Pro Tech Guy Logo
CALL US
508-364-8189
855 Worcester Rd.
Framingham, MA 01701
  • Home
  • About
  • Services
    • Cloud Care
    • Business IT Services
  • Get Help
  • PTG News
  • Podcast
  • Contact

How Can We Get A Handle on Shadow IT? (Cloud Accounts You Don’t Know About)

September 1, 2021 by Kyle Kenyon

How Can We Get A Handle on Shadow IT? (Cloud Accounts You Don't Know About)

The increasing reliance and availability of cloud applications for business processes coupled with the newly-remote workforce have led to a dramatic rise in a big security issue. [Read more…]

Filed Under: Business - null

Share:

Social Phishing is on the Rise! 4 Ways to Keep Your Company Protected

August 25, 2021 by Kyle Kenyon

Social Phishing is on the Rise! 4 Ways to Keep Your Company Protected

When phishing first began, it was largely relegated to email. Attackers send millions of fake emails out trying to trick someone into clicking a malicious links or download and open a malware-laden file. [Read more…]

Filed Under: Business - null

Share:

Why Ransomware as a Service (RaaS) Has Made This Type of Malware 10x Worse

August 18, 2021 by Kyle Kenyon

Why Ransomware as a Service (RaaS) Has Made This Type of Malware 10x Worse

Ransomware has been on the cybersecurity radar for several years now as one of the more dangerous forms of malware, but recent surges in attacks have pushed it front and center. [Read more…]

Filed Under: Business - null

Share:

Is Your Company Ready to Try Virtual PCs? Introducing… Windows 365

August 11, 2021 by Kyle Kenyon

Is Your Company Ready to Try Virtual PCs? Introducing... Windows 365

In mid-July, Microsoft made a big announcement that could change the way that companies requisition their computers. It announced the release of a new cloud PC service called Windows 365. [Read more…]

Filed Under: Business - null

Share:

How to Digitally Offboard Employees to Ensure Your Business Data Isn’t at Risk

July 28, 2021 by Kyle Kenyon

How to Digitally Offboard Employees to Ensure Your Business Data Isn't at Risk

The digital age has changed many things for business operations, and one of them is the employee offboarding process.  [Read more…]

Filed Under: Business - null

Share:

What Can You Learn from the 5 Top Cybersecurity Predictions for 2021

July 21, 2021 by Kyle Kenyon

What Can You Learn from the 5 Top Cybersecurity Predictions for 2021

It’s been a rocky pandemic for companies trying to keep their technology systems secure. The need to facilitate work-from-home (WFH) employees at the beginning of the pandemic opened up a network security risk. Hackers quickly leveraged the disruption COVID caused and increased their attacks. [Read more…]

Filed Under: Uncategorized

Share:

6 Important Ways to Prevent Cloud Jacking of Your Online Business Apps

July 14, 2021 by Kyle Kenyon

6 Important Ways to Prevent Cloud Jacking of Your Online Business Apps

Cloud security is becoming a major concern for companies of all sizes. Over the last 18 months, 79% of surveyed businesses have experienced a cloud data breach. [Read more…]

Filed Under: Business - null

Share:

Learn All the New Features Coming Later This Year with Windows 11

July 7, 2021 by Kyle Kenyon

Learn All the New Features Coming Later This Year with Windows 11

Microsoft just came out with a major new announcement recently. More than five years after Windows 10 launched, it has announced the next iteration of the Windows operating system. [Read more…]

Filed Under: Business - null

Share:

Why You Should Start Using a Zero-Trust Approach for Your IT Security

June 30, 2021 by Kyle Kenyon

Why You Should Start Using a Zero-Trust Approach for Your IT Security

Many companies find out the hard way that business IT security is never fully “done.” As soon as you implement safeguards against today’s threats, tomorrow, hackers will come up with new and inventive ways to break into company networks. [Read more…]

Filed Under: Business - null

Share:

5 Important Ways to Safeguard Mobile Devices from Online Threats

June 23, 2021 by Kyle Kenyon

5 Important Ways to Safeguard Mobile Devices from Online Threats

Verizon recently released its Mobile Security Index 2021 report, which provides details on the current state of mobile device security risks and the types of attacks companies should be prepared for.

The report illustrates the shift towards more mobile working and the fact that the security of smartphones and tablets hasn’t yet caught up to that of PCs. While offices are becoming more dependent upon mobile devices, those devices are creating more risk for business networks if not properly secured.

According to the report, 71% of surveyed organizations say that mobile devices are “very critical to their business” and 53% said their company has suffered major consequences in the past from a mobile-device-related security incident.

40% of surveyed professionals say mobile devices have become the biggest IT security threat.

While mobile devices are gaining more prominence at work, hackers have noticed and have been unleashing more mobile-specific attacks, such as banking trojans and spyware hidden inside mobile apps.

Businesses need to realize that users are now doing the same things and accessing the same sensitive data via mobile as they do computers. This means that smartphones and tablets (both company-owned and employee-owned) need to have the same strong protections as PCs.

Tactics for Keeping Mobile Devices from Being a Security Problem

Require Use of Lock Screen

One big risk with mobile device security is that phones and tablets are easily lost or stolen. If a thief gets their hands on a smartphone used for work, they could easily access platforms that have a persistent sign-in (always keep you signed in). They also have access to any text or app-based multi-factor authentication, which could give them access to multiple cloud and website accounts.

Using a lock screen might mean a few more seconds to unlock a device, but it can also give you time to remotely lock or wipe a device should it be lost. That can make all the difference between a major data breach happening due to a lost device and being able to lockdown information before it’s compromised.

Use a Business VPN

Between 2018 and 2020, the number of global public Wi-Fi hotspots has increased 63% to 454 million. As mobile phones are being carried around, they can be connecting to any number of public, unsecured networks.

Public networks hold a big security risk for a man-in-the-middle attack when a hacker is on the same public network and using special tools to spy on the activity of other users.

Adding a business VPN is one of the important tools in any cybersecurity checklist. Once signed up, you can add your employees, have them download a mobile app, and it will secure their internet traffic through encryption. This keeps the data secure, even when on public Wi-Fi.

Keep Track of Mobile Devices with a Mobile Device Manager

Mobile devices now make up about 60% of the endpoints in a company. They can be connecting to your business data from any location and that location often changes throughout the day.

Mobile device managers, such as Microsoft Intune, give companies a way to secure the business side of employees’ devices. 

An MDM enables remote monitoring and administration for:

  • Which devices can connect to your business apps
  • OS and software updates
  • Locking or wiping a lost or stolen device
  • Enforcement of IT security policies consistency across all devices

Research Apps Before Downloading Them

Employees should be instructed not to download any apps from outside a legitimate app store (Apple, Google, Microsoft). But even when downloading from an app store, it’s important to research an app online first to ensure it’s not a fake with hidden malware or one that overshares data.

Even fake apps can end up in a legitimate app store for a while before they’re found out and removed by the platform. Mobile malware has been increasing as the use of mobile devices at work has risen. 

Employees need to be aware of the security of any new apps they install before they install them, and the fact that some malicious apps will actually hide their icon after being installed to make removal more difficult.

Install a Mobile Antivirus/Anti-Malware App

PCs aren’t the only device that needs an antivirus/anti-malware application, it’s also important to have one protecting business-use mobile devices. 

All mobile devices used for business use, even if it’s just to receive work email, should have a reliable mobile version of an antivirus/anti-malware application. This helps ensure any infections are caught before they cause major problems and travel through your network to other devices.

Get Help Implementing a Mobile Device Security Plan

Pro Tech Guy can help your Framingham business put a cost-effective mobile device security plan in place to ensure your company data isn’t at risk.

Contact us today to learn more. Call 508-364-8189 or reach us online.

 

Filed Under: Business - null

Share:

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 17
  • Next Page »

Follow Us

Hours & Directions

M-F 9AM to 5PM

Click here for updated hours and directions

Our Services

> Cloud Care
> Business IT Services
> Home Computer Repair
> New and Reconditioned Computers

VISIT US

Reviews

Recent Posts

  • Are You Sabotaging Your Employee Phishing Training by Doing This?
  • What Should You Look for When Auditing Your Privileged Accounts?
  • The Biggest Cybersecurity Mistakes That Can Leave Your Company at Risk
  • 5 Technology Resolutions You Should Make for the New Year
  • What IT Issues Can We Solve Using Remote Support?

Copyright © 2023 · Pro Tech Guy · 855 Worcester Rd., Framingham, MA 01701