Zach Bedard, Author at JIG Technologies https://jigtechnologies.com/author/zach/ Better. Happier. Peace of mind. Tue, 11 Jun 2024 10:42:27 +0000 en-CA hourly 1 https://wordpress.org/?v=6.7.1 https://jigtechnologies.com/wp-content/uploads/2021/04/JIG-Emblem32x32.png Zach Bedard, Author at JIG Technologies https://jigtechnologies.com/author/zach/ 32 32 Microsoft 365 Security Best Practices: Protecting Your Organization https://jigtechnologies.com/microsoft-365-security-best-practices-protecting-your-organization/ Tue, 07 May 2024 20:21:37 +0000 https://jigtechnologies.com/?p=59987 When it comes to running a business, security should always be a top priority. In today’s world, cybersecurity threats are becoming more sophisticated and frequent. This makes it crucial for companies to take the necessary steps to protect their data.…

The post Microsoft 365 Security Best Practices: Protecting Your Organization appeared first on JIG Technologies.

]]>
When it comes to running a business, security should always be a top priority.

In today’s world, cybersecurity threats are becoming more sophisticated and frequent. This makes it crucial for companies to take the necessary steps to protect their data. Microsoft 365 is a powerful suite of tools that can help you manage your business, but it’s important to understand how to use it securely. In this article, we’ll explore some of the best practices for Microsoft 365 security that you can implement to protect your organization.

One of the most important steps you can take to secure your Microsoft 365 environment is to establish strong authentication and access controls. This includes enabling multi-factor authentication (MFA), which requires users to provide two or more forms of identification before they can access your data. You can also use conditional access policies to control who can access your data and from where. By implementing these controls, you can reduce the risk of unauthorized access to your data and applications.

Another critical aspect of Microsoft 365 security is protecting against threats and managing compliance.

Microsoft 365 provides a range of built-in security features, such as anti-phishing protection and advanced threat analytics. You can also use Microsoft Cloud App Security to monitor and control access to your cloud applications. Additionally, you should regularly review your security and compliance settings to ensure that they are up-to-date and in line with your organization’s policies.

Establishing Strong Authentication and Access Controls

One of the most important aspects of securing your Microsoft 365 environment is establishing strong authentication and access controls.

This means ensuring that only authorized individuals have access to your organization’s data and resources.

In this section, we will discuss some best practices for implementing strong authentication and access controls in your Microsoft 365 environment.

Implementing Multi-Factor Authentication

Multi-factor authentication (MFA) is a security feature that requires users to provide two or more forms of authentication before they can access their accounts. This helps to prevent unauthorized access to your organization’s data and resources, even if a user’s password is compromised. You can enable MFA for all users in your organization using Azure Active Directory (AAD), which is included with Microsoft 365.

Utilizing Conditional Access Policies

Conditional Access policies allow you to define conditions that must be met before a user can access a resource. For example, you can require that users access certain resources only from specific locations or devices. You can also require that users provide additional authentication if they are accessing sensitive data or resources.

By utilizing Conditional Access policies, you can ensure that your organization’s data and resources are protected from unauthorized access.

Managing Administrator Accounts

Administrator accounts have access to all of your organization’s data and resources, so it is important to ensure that they are properly secured.

You should use the principle of least privilege when granting administrative access, which means that administrators should only have access to the resources that they need to do their jobs.

You should also ensure that administrative accounts are protected with strong passwords and that MFA is enabled for all administrative accounts.

Protecting Against Threats and Managing Compliance

When it comes to Microsoft 365 security best practices, protecting against threats and managing compliance should be a top priority. Here are some steps you can take to ensure your organization’s data is secure:

Securing Email and Communication

Email is a common vector for cyberattacks, so securing it is crucial.

Exchange Online Protection (EOP) provides basic protection against malware and phishing, but to further secure your email and communication, consider using advanced threat protection tools like Microsoft Defender for Office 365. This tool can help protect against zero-day attacks and other advanced threats.

Using Advanced Threat Protection Tools

Advanced threat protection tools like Microsoft Defender for Office 365 can help protect against malware, phishing, and other advanced threats. These tools use machine learning and artificial intelligence to detect and respond to threats in real time, helping to keep your organization’s data safe.

Implementing Data Loss Prevention Strategies

Data loss prevention (DLP) is an important part of any security strategy. By implementing DLP policies, you can help prevent sensitive data from being shared or leaked outside of your organization. DLP policies can also help ensure compliance with regulatory requirements and information security best practices.

Ensuring Compliance and Data Governance

Compliance and data governance are critical aspects of any security strategy. By ensuring compliance with regulatory requirements and implementing data governance policies, you can help protect your organization’s data and ensure that it is being used appropriately.

This includes implementing content encryption and other privacy measures to protect sensitive data.

Frequently Asked Questions

How can I implement multi-factor authentication for enhanced Microsoft 365 security?

Multi-factor authentication (MFA) is a security feature that requires users to provide two or more forms of authentication before accessing their Microsoft 365 accounts. This can include a password, a fingerprint scan, or a security token. To enable MFA for your organization, you can use either Security Defaults or Conditional Access.

To set up Security Defaults, go to the Azure Active Directory admin center in Microsoft 365, and select “Properties” from the left-hand menu.
Under “Manage Security Defaults”, turn on the toggle switch. This will enable MFA for all users in your organization.

To set up Conditional Access, go to the Azure Active Directory admin center, and select “Conditional Access” from the left-hand menu. From there, you can create policies that require MFA based on specific conditions, such as location or device.

What steps should I take to secure data within Microsoft 365 against external threats?

To secure data within Microsoft 365 against external threats, you should implement a range of security measures. These include:

  • Enabling Azure Active Directory Identity Protection to detect and prevent identity-based attacks.
  • Configuring email authentication records in DNS for all custom email domains in Microsoft 365 (SPF, DKIM, and DMARC).
  • Enabling Microsoft Defender for Office 365 to protect against phishing and malware attacks.
  • Implementing Data Loss Prevention policies to prevent sensitive information from being shared outside your organization.
  • Enabling Advanced Threat Protection to protect against advanced threats such as zero-day attacks and ransomware.

How do I configure Microsoft 365 security settings for optimal protection?

To configure Microsoft 365 security settings for optimal protection, you should follow these best practices:

  • Enable Security Defaults or create Conditional Access policies to enforce MFA.
  • Enable Microsoft Defender for Office 365 to protect against phishing and malware attacks.
  • Implement Data Loss Prevention policies to prevent sensitive information from being shared outside your organization.
  • Use Azure Active Directory Identity Protection to detect and prevent identity-based attacks.
  • Enforce strong password policies and require regular password changes.
  • Regularly review and update user access and permissions.

What are the best practices for managing user access and permissions in Microsoft 365?

To manage user access and permissions in Microsoft 365, you should follow these best practices:

  • Use least privilege access, which means granting users only the permissions they need to do their jobs.
  • Implement role-based access control (RBAC) to assign roles and permissions to users based on their job responsibilities.
  • Use Azure Active Directory Privileged Identity Management to manage and monitor privileged access.
  • Regularly review and update user access and permissions.

How can I use Microsoft 365 security and compliance tools to monitor my organization’s data?

Microsoft 365 offers a range of security and compliance tools that you can use to monitor your organization’s data. These include:

  • Microsoft Cloud App Security, which provides visibility and control over cloud applications used in your organization.
  • Microsoft Defender for Identity, which detects and investigates identity-based attacks.
  • Microsoft 365 Defender, which provides end-to-end protection against advanced threats.
  • Microsoft 365 Compliance Center, which helps you manage compliance and data protection across Microsoft 365 services.

What should I include in a Microsoft 365 security best practices checklist?

A Microsoft 365 security best practices checklist should include the following:

  • Enable MFA for all users.
  • Configure email authentication records in DNS for all custom email domains in Microsoft 365.
  • Enable Microsoft Defender for Office 365.
  • Implement Data Loss Prevention policies.
  • Use Azure Active Directory Identity Protection.
  • Enforce strong password policies.
  • Regularly review and update user access and permissions.
  • Use Microsoft 365 security and compliance tools to monitor your organization’s data.

The post Microsoft 365 Security Best Practices: Protecting Your Organization appeared first on JIG Technologies.

]]>
Social Engineering Techniques Used in Phishing Emails: How to Recognize Them https://jigtechnologies.com/social-engineering-techniques-used-in-phishing-emails-how-to-recognize-them/ Tue, 07 May 2024 20:18:30 +0000 https://jigtechnologies.com/?p=59995 Social engineering is a technique that cybercriminals use to manipulate people into divulging sensitive information. One of the most common ways they do this is through phishing emails. Phishing emails are designed to look like they come from a legitimate…

The post Social Engineering Techniques Used in Phishing Emails: How to Recognize Them appeared first on JIG Technologies.

]]>
Social engineering is a technique that cybercriminals use to manipulate people into divulging sensitive information. One of the most common ways they do this is through phishing emails. Phishing emails are designed to look like they come from a legitimate source, such as a bank or social media site. They often contain a link or attachment that, when clicked, can install malware or direct the victim to a fake login page where they unwittingly give away their login credentials.

Understanding how social engineering techniques are used in phishing emails is crucial for protecting yourself from these types of attacks. Cybercriminals often use psychological tactics to trick people into clicking on a link or downloading an attachment. They may create a sense of urgency or use fear to make the victim act quickly without thinking. They may also use familiarity, such as pretending to be a friend or colleague, to gain the victim’s trust.

To prevent falling victim to phishing emails, it’s important to know what to look for. There are several preventive measures and best practices that you can follow, such as being cautious of unexpected emails, double-checking URLs, and keeping your software up to date. By staying vigilant and following best practices, you can help protect yourself from becoming a victim of social engineering and phishing attacks.

Key Takeaways

  • Social engineering is a technique used by cybercriminals to manipulate people into divulging sensitive information.
  • Phishing emails are a common way that cybercriminals use social engineering to trick people into clicking on a link or downloading an attachment.
  • To protect yourself from phishing emails, it’s important to stay vigilant and follow best practices, such as being cautious of unexpected emails, double-checking URLs, and keeping your software up to date.

Understanding Phishing and Social Engineering

Phishing is a type of social engineering attack that uses psychological manipulation to trick you into giving away sensitive information. Attackers often impersonate trusted entities such as banks, social media platforms, or government agencies to gain your trust and deceive you. In this section, we will explore the psychology behind phishing, common types of phishing attacks, and how to identify phishing emails.

The Psychology Behind Phishing

Phishing attacks exploit human behavior and cognitive biases to manipulate you into taking action. Attackers use tactics such as urgency, fear, curiosity, and authority to create a sense of urgency and make you act without thinking.

They may use social engineering tactics such as pretexting, baiting, or whaling to gain your trust and make you feel comfortable sharing sensitive information.

Common Types of Phishing Attacks

Phishing attacks come in many forms, including email, vishing (voice phishing), smishing (SMS phishing), spear phishing, and whaling. Email phishing is the most common type of phishing attack, where attackers send fraudulent emails that appear to come from legitimate sources.

Vishing and smishing attacks use phone calls and text messages to trick you into sharing sensitive information. Spear phishing and whaling attacks are targeted phishing attacks that focus on specific individuals or organizations.

Identifying Phishing Emails

Identifying phishing emails can be challenging, but there are several red flags to watch out for. Phishing emails often contain urgent requests, grammatical errors, suspicious links or attachments, and mismatched URLs.

They may also use social engineering tactics such as creating a sense of urgency or fear to make you act quickly. Be wary of emails that ask you to provide sensitive information or login credentials, especially if they come from unknown or suspicious sources.

Preventive Measures and Best Practices

Phishing attacks can be prevented by implementing various measures, including protecting personal and organizational data, training and awareness, and technological solutions and security protocols.

Protecting Personal and Organizational Data

Protecting personal and organizational data is crucial in preventing phishing attacks. One way to do this is by limiting publicly available information to reduce the chances of attackers acquiring contact information to launch phishing attacks or conduct personalized phishing scams. It is also essential to avoid sharing personal information online, especially on social media platforms.

Another way to protect personal and organizational data is by using strong passwords and avoiding the use of the same password across multiple accounts. You can also use password managers to generate and store complex passwords securely.

Training and Awareness

Training and awareness are essential in preventing phishing attacks. Employees should be trained on how to identify and avoid phishing emails and malicious code. Cybersecurity awareness training should also be conducted regularly to ensure that employees are up-to-date with the latest phishing tactics used by cybercriminals.

Technological Solutions and Security Protocols

Technological solutions and security protocols are also crucial in preventing phishing attacks. Implementing firewalls and antivirus software can help protect your network from phishing attacks. You can also use HTTPS to secure your website and prevent attackers from intercepting sensitive information.

It is also essential to have a robust structure in place for incident response in case of a phishing attack. This structure should include protocols for identifying and containing phishing attacks and procedures for reporting and responding to them.

Frequently Asked Questions

What are common indicators of a phishing email attempting to use social engineering?

Phishing emails often use social engineering tactics to trick individuals into clicking on a malicious link or downloading an attachment that contains malware. Common indicators of a phishing email include suspicious sender addresses, urgent or threatening language, requests for personal information, and generic greetings.

Be wary of emails that claim to be from a financial institution, government agency, or popular retailer, especially if they ask you to click on a link or download an attachment.

How can individuals and organizations protect themselves against social engineering in phishing?

Individuals and organizations can protect themselves against social engineering in phishing by being vigilant and following best practices. This includes using strong passwords, enabling two-factor authentication, updating software regularly, and avoiding clicking on links or downloading attachments from unknown sources.

Organizations can also provide cybersecurity training to employees to help them identify and report suspicious emails.

What are the psychological tactics often employed in phishing emails?

Phishing emails often use psychological tactics to manipulate individuals into taking action. These tactics include creating a sense of urgency, using fear or intimidation, appealing to curiosity or greed, and creating a false sense of trust.

By understanding these tactics, individuals can better identify and avoid falling victim to phishing attacks.

How do phishing emails manipulate trust to deceive victims?

Phishing emails often use social engineering tactics to create a false sense of trust. This can include using logos or branding from legitimate companies, creating fake social media profiles, or impersonating trusted individuals such as coworkers or family members.

By manipulating trust, phishing emails can deceive victims into clicking on a malicious link or downloading a malicious attachment.

What steps should be taken if you suspect you’ve received a phishing email?

If you suspect you’ve received a phishing email, do not click on any links or download any attachments. Instead, report the email to your IT department or delete it immediately.

If you have already clicked on a link or downloaded an attachment, run a malware scan on your computer and change any passwords that may have been compromised.

In what ways do phishing emails mimic legitimate communications to trick users?

Phishing emails often mimic legitimate communications by using logos, branding, and language that appears to be from a trusted source. This can include using a company’s official logo and branding, creating a fake login page that looks like a legitimate website, or using language that appears to be from a trusted individual such as a coworker or friend.

By mimicking legitimate communications, phishing emails can trick users into providing sensitive information or downloading malware.

The post Social Engineering Techniques Used in Phishing Emails: How to Recognize Them appeared first on JIG Technologies.

]]>
What Is A vCIO And Why Do You Need One? https://jigtechnologies.com/what-is-a-vcio-and-why-do-you-need-one/ Tue, 17 Oct 2023 04:09:05 +0000 https://jigtechnologies.com/what-is-a-vcio-and-why-do-you-need-one/ A Chief Information Officer (CIO) provides an invaluable service for your business. It’s their job to understand your organization completely and offer strategic IT planning, analysis, and overall IT management. They’re dedicated to finding ways to grow your business through…

The post What Is A vCIO And Why Do You Need One? appeared first on JIG Technologies.

]]>
A Chief Information Officer (CIO) provides an invaluable service for your business. It’s their job to understand your organization completely and offer strategic IT planning, analysis, and overall IT management.
They’re dedicated to finding ways to grow your business through new technology and technology-driven processes. By keeping an eye on both your business and the tech industry landscape, your CIO can make sure that you are getting the maximum benefit from all of your technology investments.
However, finding an experienced CIO that is willing to carry out executive-level duties on a small business salary is a near-impossible task. Many businesses can’t even afford to even try to hire someone to fill this position—but just because the resources aren’t there, it doesn’t mean that the need for CIO services isn’t there either.
It can be expensive to hire someone just to take care of their IT and strategy. Payscale estimates the current average salary for a CIO in the US is $324,176. Can you afford that?
More often than not, strategy is left to the leadership in general. It’s everyone’s responsibility to talk about it at meetings, but no one’s specific job. How can you reconcile these two issues: the need for a CIO, and the difficulty that comes with hiring and employing one? By outsourcing the job altogether…

Hire A vCIO From Our Team

A virtual Chief Information Officer (vCIO) is an experienced IT professional who has an in-depth understanding of business strategy and technology. Could your business benefit from strategic IT planning that aligns your technology strategy and spending with your overall business goals?
A vCIO handles your firm’s IT needs.
As the vCIO, they will advise you on everything from IT security to operations. Their job is to keep your technology running efficiently, and with an eye to the future. A vCIO will also help you cut IT operating costs, and confirm that your technology is running securely and that it enables your people to work efficiently each day.
Your vCIO will work closely with your business to make sure that you’re making the right technology investments. Our focus is not just on what is best for your business today, but what will benefit your business down the road.
Our vCIO services include:
  • Analysis of business practices and existing technology to understand how YOU use IT.
  • Understanding how your staff uses IT on a daily basis to help them improve productivity.
  • Guidance on strategic IT investments and overall budgeting.
  • Creation of a 3-year IT plan focused on adopting cost-effective technology to streamline business operations.
  • Planning for technology refreshes and strategies in the long-term to maximize IT’s impact on business operations.
  • Regular reviews of your IT plan to discover new solutions to improve productivity and streamline operations.
Truly effective strategy can’t come from the occasional meeting. It requires real focus and ongoing effort—investing in a vCIO that will do that for you today.

Your vCIO Is Part Of Our Comprehensive Managed IT Services Suite

While a vCIO is critical to long-term success with your IT environment, they only play a role in the overall approach we deliver. As the strategic leader, the vCIO focuses on high-level strategy and budgeting, ensuring that the organization’s technology aligns with its overall goals and objectives. By understanding your business’s needs and objectives, the vCIO can develop a technology roadmap that supports growth and innovation.
While the vCIO handles the strategic aspects, our engineers, support technicians, and managers are responsible for ensuring that daily IT tasks are handled efficiently. These professionals work together to maintain your organization’s IT infrastructure, troubleshoot technical issues, and provide timely support to your end-users. With our dedicated team of experts on your side, you can trust that your IT systems are running smoothly, minimizing downtime and maximizing productivity.
The collaboration between the vCIO and the technical team is essential for a successful managed IT services arrangement. The vCIO provides guidance and direction to the technical team, ensuring that their efforts are aligned with the organization’s strategic goals. Regular communication and coordination between the vCIO and the technical team help to bridge the gap between high-level strategy and day-to-day operations, resulting in a well-rounded and efficient IT environment.

We Will Be Your Expert IT Advisor

As your vCIO, we consult on every big decision that involves technology and answer all the other small questions along the way.
Proper planning not only helps you to avoid technological missteps that can often result in IT issues, but it also adds further value to your company as it develops. Having an experienced technology professional in your corner provides you and your organization with a key technology advisor
Get in touch with us to start strategizing your IT today.

The post What Is A vCIO And Why Do You Need One? appeared first on JIG Technologies.

]]>
Fear Machine Learning https://jigtechnologies.com/fear-machine-learning/ Thu, 11 Feb 2021 20:29:13 +0000 http://jigtechnologies.com/?p=1427 Advances in artificial intelligence (AI) have brought us to the point where systems are using a combination of algorithms, analysis, and experience to learn and program themselves without human intervention.   For instance: [bctt tweet=”38% of consumers believe that AI will…

The post Fear Machine Learning appeared first on JIG Technologies.

]]>
Advances in artificial intelligence (AI) have brought us to the point where systems are using a combination of algorithms, analysis, and experience to learn and program themselves without human intervention.

 

For instance:

  • [bctt tweet=”38% of consumers believe that AI will improve customer service;”]
  • AI is seen as the second biggest upcoming marketing trend;
  • And, according to Adobe, 47% of companies using advanced digital practices have a defined AI strategy.

The biggest indicator of the AI trend may come from Monster, which reports that the three most in-demand skills on the hiring platform are machine learningdeep learning, and natural language processing.

Machine Learning Trends Specific to IT

Managed IT services providers (MSPs) will be radically changed by AI skills like machine learning.

Services like business continuity and disaster recovery will be transformed by the adoption of this technology. After all, disaster – whether it be from a natural disaster, file corruption, or viruses and malware – can strike at strike at any moment.

Even your relationship with your MSP may change. Already, MSPs offer consulting services that can transform your business. Soon, those services will be further powered by these trends.

So, these trends are coming, but should you fear them? Continue reading to learn the answer.

 

 

The post Fear Machine Learning appeared first on JIG Technologies.

]]>
The Hidden IT Security Threats Right in Your Office Today https://jigtechnologies.com/the-hidden-it-security-threats-right-in-your-office-today/ Thu, 11 Feb 2021 17:11:02 +0000 http://jigtechnologies.com/?p=1588 There are a lot of reports in the news about IT security threats and the damage they have caused.  This has put a larger focus on implementing firewalls and anti-virus systems to prevent hackers from afar getting into our systems.…

The post The Hidden IT Security Threats Right in Your Office Today appeared first on JIG Technologies.

]]>

There are a lot of reports in the news about IT security threats and the damage they have caused.  This has put a larger focus on implementing firewalls and anti-virus systems to prevent hackers from afar getting into our systems.

With these more sensational attacks in focus, our attention is drawn away from threats that are near and impervious to the protection provided by software.

These threats are local outsiders, they are the people that walk into our workspaces, uninvited, unexpected and well-prepared to exploit vulnerabilities in plain sight. It doesn’t have to be a rogue employee or someone with legitimate access to our workspace. These are often individuals that use psychological manipulation to convince staff to perform actions or divulge confidential information.

This action is often referred to as Social Engineering.

These “bad guys” are adept at taking advantage of the weaknesses in our everyday behavior, actions that expose our systems and leave valuable clues behind.

Scary fact – we leave a lot.

Here are 14 ways we can help secure our workspace better.

  1. Lock our computer whenever stepping away from it. Even if it’s only for a minute. Get the lock screen enabled and up so nothing of any value is on display or accessible.
  2. Never, ever, put passwords or codes on Sticky notes to help remember. We make it easy for the bad guys to find private information that way.
  3. Invoices, cheques, and confidential documents cannot be left out in full view. Keep them in a file folder while working, then locked away when done. And don’t leave file drawers wide open, especially if they are usually locked. Don’t give the attacker the advantage of seeing what has been stashed away.
  4. Remember to pick up print jobs right away. Too often print jobs are sent but not retrieved, containing all sorts of private and confidential information.
  5. Shred it to forget it. Then recycle it. When corporate papers are put straight into the recycling/trash they are easy to gather information from
  6. Our phones will betray us. Most smartphones have notifications across the lock screen that reveal way too much. Changing setting to prevent these notifications or keeping the phone safe in hand will help stop this information from getting into the wrong hands.
  7. Keeps the keys to our kingdom secure and out of sight. They are an invitation to be used and copied otherwise.
  8. Unattended bags.  Just like in the movies. Someone will pick it up and walk away. It only takes a second to steal a laptop bag or a briefcase full of contract documents but the cost and damages incurred last far longer.
  9. Open doors. Attackers will “tailgate” and follow employees into companies because people by nature we will hold the door open. Even if it requires a passkey.  The attacker may have a series of stories and excuses at hand, ready to gain access and then make it past reception.
  10. Keep small devices secured and in hand.  USB keys and flash drives often hold sensitive data and need to be taken proper care of.
  11. Access cards should be secured.  Don’t leave them lying out in the open. These cards can easily be copied and attackers will be on the lookout for them
  12. Keep confidential information off of social media. Do not post selfies and pics of your new corporate card, lanyard, paystub, credit card etc. People do this all the time and there are specific sites attackers go to find these pictures. They can use these images to read the data and you know the rest.
  13. What did you leave up on the whiteboard? Once that important meeting is over, take a picture of the whiteboard then erase it. Otherwise, clean off anything that could be sensitive or used to gain access.
  14. Think twice, answer once. When someone you don’t know asks for a password, or business information that is not to be shared, don’t give it out. Unless you are the person directly authorized, you are not obligated to be polite or do a favour. However, you are obligated to help your company protect the data and reputation of its customers and employees. You can always ask someone else who knows before you agree to anything.

Stay vigilant! Because somebody is always watching.

The post The Hidden IT Security Threats Right in Your Office Today appeared first on JIG Technologies.

]]>
Why Antivirus Doesn’t Work and What to do About it https://jigtechnologies.com/why-antivirus-doesnt-work-and-what-to-do-about-it/ Thu, 11 Feb 2021 17:09:09 +0000 http://jigtechnologies.com/?p=1584 In a previous article, I talked about how cyber crime is continuing to get more sophisticated, and how the offenders are getting away with larger amounts. In this article, we’ll look at AntiVirus software why it’s not always effective and…

The post Why Antivirus Doesn’t Work and What to do About it appeared first on JIG Technologies.

]]>

In a previous article, I talked about how cyber crime is continuing to get more sophisticated, and how the offenders are getting away with larger amounts.

In this article, we’ll look at AntiVirus software why it’s not always effective and what can be done to overcome this ineffectiveness.

Antivirus software is designed to prevent, detect and remove malicious software.

The obvious solution to removing malware and viruses is to have an updated version of AntiVirus to catch and remove them.

AntiVirus works well for existing and known malware and virus’.  But these are not so effective against new viruses, also known as “Zero Day” viruses.

Depending on your version of antivirus, they can be from 0% to 65% effective.  So, if you have the best antivirus on the market, 35% of the Zero Day malware will go undetected.

To take a random example from this week. We were called to repair a WordPress website that had been hacked.

Here we found most of the files has been altered to have a piece of malware quietly infect computers visiting the site.  As shown below only 8 out of 55 AntiVirus systems recognized this as malware.

The missing offenders included some of the biggest names like Trend Micro and McAfee.

If AntiVirus is ineffective, then what can one do?

Fortunately, there are many tools on the market to combat these kinds of threats.

Unfortunately, they tend to be lesser known and often expensive solutions.

Let’s start with finding malware.

Since most AV systems work by trying to identify bad files or processes, detection needs to be rethought to be effective.  One way to do this is to analyze processes in memory and identify ALL of them instead of just some.

Identifying a process in the memory means that the file is actively running and using memory, therefore it presents a danger. An idle file cannot cause harm.

Secondly, one can not find a malicious process on its own. Trying to find a malicious process is like trying to find a needle in a haystack without knowing what a needle looks like.

This is why AntiVirus companies have such a hard time catching everything.

Every single process must be identified as:

  • Good (previously seen and known)
  • Bad (previously seen and known to be bad)
  • Unknown (not previously seen and need to be forensically investigated).

One such AntiVirus company that takes this approach is Cyfir.  Through this approach, they were able to detect a breach at the Office of Personnel Management in the US Government, that was previously undetected by multi-layered security systems

With a solution like this in place, you can rest assured systems and data will be much safer.

With that said, not all attacks involved malware.  Stay tuned on how to thwart further would-be attackers beyond using the traditional firewall systems and password security.

If your systems are only protected by AntiVirus, and there is concern about unknown processes running, perhaps it’s time to look into the next level such as JIG’s managed IT services to secure your most important data system?

The post Why Antivirus Doesn’t Work and What to do About it appeared first on JIG Technologies.

]]>
Custom Software vs Off The Shelf: The Pros & Cons https://jigtechnologies.com/custom-software-vs-off-the-shelf-the-pros-cons/ Thu, 11 Feb 2021 17:07:59 +0000 http://jigtechnologies.com/?p=1580 Should You Use an Off The Shelf Software Solution or a Custom One? You want to be competitive and grow your business. How you manage and process data are essential factors for reaching both objectives. That’s where software comes in. Choosing…

The post Custom Software vs Off The Shelf: The Pros & Cons appeared first on JIG Technologies.

]]>

Should You Use an Off The Shelf Software Solution or a Custom One?

You want to be competitive and grow your business. How you manage and process data are essential factors for reaching both objectives. That’s where software comes in.

Choosing the right software to integrate into your business can be a dizzying process. There are thousands of options out there, each one promising to deliver expediency, efficiency and growth.

But there is no need to be daunted by the options. When taking the right approach, the decision will be clear.

Step 1: Define which type of software meets your business needs.

The best first step when determining your requirements is to define what your business needs and how you can give it the upper hand.

Business should always lead technology and not the other way around. Without this up-front preparation, technology will lead the business instead of the other way around.

Here are some areas you can examine to develop a picture:

  1. Clearly define what advantages and differentiating qualities set your business apart from others.
  2. Determine what processes can further leverage those differences and how software might assist.
  3. Interview staff and key stakeholders to get an idea of what they’re thoughts are about the software they use
  4. Brainstorm and ask people with knowledge to share their thoughts about software solutions in your business area.

Learn more about the impact of software on business performanc


Step 2: Define what’s needed to propel forward

Once the needs are defined in step 1, developing the flows, processes and systems needs fall into place. These should be written down and agreed to.

Some questions to guide defining those needs in addition to the above are:

  1. Are our processes seamless and do they flow easily from one department to the next?
  2. Are you moving fast enough to surpass your competitors?
  3. Are you transparent enough for your clients?
  4. Can you save money by automating certain processes?
  5. Are you struggling with more than one type of software?

Step 3: Research your off-the-shelf software options

Armed with the knowledge of what the business needs and wants one can determine what software or collection of software to power the business on.

There are typically two options to look at:

  • Off the shelf pre-built software
  • Custom build

Off The Shelf vs Custom Software

Off the shelf software is pre-built systems the typically can’t be altered significantly. These can include software like MS Word, Salesforce or QuickBooks. Those systems tend to do what they do well and are specific purpose drive.


You might also like…


These systems can feature rich, which if needed are great. If not, they can be over complicated for what the true business need is.

Advantages and Disadvantages of Off The Shelf Software

Advantages of Off The Shelf (OTS) Software:

  • Lower up-front cost
  • Contains many features, often more than you need
  • Support is often included or can be added with a maintenance contract
  • User communities and forums for support
  • Upgrades may be provided for free or at a reduced cost
  • Faster to deploy
  • If it’s software-as-a-service (SaaS) there is no hardware or software to install

Disadvantages of Off The Shelf (OTS) Software:

  • Slow to adapt or change to industry needs
  • May have user, transaction or other fees that can make scaling costly
  • Your feature request may get ignored if it doesn’t benefit the larger customer base
  • May require you to change your process to fit the software
  • May use different terminology than your business and required adjustment to a new language
  • Higher customization fees (proprietary software vendors often charge very high hourly fees unless they provide an open API)

Custom Software Development

Often the needs of your business are unique and off-the-shelf software doesn’t meet the needs of your business. In this case, custom software development makes a lot of sense.

More often than not, custom software developers are happy to provide you with a rough estimate for a custom build. Read our ‘finding the right fit’ article for tips in determining the right software developer for you.

Check Our Custom Software Development Case Studies

Pros of Custom Software Development:

  • You can start with the minimum necessary requirements and add on later. Less can be better.
  • Can be tailored to your exact business needs and processes
  • Changes can be made quickly
  • Matches your business language
  • Typically unlimited users and transaction at no extra cost
  • A unique solution that can potentially give a business advantage.

Cons of Custom Software Development:

  • High initial cost
  • All changes and feature requests will be billable
  • May incur additional costs ramping up new developers

There is a common conception that custom is always more expensive than off the shelf. While this might be the case for many consumer systems, there are many enterprise systems like SAP that run in the millions to setup and deploy.

Often customers will employ these systems and only use 5% of the functionality, when they can get all of what they need for a fraction of the price through custom development.

Hybrid Software Solutions

The hybrid solution typically involves taking an existing piece of software with access to source code and tailoring it for your unique business needs.

This would be an application with most of the features needed by the business but requires incremental changes to meet specific demands. In this way, a business can pull in the best of both worlds – having a system customized completely for their needs while leveraging functionality that has already been created.

The options in software are unlimited. This can be overwhelming and confusing. But once the needs of the business are clear, making the right chose in software also becomes easier and clear. Business before technology, not the other way around.

The post Custom Software vs Off The Shelf: The Pros & Cons appeared first on JIG Technologies.

]]>
The 6 Most Common IT Issues That Hinder SMB Owners https://jigtechnologies.com/the-6-most-common-it-issues-that-hinder-smb-owners/ Thu, 11 Feb 2021 17:06:41 +0000 http://jigtechnologies.com/?p=1576 Having the right technology is critical for any business trying to stay ahead of the competition. It therefore comes as no surprise that small and medium-sized businesses (SMBs) are spending upwards of $686 billion on their mission-critical technology. Unfortunately, 55% of SMBs feel that…

The post The 6 Most Common IT Issues That Hinder SMB Owners appeared first on JIG Technologies.

]]>
Having the right technology is critical for any business trying to stay ahead of the competition. It therefore comes as no surprise that small and medium-sized businesses (SMBs) are spending upwards of $686 billion on their mission-critical technology.

Unfortunately, 55% of SMBs feel that their current technology solutions are actually “a hindrance to incorporating or adopting new technologies”, while 75% of tech influencers in this business category are concerned about coming “IT disruption”.

So what should we make of this? What challenges are SMBs facing that are interfering with their ability to compete in the marketplace? And why is it so difficult in today’s technology-centric business world to get ahead?

Read on to learn about six of the top IT issues that hinder SMBs owners.


1. IT Budget Pressures

The cost of hardware, software, and technology management continues to rise, yet the majority of SMBs aren’t increasing their IT spending to keep pace. It’s an enormous demographic: SMBs represent 40% of the total worldwide IT spend, yet economic pressures frequently keep them from making the moves they need to help them grow.

Because IT requires a heavy investment of time and money to both implement and maintain, SMBs are typically more likely to try to do as much as possible with what they have. Ultimately, it means identifying strategic means and investing smartly in the right resources to keep their technology infrastructure resilient.

2. Security

Security incidents are growing at an exponential pace. There were more data leaks in the first half of 2017 alone than all of 2016 combined, and the pace is increasing rapidly. Unfortunately, SMBs lacking dedicated IT security experts are finding themselves at a disadvantage, since this is typically a luxury only enterprises can afford.

Whether it’s a question of securing BYOD mobility devices, monitoring networks for vulnerabilities, maintaining firewalls, or conducting patching and upgrades, SMBs are continually challenged to deploy the time and resources needed to prevent potentially catastrophic security incidents.

3. Lack of Strategic Planning Expertise

Beyond security, a lack of dedicated IT personnel puts most SMBs behind the curve when it comes to implementing and maintaining their network and infrastructure. Having access to strategic IT expertise is critical for meeting business goals.

For those SMBs who do have a dedicated IT staff, these personnel are often used in an operational and maintenance capacity only. Their jobs have more to do with keeping the technology running smoothly – a vital role, but one that doesn’t take into account strategic planning for the future.

Successful businesses take a strategic approach to ensure that their technology is perfectly aligned with their organizational needs – immediate and long-term. Sadly, having a CIO or technology strategist  is a luxury many smaller businesses simply can’t afford, so their technology continues to be implemented and managed on an ad-hoc basis rather than with an eye to the big picture.

4. Application Integration and Management

Enterprise-level businesses use as many as 91 cloud services and applications to handle day-to-day operations. While smaller SMBs will use significantly less, integrating and managing the ever-increasing number of new applications (both cloud and local) can become a major challenge.

Software applications should improve workflows and boost capabilities. Failing to manage them properly can result in crashes, poor system performance, and reduced productivity – all of which can lead to a reduction in overall business efficiency.

5. IT Asset Management

Hardware acquisition and disposition can be extremely tricky. Even if you’ve identified the technology you need to support your business goals, you’ll still need to source and acquire new technology while planning for the replacement and disposition of hardware nearing its operational end of life.

Do you have strong relationships with vendors? Are you able to leverage volume discounts and negotiate discounts? Have you identified which hardware needs to be replaced, and how? Managing your technology effectively is an essential part of a scalable and agile IT environment. However, this is another critical area in which many SMBs simply lack either the necessary expertise or the resources to implement a successful strategy.

6. Disaster Recovery Planning

Catastrophic data loss can cripple a business of any size. Unfortunately, SMBs can be particularly at risk: 43% of SMBs go out of business after a significant loss of data, while another 51% falter two years after an incident. Despite this, a lack of resources and awareness means many fail to put into place basic disaster recovery planning.

With so many cloud-based data security and recovery services available, SMBs can easily protect their operations from catastrophic disruption due to unforeseen events.

Overcome These Common SMB IT Challenges

Because of the time, money, and resources needed to effectively manage their technology, SMBs are vulnerable to losing competitive ground in the marketplace. That’s why more and more SMBs are turning towards managed IT services providers to help navigate their technology needs.

By outsourcing your technology operations and planning, you’ll gain access to the support and IT personnel that helps you reach your business goals, without incurring the cost of expanding your staff.

The post The 6 Most Common IT Issues That Hinder SMB Owners appeared first on JIG Technologies.

]]>
5 Ways Software Can Slow Down Your Workflow https://jigtechnologies.com/5-ways-software-can-slow-down-your-workflow/ Thu, 11 Feb 2021 17:05:28 +0000 http://jigtechnologies.com/?p=1572   We all depend on software to get things done. This is especially true for businesses, with some relying on upwards of 91 cloud service applications per department – and with most of those not even certified as being “enterprise ready”. So…

The post 5 Ways Software Can Slow Down Your Workflow appeared first on JIG Technologies.

]]>

 

We all depend on software to get things done. This is especially true for businesses, with some relying on upwards of 91 cloud service applications per department – and with most of those not even certified as being “enterprise ready”. So even though a business may rely on these applications to handle day-to-day business operations, they can easily do more harm than good – and ultimately severely slow down your workflow processes.

And with only 37% of CIOs believing that most of their applications are business critical, it’s not hard to imagine that a large number of businesses are using too many applications that don’t serve their business needs. The bottom line: improperly acquired, deployed, and managed software can lead to significant workflow problems.

So why is this the case? How does software intended to improve workflow automation and bolster digital transformation end up having the reverse effect? Let’s take a look at five ways software can interfere with your business processes.

1. The Software is Outdated

Outdated software is rampant. A survey of over 100 million AVG users found that 52% of the most commonly-used programs aren’t being kept up to date.

This is problematic for several reasons. For one, non-updated software can cause system and network incompatibilities that prevent it from working properly. Older applications can suffer from serious lags, crashes, and overall performance deterioration. In turn, this leads to lost time and productivity caused by system resets/restores and potential data loss.

Most software vendors will typically end their support for outdated software. Your IT personnel won’t have access to updates and critical patches, and may have to resort to spending time manually configuring these applications to work with your existing technology.

But perhaps more importantly, older software can leave you open to serious security threats. Java, for instance, contains hundreds of known security vulnerabilities within its code, and legacy Java-based programs that no longer issue updates can leave the user exposed.

2. The Software Isn’t Aligned With Your Needs

In 1999, candy and chocolate giant Hershey’s implemented a new supply chain and distribution software system with disastrous results. Because they had selected a vendor and software suite without properly determining whether or not it would suit their needs, problems and glitches eventually cost the company approximately $100 million in losses.

With so many software options available, it’s easy to get sidetracked by factors such as price, brand, or features. Did you select the product because it was cheaper? Did it offer added features that, while useful, don’t actually add any value?

To ensure that your software choice doesn’t impact your workflow management, start with a careful analysis of your business goals and select the option that best supports the processes to get you there.


Make Sure Your Software Solution is the Right One for Your Business


3. The Software Lacks Training Resources

Even though an application may be the ideal solution for handling specific tasks, it won’t be of much use if it isn’t used. This is particularly the case with software that has a high learning curve. If it doesn’t provide access to sufficient user support and training resources, you may find that your employees will either resort to bypassing it completely or see their efficiency drop thanks to improper usage.

4. The Software Doesn’t Bridge Process Gaps

Applications are typically designed to handle specific tasks. While this isn’t a problem in itself, it can lead to issues where users have to constantly jump between separate applications to do their work. These gaps not only have a negative impact on process management, they can also reduce efficiency and increase the likelihood of human errors.

That’s why it’s important to look at your existing workflows and identify software solutions that support as many of them as possible, from end-to-end.

5. The Software Doesn’t Provide Value

Finally, does your software provide demonstrable value to your organization by improving user efficiency? With new software options coming out all the time, it’s easy to keep using software that no longer serves your need but stays in place because of user and organizational familiarity.

You may have been using Software X for the past five years, but shifting business priorities are starting to render it unnecessary. That’s why it’s critically important that you evaluate your software inventory regularly and determine whether it’s still the best choice for your day-to-day operations, or if it should be replaced.

Ensure Your Software Supports Your Workflows and Processes

Relying on software that’s outdated, inefficient, or no longer supports your business needs can have an adverse affect on your business workflows and processes. Whether you opt for commercial or custom-developed software, make sure that it aligns with your business goals and doesn’t cause bottlenecks in your operational efficiency.

Not sure if your software is right for your business? Or are you looking to learn more about how you can modernize your software to improve your business? Contact us today to learn how JIG Technologies can help with all your software needs.

The post 5 Ways Software Can Slow Down Your Workflow appeared first on JIG Technologies.

]]>
Dodging the Technology Traps that stalls growing business https://jigtechnologies.com/dodging-the-technology-traps-that-stalls-growing-business/ Thu, 11 Feb 2021 17:03:56 +0000 http://jigtechnologies.com/?p=1568 We live in a world where the ever increasing accumulation of information has both helped businesses to thrive and succeed, but has also presented them with what often seems like insurmountable Information Technology traps. Q: What should an organization do…

The post Dodging the Technology Traps that stalls growing business appeared first on JIG Technologies.

]]>

We live in a world where the ever increasing accumulation of information has both helped businesses to thrive and succeed, but has also presented them with what often seems like insurmountable Information Technology traps.

Q: What should an organization do when information islands isolate each department from another? Or, when huge amounts of data are stored with no index or easy way to access it?

These are problems that thriving businesses often have to face, but rarely have the time to resolve. Information Technology shouldn’t stand in the way of a business’s growth, or muddy the view of its assets, it should be the hand that clears the way to success.

Information ISLANDS

Let’s start with some examples.

The client of a mortgage company is having a hard time convincing client services that they’ve been making extra payments because accounts receivable has no way of sharing that information with them.

Or, Radiology has no efficient way of sharing information with Emergency so a worried parent is left wondering about the peanut stuck in her son’s nose.

Or, in the case of warehouse management, there’s one system to take orders, another to track inventory, another to do billing and yet another to do specialized functions like decision support.

Special systems are designed to provide solutions for every department, but they are all done independently of each other, thus creating information islands. These islands create a communication and data gap that demands time and money to reconcile.

Many companies try and resolve this problem by reinventing their technology systems, but this often results in a loss of their initial IT investments. Furthermore, these solutions have hidden costs, such as the loss of productivity as staff adjust to new workflows, or end-user trial and error that eats into company time.

A better solution, and frequently overlooked one, is to develop an initial business strategy. Working with key business leads and qualified Technical Information Architects. A small investment of time and money can result in future savings that are multiple that of the initial investment. Even in the case where separate systems have been developed in isolation over many years, developing a strategic plan will help lessen the cost of future IT reinvention.

Communication barriers between departments dissolve, data is used more efficiently and no department is left in the dark. It is never too late to take a strategic approach!

Information blobs

With the cost of storing information being so inexpensive these days, it’s easy to accumulate and save unmanageably large quantities of data but it’s another thing altogether to make it useful to your business or organization. An information blob is a large storage of data that has no index to help group and manage that information easily.

Some examples include the fileshare dumping ground.  This can be the online google drive or local network folder that the entire staff have open access to.  Over time each person creates their own folder with their own files.  So, if Bob wants the report that Debbie wrote he has to ask her where it is because there is no way to find it a system with thousands of folders and tens of thousands of files.

Another example is the database with lack of structure. Let’s say you have a list of donor records and you want to find all the Canadian donors.  If the citizenship field is freeform, then the data entry folk will enter in different values for Canada such as CADCdnCanadaCD etc. Trying to find all the Canadian donors because a difficult task as one needs to guess all the combinations typed in to represent Canada.

Avoiding the information blob problem requires a conscious effort to organize the data in a way that is useful to the organization. What sort of information or insights does the business really need from this data? And to understand that, we need to know what kinds of questions should be asked of the system.

Once these questions are answered, the path has been cleared for a Technical Architect to be brought in and design a system that will meet all needs.

Technology is great, and having the ability to store information is fantastic! But without strategic planning the information becomes inaccessible and ultimately, useless.

It Never Hurts To Ask

If some of these symptoms seem familiar to you, or if you think your business or organization might be headed towards one of these traps, do not hesitate to contact us, your friendly, neighborhood Technical Architects.

Business comes before technology and not the other way around.

The post Dodging the Technology Traps that stalls growing business appeared first on JIG Technologies.

]]>