchases or login into financial and other sensitive accounts over public Wi-Fi Hotspots.
  • Use two-factor authentication on your accounts – Remember to Lock Down Your Login.
*Ref: Call For Action
Read More
Social Media, Blog, I.T. Deidre Frith Social Media, Blog, I.T. Deidre Frith

RealTime team creates Ransomware awareness

This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware. 

RealTime educating the general public on Ransomware during the 2017 Foster Fest in downtown Dothan, AL. 

This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware. Watch this brief video showing some of our RealTime team in action. If you have a question about how Ransomware can affect your business, email us at info@realtime-it.com or call (334) 678-1417. 

*Also, don't forget to follow us on Facebook! Look at what you're missing... 

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Hurricane Preparedness Checklist

As Hurricane Irma makes its way towards Florida and the Southeast U.S., now is the time to take action and be prepared to protect your computers, printers, files and data.

As Hurricane Irma makes its way towards Florida and the Southeast U.S., now is the time to take action and be prepared to protect your computers, printers, files and data.

1. ENSURE YOU HAVE A BACKUP

  • Don't wait until the day before a hurricane to backup your files! It's good practice to frequently backup your data files. We recommend a hybrid-cloud image-based backup that can be used to restore data and applications even if your server is destroyed, and that can restore data from different points in time.
  • Print a copy of your important/emergency contacts and take them with you if you do not have access to them from your phone or computer, you'll have them available to use via a landline.
  • RealTime Clients: Everyone who is on our Business Continuity Service – Your servers are backed up and replicated offsite daily. If there is a problem, we correct that as part of the service. As hurricanes approach your physical location, we’ll be talking with you and confirm things are backed up and replicated prior to you shutting your operations down as part of your storm prep.

2. SECURE YOUR EQUIPMENT

  • COMPUTERS
    • Shutdown the operating system.
    • If connected to a surge protector or UPS - unplug from the wall outlet (or unplug power cables from the surge protector or UPS if wall outlet isn't accessible).
    • Unplug Ethernet cable from the back of computer or docking station.
  • PRINTERS
    • Power off the printer.
    • If connected to a surge protector - unplug as described above.
    • Unplug the Ethernet cable from the back of the printer.
    • Unplug the phone cable from the back of the printer (if a fax line is connected).
  • SERVERS AND NETWORK EQUIPMENT
    • Perform a normal shutdown of the servers. RealTime clients: Please coordinate with RealTime service desk. 
    • Unplug all connections - Take photos to document how things were prior to the event. 
    • Firewalls, Switches, Access Points - unplug them from power. Unplug the firewall from the internet connection as well. Ideally, unplug all the network connections (surges can travel through the network cabling).
    • Battery backups - power these off and then unplug them.
    • Phone systems - Check with your vendor to see what steps you can take to protect it.
       

3. PROTECT FROM WATER/WIND

When a major storm is predicted, elevate your CPUs, printers, servers, and other network devices, as well as other electrical appliances like space heaters, off of the floor.  For high winds, move computers away from windows.  If there is a possibility of water leakage, cover computer equipment with plastic.

4. CONTINUING OPERATIONS AFTER THE STORM

 

  • If you are in the path, power and internet connectivity may be hard to come by for a few days. Generators can provide enough power to run your critical computer equipment – just be sure you are connecting up to something that can deal w/ the power fluctuations many generators have. Please ask RealTime before connecting things up to generators as they can damage sensitive equipment. Modern battery backups may have the capability to condition the power off of a generator – check with the manufacturer to confirm before trying this.
  • 4G USB modems or Mifi can get you connected in an emergency. Everything you do may not work, but basic web browsing.
  • Forward your phones – If the office is expected to be out a few days, most phone service providers have a way for you to forward calls to your business to a cell phone or alternate number. Get the steps now, before you need them.

5. BE PREPARED

Knowing what steps to take ahead of time will help you be prepared in the worst-case scenario. RealTime is committed to ensuring our clients are prepared with the proper technology to meet their current/future needs as well as advising them about safeguarding their business from weather-related, cyber and other disasters. 

If you would like further information about RealTime managing Information Technology for your business, contact us at info@realtime-it.com.

 

 

 

 

Read More