Halt 70% of Known Network Cyberattacks and Phishing Campaigns

As the shelter-in-place (SIP) rages on within California, the Bay Area and its workers are forced to continue working remotely. At times, it feels like our world has drastically changed. Despite how mixed up everything may seem, it appears to be business as usual for robocalls, scammers, and hackers.

Known to the cybersecurity landscape as a “lateral movement” or “lateral attack,” the breach and move attack method has become a favorite for hackers today. These attacks will typically target business supply chains, in hopes of gaining access to their desired end target. One of the more famous lateral attacks was in 2013 when the department store Target was breached by hackers. The hackers were able to infiltrate Target’s HVAC System Software. From there they were able to travel within the network and steal credit card data from unknowing customers. Read more

3 Major Reasons Your Business Should Move to Office 2019

Microsoft Office 2010 support is now reaching the final leg of its lifecycle. Extended support for Office 2010 will end on October 13th, 2020 and that means no more tech support, bug fixes, or security patches coming from Microsoft. Accompanying applications, Microsoft Exchange 2010, and SharePoint Server 2010, will also reach end of life. This will leave your business vulnerable to cyber-attacks and hackers if you do not update these applications.

Businesses are looking into their options: upgrading to the on-premise Office 2019 version for a one-time purchase or moving to the per-user cloud-based subscription of Office 365. Read more

Seamless Cybersecurity & Two Emerging Threats

For most businesses, the pandemic has been a rush of implementing new policies and procedures while at the same time, trying to keep end-user Cybersecurity fortifications intact. Organizations that acted early following the shelter-in-place safety procedures are still focusing on maintaining or improving their Cybersecurity needs.

Most users can work from home and many have implemented tools to allow for a remote workforce. Many firms are adding collaboration tools to their remote strategy, with the hope of improving teamwork and collaboration more efficiently. However, this new workflow and new tools can expose your business to additional risks.

At Clare Computer Solutions we have uncovered at least two troubling new trends to keep an eye on:

Read more

Four Risks to Consider with VPN Deployments

With the sudden and rushed deployment of Virtual Private Network (VPN) services to further support new remote workers, many companies are discovering firsthand, the struggles of implementing a VPN into their network. Without the needed experience, the configuration can leave your network, endpoints, and data vulnerable to attack.

Proper implementation, ongoing management and monitoring of this device is the key to success. Clare has been assisting clients with implementing new solutions for over 30-years. Our approach is to assure your business objectives are addressed while highlighting potential risks and vulnerabilities. We will review the overall network architecture to identify and address potential access control concerns, issues of scaling and load challenges, authentication concerns, and, finally, endpoint protection as part of our design discussions. A thorough implementation will ensure a successful and secure VPN solution. Read more

Keeping Your IT Infrastructure Fresh, Reliable and Aligned with Business Needs 

As the network evolves with a company, over time (configuration changes are made, new devices are added, some are completely forgotten) older devices become unstable and unsupported. This is a natural consequence due to competing priorities, staff turnover, and daily distractions. This ‘aging’ of the network can contribute to an unstable network and excessive time required to resolve issues if not properly maintained.

Left unchecked, the network can become convoluted due to server sprawl and ad hoc changes. This is a common situation for many companies and creates unnecessary IT support overhead, and inflates operating costs.

Read more

New to Working From Anywhere? Tips to Keep You Productive and Efficient

With so many businesses now encouraging, or even mandating employees to begin working from home amid the heath concerns of Coronavirus. Millions have already changed their daily routines, in turn changing the way many of us work today.

Not everyone has been made accustomed to working from home or getting work done can be an adjustment. The good news about working from home is the commute time has gone down. Many spending more time with family, and maybe you will get a few things done around the home. Some challenges can include loneliness, staying connected, heightened levels of distraction can significantly affect your productivity – so we are here to help!

Regardless of you working from a spare bedroom, or the lobby of your building, we have compiled some tips to help you set up, and limit the distractions while maintaining confidentiality and professionalism.

Read more

Can You Spot a Scam When You See One?

Can You Spot a Scam When You See One? – Learn How to Recognize Suspicious Texts and Emails!

As we are all getting used to the new normal, people continuing to work from home or staff returning to work, there continues to be a lot of change and unrest. Users are frustrated, concerned, overwhelmed, hurried and uncomfortable. As such they may forget to follow due diligence recommendations. Additionally, our hackers just keep getting more creative and continue to hunt for opportunities.

Keeping your business and information safe is critically important to us. Whether these attacks are directed at the business or the home, your users are exposed. Therefore, we continue to identify new threats and help you stay in front of the latest business scams and hacking attempts.

Read more

6 Important OS Hardening Steps to Protect Your Data and End Users

Are your systems protected? Is your IT Team overwhelmed or your current IT Partner leaving your business vulnerable? According to the Duo Trusted Access Report, only 53% of Mac OS users are running either the fully patched, latest version of OS X, or the previous version, compared to 35% of Windows users on Windows 10 and 8.1. That means most of these operating systems are outdated, unpatched or unsecured – leaving your business vulnerable to compromises and extended downtime.

While proper patch management is critical to protecting business data and employee up-time, it is only one of many security considerations. Ransomware-as-a-Service continues to grow, it’s just as important, we are seeing a rise in popularity of Operating System (OS) Exploit Kits.
Read more

Returning to the Office: A Checklist for Your Businesses

As many counties ease lockdown restrictions, businesses around the Bay Area will slowly begin to reopen their doors. As some look forward to getting back into the office, other will continue to feel wary. One thing is for certain – the workplace is going to look very different for many of us.

How can you best prepare your team for the ‘new normal’? What should you take into consideration to ensure a successful return to the workplace, especially when it comes to employees, office space, and technology? While it is not an exhaustive list, our Returning to the Office: A Checklist for Your Businesses covers the items to consider as your office begins to reopen. Read more

Generating Your Security Mindset During These Times

Here we are, months later, still dealing with the changes this pandemic has created. Most changes haven’t been fun, but it’s made for very interesting times. Many businesses are focused on balancing between more or (for some) less work, figuring out how to maintain staff, motivate existing staff remotely, determining how to keep staff busy and preparing for what tomorrow will bring as we slowly start to come out of the COVID-19 quarantine. Now, more than ever, is the time to re-evaluate your businesses Security Posture and implement solutions you may have been hesitant to consider previously. It’s predicted that by 2021, cyber crime will cost the world $6 trillion annually. Even more frightening is the fact that on average, there is a hacker attack every 39 seconds Read more