Skip to main content
Category

Security

Security

Security Lockdown: The Importance of Multi-Factor Authentication (MFA)

You may have noticed that recently a lot of your accounts are now requiring multiple methods of verifying your identity when you login. No longer do you just enter your username and password to get into your email, your cloud apps, or your accounting system. You now also need to input a short code that is texted to you, generated by an app, or emailed. In some cases, you might be getting verification phone calls, using a smart card, or entering biometric data like a fingerprint. What is this? This is multi-factor authentication (MFA). MFA consist of three things that…
OXEN Technology
February 10, 2020
ConsultingSecurity

2020 OXEN Update on Cybersecurity

Every day we read about another cybersecurity breach. Lost credit card information, hacked emails, corporate or national security information stolen by insider or external actors. Cyber espionage and security attacks have become sophisticated and big business. We have reluctantly learned a new language: ransomware, “phishing”, malware, HIPAA (in healthcare), PCI (for credit card protection), and PII (personally identifiable information) to name a few. The challenge grows even faster as more and more devices are attached to our networks. New devices like thermostats, smart lights, cell phones, watches, and smart monitors of all types connect to our networks to share information.…
OXEN Technology
January 20, 2020
Security

Increase Your Network Security

Wireless networks are a gift to anyone seeking easy connectivity and a quick Wi-Fi connection. But don't forget that rushing through your network's setup can have security consequences later. Make sure you've addressed these areas, whether it's for your personal network at home or your business's, to improve your network security. Change your access point or router's default username and password. Default usernames and passwords for most hardware and software can easily be found online. Turn on encryption. All Wi-Fi devices support at least some type of encryption. Change your network's name or SSID from the default. A default name…
OXEN Technology
December 16, 2019
ConsultingInfrastructureLeadershipSecurity

5 Tips on Managing & Planning Your Technology in 2020

In the IT industry, there are always new projects and upgrades coming, plus new concerns and trends. What should you consider implementing in 2020? Here are our tips for what to keep in mind when managing your cybersecurity risks and planning for the future. #1 Is your Windows Software wanted dead or alive? Are you still running Windows 7 and/or Windows Server 2008? Are you on Windows 8, but not yet ready to step up to Windows 10 and the latest updates? Remember that both Windows 7 and Server 2008 hit end of life in January 2020. Windows 8 reached…
OXEN Technology
December 10, 2019
Security

Ransomware Lessons for City Governments

U.S. towns and cities are being hit hard by ransomware and cyberattacks A city government's network is a prime target for hackers. Many small towns and cities don't have the tools, personnel, or budget to fight back. And when an attack is successful, who is to blame? Cities like Lake City, Florida have been in the news recently for falling victim to devastating ransomware attacks and the consequences afterwards. Lake City, Florida's computer network was devastated within hours. Their security and backup defenses were no match for expert hackers and sophisticated spear phishing campaigns. Their budget never extended to cover…
OXEN Technology
November 11, 2019
Cloud SolutionsOffice 365Security

What Is Microsoft 365 vs. Office 365?

You may have started to hear about Microsoft 365. Is it the same as the similarly named “Office 365”? The two are different, and here we’ll explain the difference and what Microsoft 365 Business can offer your organization. First of all, Microsoft 365 is not the same thing as Office 365. Office 365 is a cloud-based suite of productivity apps, such as Word, PowerPoint, Excel, and Outlook. It’s the modern, cloud-based version of the Microsoft Office suite of products you’re probably familiar with already. Microsoft 365 Business is a bundle of services that include the apps and productivity tools of…
OXEN Technology
September 16, 2019
Security

How to Protect Your Business Against Former Employees

We’ve said this frequently, and we’ll say it again. One of the biggest security weaknesses that businesses face are their own employees. This isn’t pleasant, but it’s a truth that we have to face. Humans are a weak link in our cybersecurity defenses. When we make mistakes – forgetting to change a default password or clicking on a link we shouldn’t – we open the door for attackers. But there’s another way that your people can threaten your organization. It's from within: disgruntled or dissatisfied former employees. These are people who are no longer with your business but may still…
OXEN Technology
September 9, 2019
LeadershipSecurity

2019 State of the IT Industry Landscape, Part 3: Cybersecurity

In this portion of our 2019 update on the state of the IT industry, we review many of the pertinent and pressing statistics of the need for cybersecurity. It’s easy to paint an overwhelmingly complex and urgent picture of cybersecurity. However, we aim to balance the flood of data with digestible overview of the situation. Industry Trends: Cybersecurity Bottomline: Our cybersecurity risks and cost associated with them will never be lower than they are today. OXEN’s 2017 summary of cybersecurity for small businesses concluded that SMB IT security is viewed as a necessary but unwelcome cost, rather than as an…
OXEN Technology
July 29, 2019
ConsultingLeadershipSecurity

The Shared CIO Role: Evolving IT Leadership to Serve You Better

I hope it’s OK to write about something other than the newest cloud feature or the latest tech gadget, because I’m not going to talk about new technologies in this article. Rather, I would like to talk about the necessary leadership in today’s businesses. Not so long ago, the only IT goal of any business was to find someone who could do the work of implementing, upgrading, and maintaining technology. It was a hard-to-find skill set, and it was even difficult to find someone able to set up a basic network. That is not the case today. There are IT…
Ryan Pieken
July 8, 2019
Security

Spring Cleaning Your Spam Filter Whitelist

It's time to add your spam filter whitelist to your spring cleaning routine. For some of us who have been using the same spam filter for years, we may have a long list of allowed addresses or domains. Because phishing email is involved in 91% of breaches, I can't stress enough how important it is to manage your whitelist. As security has evolved, I continually find things that I did months or years ago that I would do differently today. So, I am learning to go back and review the things that are on autopilot to make sure they meet…
Ryan Pieken
May 20, 2019