Firewalls

Perimeter and device firewalls

This week, we turn our attention to the subject of firewalls, both at the perimeter and on your local computer.

Perimeter

A perimeter firewall serves as the first line of defence in network security. Acting as a gatekeeper between internal networks and external threats. It scrutinises incoming and outgoing traffic based on predetermined security rules, blocking unauthorised access while allowing legitimate communication. By monitoring for malicious activities, it prevents attacks such as intrusions, hacking, and data breaches. Implementing a robust perimeter firewall is crucial for safeguarding sensitive data and maintaining the integrity of IT infrastructure, making it an indispensable tool for businesses in the digital age. Its strategic placement on the network edge ensures a secure perimeter, fortifying an organisation’s cyber defences.

Modern perimeter firewalls will also be able to run add on software. To provide a range of additional features. Whilst for many with cloud based email, having anti-spam module enabled is probably a waste of time. Utilising the anti-virus module is always a good idea to try and prevent a virus right at the gateway.

Device firewall

It is important to have a firewall enabled on any device, even if your device is sat behind a perimeter firewall! This is to make sure that it is on if you take your device out and about

Read more

Advanced End Point Security

Advanced End Point Security

Whilst all out packages include Anti-Virus. We are the first to admit Anti-Virus alone is not enough anymore, and will never ever keep you completely safe.

We supplement the Anti-Virus with some advanced end point (Computer) tools.

The first security measure is to make sure you aren’t an administrator on your computer.  Most people when creating their account will select the account to be an administrator account.  This in the main is not needed, and without the administrator permissions, then it is slightly harder for bad actors to do things with your computer.

Secondly we use a tool, that locks down the computer, and the software installed.  Most applications have a wide range of permissions and can do stuff it just doesn’t need to be able to do.  This is then used to make sure any compromise is fully utilised. Bad actors will do this, by making sure they can always access your network (persistence), as well as spread through the network searching for your data.

By locking everything down this should ensure your physical device is safe, and whilst all this means there are a few steps to go through if you want to install something new. The delay is normally less than 10 minutes, we firmly believe this is well worth waiting for. Achieving a safe cyber secure environment.

Of course the biggest issue for most businesses is a compromise of cloud accounts. And so we monitor the log in for unusual behaviour, like:

  • logging in from somewhere you aren’t
  • multiple logins from different locations. 
  • Multiple unsuccessful logins

This along with measures taken to help the computer user, should help keep you safe. But to make sure we also back it up (more to come in few weeks’ time).

For more info give us a call to arrange a complimentry Cyber Security Check

Read more

Is Wi-Fi 7 worth the investment?

Is Wi-Fi 7 worth the investment?

You know that staying ahead of the technology curve is vital for all businesses in a highly competitive marketplace. One innovation launched earlier this year is Wi-Fi 7, the next generation of wireless connection.

But what exactly does it offer, and is it worth the investment for your business?

  • Lightning-fast speeds: No more buffering and lagging. Wi-Fi 7 brings blazing-fast speeds to keep your business running smoothly.
  • Rock-solid connections: Forget all about dropped calls or lost connections. Wi-Fi 7 ensures reliable performance, even in busy environments.
  • Futureproofing: Wi-Fi 7 is built to handle the demands of tomorrow’s tech. It’s future-proofing your business’s internet.

Now, here’s the million-dollar question: Should you upgrade to Wi-Fi 7? Well, it depends. While Wi-Fi 7 offers some awesome benefits, it can be a bit pricey to upgrade.

The initial investment includes the expense of next-gen routers capable of supporting Wi-Fi 7, which can range from hundreds up to thousands. And there may also be ongoing operational costs, especially if you’re leasing routers from internet service providers.

If you’re not ready to dive into Wi-Fi 7 just yet, that’s ok. There are plenty of other ways to improve your business’s existing Wi-Fi. From optimising your current set-up to adding extenders or mesh networks, there are options to fit every budget.

We’re all about making sure you find the perfect tech solutions for your business to keep you and your team happy. If you’d like to go through your options, get in touch.

Read more

Patch management

Patch Management

A lot of the time when systems are compromised in a Cyber Security Attack, it is because something that should have been updated hadn’t been! Patch Management.

So, this week we have a look at the various updates that need to be considered. Is your IT support company doing all of this!

Firstly, we will start with the Operating System.

No matter what flavour of system you are using they all need updating, this should include everything from your server, through to your mobile phone. Although manufacturers will rave about the improvements in updates, the biggest reason we think you should install these updates as soon as you can is that they patch critical security holes.

It is also worth bearing in mind that some of these may not be selected to be installed by default. Or your IT support provider may not automatically install them. On operating system updates one of the biggest things, we see is people not restarting their computer.  These updates if they require a restart, are not fully installed until the restart has happened.

Applications

Almost all applications have updates, and a good practice is to make sure these are up to date as well. Especially your web browser, a lot of attacks happen through web browsers this includes a method that bypasses MFA (2FA) So make sure you are updating all of your applications.

If you no longer need an application, then the best thing to do is to uninstall it

Lastly, something you probably have never considered is a piece of software that you won’t normally ever see.

FIRMWARE.

Firmware is software on many devices that control how the hardware operates, these should also be updated. You will find these not only on computers, and servers but switches wifi access points, telephones, printers – The list goes on, and on. You or your IT supplier should make sure these are kept up to date. They are available from the manufacturer, and the systems to keep these up to date have improved over the years. But some are still difficult to know when updates are available.

Whilst looking at the Firmware please remember that when a manufacturer stops updating the firmware this is normally because the device has reached end of life. And even if it is working properly, you should consider changing it,

If you want to make sure you are covered, please get in touch.

Read more

Cyber attacks: Stronger, faster and more sophisticated

A new security report has revealed some alarming trends. 

First off, cyber attacks are becoming faster than ever. Breakout times (that’s the time it takes for a criminal to move within your network after first getting in) have dropped significantly. We're talking an average of just 62 minutes compared to 84 minutes last year. 

This is not good news.

Not only are these attacks faster, but they're also becoming more common. The report has identified a whopping 34 new cyber criminal groups, bringing the total to over 230 groups tracked by the company. 

And guess what? These cyber criminals aren't sitting around twiddling their thumbs. They're getting smarter and more sophisticated. The report highlights a new record breakout time of just two minutes and seven seconds. That's barely enough time to grab a coffee, let alone mount a defence.

But here's the real kicker: The human factor is increasingly becoming the main entry point for these cyber attacks. 

They will try to get your people to click a link in a phishing email, which will take them to a fake login page. Once your employee enters their real login details, they have inadvertently handed them over.

Or they pretend to be someone your team trusts. This is called social engineering.

So, what can you do to protect your business from these cyber threats? 

•	Educate your employees
Make sure your team is aware of the latest cyber threats and how to spot them. Regular training sessions can go a long way in preventing costly mistakes.

•	Implement strong password policies
Encourage the use of complex random passwords generated and remembered by password managers. Use multi-factor authentication for an added layer of security (this is where you use a second device to confirm it’s really you logging in).

•	Keep your systems updated
Make sure all software and systems are up to date with the latest security patches. Cyber criminals often exploit known vulnerabilities, so staying current is key.

•	Invest in cyber security software
Consider investing in reputable cyber security software that can help detect and mitigate threats in real-time (we can help with this).

•	Back-up your data
Regularly back-up your data and store it in a secure location. In the event of a cyber attack, having backups can help minimise downtime and data loss.

When it comes to cyber security, it's better to be safe than sorry. If we can help you to stay better prepared, get in touch.

A new security report has revealed some alarming trends.

First off, cyber attacks are becoming faster than ever. Breakout times (that’s the time it takes for a criminal to move within your network after first getting in) have dropped significantly. We’re talking an average of just 62 minutes compared to 84 minutes last year.

This is not good news.

Not only are these attacks faster, but they’re also becoming more common. The report has identified a whopping 34 new cyber criminal groups, bringing the total to over 230 groups tracked by the company.

And guess what? These cyber criminals aren’t sitting around twiddling their thumbs. They’re getting smarter and more sophisticated. The report highlights a new record breakout time of just two minutes and seven seconds. That’s barely enough time to grab a coffee, let alone mount a defence.

But here’s the real kicker: The human factor is increasingly becoming the main entry point for these cyber attacks.

They will try to get your people to click a link in a phishing email, which will take them to a fake login page. Once your employee enters their real login details, they have inadvertently handed them over.

Or they pretend to be someone your team trusts. This is called social engineering.

So, what can you do to protect your business from these cyber threats?

  • Educate your employees

Make sure your team is aware of the latest cyber threats and how to spot them. Regular training sessions can go a long way in preventing costly mistakes.

  • Implement strong password policies

Encourage the use of complex random passwords generated and remembered by password managers. Use multi-factor authentication for an added layer of security (this is where you use a second device to confirm it’s really you logging in).

  • Keep your systems updated

Make sure all software and systems are up to date with the latest security patches. Cyber criminals often exploit known vulnerabilities, so staying current is key.

  • Invest in cyber security software

Consider investing in reputable cyber security software that can help detect and mitigate threats in real-time (we can help with this).

  • Back-up your data

Regularly back-up your data and store it in a secure location. In the event of a cyber attack, having backups can help minimise downtime and data loss.

When it comes to cyber security, it’s better to be safe than sorry. If we can help you to stay better prepared, get in touch.

Read more

Why IT needs to be monitored and managed

Why IT needs to be monitored and managed

Why does IT need to be Monitored?

To put it simply what isn’t measured (monitored), can’t be improved!

So we monitor a whole range of things. Some are basic physical items, such as storage space used.  We do this so if the drive is full we can run a script and try and free up some space to keep it working at it’s best. Other items may just raise an alert so we can track the history, like high temperature alert.

Other items we measure, is looking for cyber Security issues. This is just basic items, this supplements the security measures we also recommend (coming in a future post)

We monitor the software, as well, this is partly to make sure nothing is installed that shouldn’t be, but also what is installed is fully up to date.  Similar to our process for updating Windows itself.

If it is monitored it can be managed.

As mentioned above the items we can monitor can then also  be managed. The whole idea around this isn’t to monitor what the user is doing! But to ensure that the computer is always running as well as it can, and to make sure the computer is also cyber secure.

But it doesn’t stop with computers. We can also monitor and manage Network equipment to ensure that this is also running well, and securely.

What does this mean for your Business

Aside from knowing your employees are working on devices running as they should and securely. It also means they are able to work efficiently. And it also means that you can make decisions on when to update/upgrade equipment based on facts and not on a feeling.

You might want to look at our IT Support or IT Services Pages

In summary, IT monitoring and management are not optional; they are critical for business continuity, security, and growth. Organisations that prioritise these practices can harness the full potential of their IT infrastructure, drive innovation, and stay ahead in a rapidly evolving digital landscape.

Read more

Why we do Security packages and not support

Why we do Security packages and not support

For the last 2 years, we have been working on moving from providing support to providing security. We no long just sale support!

Why!

Since I started Limbtec way back in 2002, what we did and how we did it was far different to today. About 50% of our work was support including installing, and configuring, and about 50% from sales of hardware and software.

Our business model has changed over time, most recently to providing support mainly via remote means. And this being around 80% of our business model, with the remaining being cloud services.

Security

A little over 2 years ago, I sat down and looked at whats next! And the continual biggest issue facing our customer base was Cyber Security, and Cyber Hygene. There is a saying, that if you haven’t had a cyber security breech, then you either don’t know about it, or you are about to!

What needed to change.

The biggest problem is up to this point we were looking at what could be done to help businesses grow. And use technology to achieve that. What the whole of the IT industry seemed to have done is forgotten about making sure this was done in a secure manner! A security first approach.

Methodology

I am not a great fan of reinventing the wheel! And in the UK, there is a certifcation scheme called Cyber Essentials. So we used this framework to build out 3 tiers to achieve Cyber Essentials Standards. Even if Cyber Essentials Certification is not taken up! Our clients should be secure, due to massively improved Cyber Hygene.

Monitoring

So the biggest issue with Cyber Essentials is that it is done on a snap shot. At that point you have a good cyber hygene, but there is no requirement to monitor this. This is where our packages come in, we will monitor the items required, and we budle extra measures in to the mix (depending on package) to strengthen your security.

We haven’t forgotten Support

We started as a support company! And as the biggest growing support requests are around Cyber Security, we are facing these head on, but haven’t forgotten about other support issues, we bundle support into all packages at various levels.

Over the coming weeks, On a wednesday I will be blogging details of what we thing is important to consider, with your business and cyber security. If you want to have a free review please contact us

Read more

Addressing the Dangers of Browser Extensions

Addressing the Dangers of Browser Extensions

How many browser extensions have you downloaded? Do you know the Dangers of these Browser Extensions?

People download browser extensions as common as they us mobile apps. Once downloaded they tend to not use them? There are over 176,000 browser extensions available on Google Chrome alone. These extensions offer users extra functionalities and customisation options.

Today we look at this and the risks to online security and privacy.

The Allure and Perils of Browser Extensions

Browser extensions are often hailed for their convenience and versatility. They can be a wonderful addition to the browser, and we use them to help use the systems we use every day. But the ease with which users can install these extensions is a weakness. Because it also introduces inherent security risks.
Next, we’ll delve into the hazards associated with browser extensions. It is imperative to strike a balance between the benefits and dangers.

What are the Key Risks Posed by Browser Extensions

Phishing and Social Engineering

Some malicious extensions engage in phishing attacks. As well as social engineering tactics. These attacks can trick users into divulging sensitive information.
This can include creating fake login pages or mimicking popular websites. These tactics lead unsuspecting users to unknowingly provide data. Sensitive data, like usernames, passwords, or other confidential details.

Malicious Intent

There are many extensions developed with genuine intentions. But some extensions harbor malicious code. This code can exploit users for financial gain or other malicious purposes. These rogue extensions may inject unwanted ads. As well as track user activities or even deliver malware.
These extensions often use deceptive practices. They make it challenging for users to distinguish between legitimate and malicious software.

Privacy Intrusions

Many browser extensions request broad permissions. If abused, they can compromise user privacy. Some of these include accessing browsing history and monitoring keystrokes. Certain extensions may overstep their intended functionality. This can lead to the unauthorized collection of sensitive information.
Users often grant permissions without thoroughly reviewing them. This causes them to unintentionally expose personal data to potential misuse.

Outdated or Abandoned Extensions

Extensions that are no longer maintained or updated pose a significant security risk. Outdated extensions may have unresolved vulnerabilities. Hackers can exploit them to gain access to a user’s browser. As well as potentially compromising their entire system. Without regular updates and security patches, these extensions become a liability.

Browser Performance Impact

Certain extensions can significantly impact browser performance. This can happen due to being poorly coded or laden with unnecessary features. This results in a subpar user experience. It can also lead to system slowdowns, crashes, or freezing. An extension’s perceived benefits may attract users. But they end up unwittingly sacrificing performance.

Mitigating the Risks: Best Practices for Browser Extension Security

1. Stick to Official Marketplaces

Download extensions only from official browser marketplaces. Such as those connected with the browser developer (Google, Microsoft, etc.). These platforms have stringent security measures in place. This reduces the likelihood of encountering malicious software.

2. Review Permissions Carefully

Before installing any extension, carefully review the permissions it requests. Be cautious if an extension seeks access to unusual data. Such as data that seems unrelated to its core functionality. Limit permissions to only what is essential for the extension’s intended purpose.

3. Keep Extensions Updated

Regularly update your browser extensions. This ensures you have the latest security patches. Developers release updates to address vulnerabilities and enhance security. If an extension is no longer receiving updates, consider finding an alternative.

4. Limit the Number of Extensions

It’s tempting to install several extensions for various functionalities. But each added extension increases the potential attack surface. Only install extensions that are genuinely needed. Regularly review and uninstall those that are no longer in use.

5. Use Security Software

Use reputable antivirus and anti-malware software. This adds an extra layer of protection against malicious extensions. These tools can detect and remove threats that may bypass browser security.

6. Educate Yourself

Stay informed about the potential risks associated with browser extensions. Understand the permissions you grant. Be aware of the types of threats that can arise from malicious software. Education is a powerful tool in mitigating security risks.

7. Report Suspicious Extensions

If you encounter a suspicious extension, report it. You should report it to the official browser extension marketplace and your IT team. This proactive step helps browser developers take prompt action. That action protects users from potential threats.

8. Regularly Audit Your Extensions

Conduct regular audits of the extensions installed on your browser. Remove any that are unnecessary or pose potential security risks. Maintain a lean and secure browsing environment. This is a key aspect of online security.

Contact Us for Help with Online Cybersecurity

Browser extensions are just one way you or your employees can put a network at risk. Online security is multi-layered. It includes protections from phishing, endpoint threats, and more.
Don’t stay in the dark about your defenses. We can assess your cybersecurity measures and provide proactive steps for better protection.
Give us a call today to schedule a chat.

Read more

Gamers Beware!Hackers are Targeting You.       

Gamers haven’t really been the focus of cybersecurity for a long time. You mostly hear about attacks on businesses. Or stolen personal data due to phishing attacks. But gamers are not safe from hackers targeting them.

As cyberattacks continue to escalate, gamers have become prime hacking targets. Malicious actors seek to exploit vulnerabilities in the digital realm. The gaming industry continues to expand. Also, more users immerse themselves in virtual worlds. As this happens, the risks associated with cyberattacks on gamers are on the rise.

Cyberattacks on young gamers increased by 57% in 2022.

Younger gamers playing games like Minecraft, Roblox, and Fortnite are particularly at risk. They’re also often playing on their parents’ devices. Data that holds the interest of hackers fills these devices.

Next, we’ll delve into the reasons behind the increasing threat landscape. As well as discuss ways for gamers to safeguard themselves against potential threats.

The Gaming Boom and Cybersecurity Concerns

The exponential growth of the gaming industry has brought entertainment to millions. But it has also attracted the attention of cybercriminals looking for lucrative opportunities.

According to an MSN article, cyberattacks on gaming platforms are becoming more prevalent. Hackers are deploying sophisticated techniques to compromise user accounts. As well as stealing sensitive information and disrupting online gaming experiences.

Stolen Credentials and In-Game Items

What’s one of the primary motivations behind these cyberattacks? It’s the prospect of acquiring valuable in-game items. As well as the account’s credentials. Virtual goods, such as rare skins, weapons, or characters, hold real-world value. Hackers exploit weak passwords and security loopholes. This allows them to gain unauthorized access to user accounts. Once they do, they pilfer these coveted items for illicit gains.

Ransom Attacks on Gaming Accounts

Ransom attacks have become increasingly prevalent in the gaming world. In these instances, cybercriminals gain control of a user’s account. They then demand a ransom for its release. Hackers often demand the ransom in untraceable cryptocurrency. Gamers may follow the hacker’s demands. As they do not want to lose a meticulously curated game profile. As well as their progress and achievements.

Disruption of Online Gaming Services

Beyond individual attacks, hackers are now targeting gaming platforms. Their intent is to disrupt online services. They launch DDoS (Distributed Denial of Service) attacks to overwhelm servers. This renders them inaccessible to legitimate users.

This frustrates gamers. But can also have severe financial repercussions for gaming companies. They must grapple with the costs of mitigating these attacks. As well as the potential revenue losses.

Understanding the Motivations of Cybercriminals

Effectively combating the rising tide of cyber threats in gaming takes knowledge. It’s crucial to understand the motivations driving these attacks. Virtual economies within games have created a lucrative market for cybercriminals. Additionally, the anonymity of the gaming community makes gamers attractive targets.

Safeguarding Your Gaming Experience: Tips for Gamers

The cyberattack risks are escalating. Gamers must take proactive steps to protect themselves from potential cyber threats. Parents also need to watch out for younger gamers.

Here are some essential tips to enhance gaming cybersecurity.

Strengthen Your Passwords

What’s one of the simplest yet most effective ways to secure your gaming accounts? It is using strong, unique passwords. Avoid using easily guessable passwords. Incorporate a mix of letters, numbers, and special characters. Regularly updating your passwords adds an extra layer of security.

Enable Multi-factor Authentication (MFA)

Multi-factor Authentication is a powerful tool that adds significantly to security.  MFA users verify their identity through a secondary method. Such as a code sent to their mobile device. Enabling 2FA greatly reduces the risk of unauthorized access. Even if a hacker has compromised your password.

Stay Informed and Vigilant

Be aware of the latest cybersecurity threats targeting the gaming community. Stay informed about potential risks. As well as new hacking techniques and security best practices. Additionally, be vigilant when clicking on links or downloading files. Keep your guard up when interacting with unknown users within gaming platforms.

Keep Software and Antivirus Programs Updated

Regularly update your gaming platform, antivirus software, and operating system. This will patch vulnerabilities and protect against known exploits. Cybersecurity is an ongoing process. Staying up to date is crucial in thwarting potential attacks.

Use a Virtual Private Network (VPN)

Consider using a Virtual Private Network (VPN) to encrypt your internet connection. This enhances your privacy. It also adds an extra layer of protection against potential DDoS attacks. As well as other malicious activities.

Need Help with Home Cybersecurity?

The gaming landscape continues to flourish. This emphasizes the need for heightened cybersecurity awareness. Many types of home devices need protection. We can help.

Don’t leave your personal or business data at risk. We can help you with affordable options for home cybersecurity. Give us a call today to schedule a chat.Article used with permission from The Technology Press.

Read more

Should you make a ransomware payment!

Should you make a ransomware payment!

Should you make a ransomware Payment?
Your business gets hit by a ransomware attack, and your valuable data is locked away by cyber criminals demanding a huge ransom fee.

You can’t afford to pay it. But there’s a twist – just like those “buy now, pay later” schemes, some ransomware gangs are offering victims payment extension options.

Recent research reveals that ransomware groups are getting creative with their extortion strategies. One group is even offering victims various choices when it comes to their ransom demands. These “choices” include:

Paying to delay the publication of their stolen data, with a standard fee of $10,000… or paying to have their stolen data deleted before it’s made public.

The exact amounts charged are often negotiated with victims, adding a chilling dimension to the whole ordeal.

To increase the pressure on victims, these ransomware groups have added some terrifying features to their web sites. These include countdown timers displaying how much time businesses have before their data is released, view counters, and even tags revealing the victim’s identity and description.

It’s all designed to make victims feel cornered and more likely to give in to the demands.

You might be tempted to pay that ransom to protect your business data. Paying is always a bad idea and here’s why…

Paying doesn’t guarantee that you’ll get your data back or that the cyber criminals won’t demand more money later.

By paying, you’re essentially funding criminal activities, encouraging them to continue their attacks on others.

Paying a ransom might even get you into legal trouble, as some governments have made it illegal to pay cyber criminals.

So, what can you do to safeguard your business from falling victim to ransomware?

  • Ensure you have regular, secure backups of your data. This way, you won’t be at the mercy of cyber criminals.
  • Educate your staff about the risks of ransomware and train them to recognise phishing emails and suspicious links.
  • Invest in robust cyber security software and keep it up to date.
  • Keep your systems and software updated with the latest security patches.
  • Segment your network to limit the spread of ransomware if one device gets infected.
  • Develop a clear incident response plan, so you know exactly what to do if you’re ever hit by a ransomware attack.

Paying cyber criminals rarely makes things better, and we’re seeing businesses that do pay become targets time and time again. Instead, invest in the proactive measures above to help you stay secure. And if we can help you with that, get in touch.

Read more