Tag: Trend Micro

Keeping Internet-Connected Devices Safe and Protected [Infographic]

Keeping Internet-connected devices safe and protected [Infographic]

(BPT) – Learn how smart devices connect and communicate using the different layers and protocols typically used within this ecosystem. Understand how cybercriminals exploit this environment and how you can protect yourself, your data, and your device.

 

Keeping Internet-connected devices safe and protected [Infographic]

 

Debunking Common Computer Security Myths

Debunking common computer security myths

All businesses can be susceptible to threats like hackers and computer viruses. Making matters worse is the great deal of misinformation floating around regarding cyber security. The Internet attracts urban legends and computer security isn’t immune from this trend. Many alleged security “facts” are, at best, inaccurate. Some of these myths are recent developments, while others have been around for years.

Clearing up some common misconceptions about computer security, Staples and Norton have teamed up help separate fact from fiction.

Myth 1: Companies that sell antivirus and security solutions create viruses

The idea that the online security companies develop and release computer viruses to maintain sales is false. While it’s true that one variety of malware (malicious software) called “ransomware” infects computers and then sells its victims a “solution” to the problem, these rogue programs are not affiliated with legitimate antivirus programs, like Norton. In fact, legitimate antivirus programs are the first line of defense against devious hackers.

Myth 2: A small business’s main security threat is the Internet

A security policy that only considers Internet-based threats is woefully incomplete. Yes, hackers can breach your network security. Yes, malware can infect your network through unsafe websites. However, the biggest risks to your security are often those who work for you.

Many security breaches originate with employees. A small number of employees are simply dishonest. More often, however, security breaches are caused by simple human error. An employee loses a laptop, for instance, or incorrectly disposes of printed or digital information.

“Now more than ever, small business owners should be taking all precautions to ensure their businesses are secure,” says Conor Kearney, vice president of technology merchandise for Staples. “While antivirus programs are a great first line of defense against cyber threats, it is important to make sure you educate your employees on what constitutes good cyber security and have safeguards in place to prevent a minor incident, like a stolen computer, from turning into a full out data breach.”

Myth 3: Apple’s operating system is safer than Microsoft’s Windows

For years, Apple users held up the relative lack of malware on Mac computers as evidence that the Apple operating system had fewer security flaws than Microsoft’s Windows operating systems. Actually, Mac users were safer because they represented a relatively small percentage of all computer users. Malware writers prefer to target the largest possible audience. As so, because many people use Windows, the hackers focused their attention on Windows and, for the most part, ignored Apple.

But now, people use Apple devices in sufficient numbers to attract malware. For example, in 2012, the Flashback Trojan affected 600,000 Macs. And a year later, Apple computer users were hit by a virus that targeted iPhone developers via the Java programming language. Recently the Shellshock/Bash vulnerability was identified as putting Mac users at risk.

Myth 4: Hackers only target “big business”

Some small businesses take false comfort in their size. The assumption is that hackers and data thieves only target big companies, major financial institutions and government agencies. However, small businesses can also be targets for data breaches and hacks.

Small businesses need to have a defense plan in place. Often, small-business owners recognize the importance of cyber security, but are unable to manage the complexity of this issue themselves. Consequently, the cyber security of small businesses tends to be neglected. “Protecting customer and business data from cybercriminals is a matter of life and death for most small businesses. Because small-business owners are insanely busy, they need a multi-layer security solution that’s easy to install and manage,” says Brian Burch, VP product marketing, Norton Business Unit, Symantec, a leading provider of award-winning products and services that deliver online protection. Easy, quick setup antivirus solutions are most preferred by small businesses. For example, Norton Small Business is a single solution to securing computers and mobile devices within a small business’ network.

A false sense of security

Today’s computer security myths all have one thing in common – they can lull you into a false sense of security. Keep your office free from viruses by always employing a critical eye and lots of common sense. Similar to your annual doctor visit, be sure to give your small business a cyber-security check, reassessing its network security and ensuring you have the proper tools in place to protect it from a cyber-attack.

See more – Internet Security

Heartbleed – Open SSL

Network System Services

Cloud and Managed IT Services

Image

We provide Customized IT Support, Cloud and Managed IT Services Solutions to fit your business and budget. Focus on the Business, we’ll handle IT.

At Lord & Griffin IT Solutions we know every business’s technology needs are different and having the right IT support in place is mission-critical. Whether you have 5 employees or 500; we can develop an effective IT management strategy that’s right for your business or organization, and we’ll find the most cost-effective way to get just the right level of tech support.

Our custom-tailored support plans allow customers to completely outsource the procurement, installation, and ongoing management of their IT hardware and software.

  • On Demand Support Services are designed to address the needs of clients that want a highly responsive, professional, and reliable IT support resource available to them when the need arises, but don’t necessarily need or want ongoing management services. On Demand Services are priced on a per incident or hourly basis. One (1) server and up to 10 PCs – Starting at $250/mo. Additional PCs and servers can be added on to perfectly tailor this plan for your needs.
  • IT Management Services provide our clients with proactive, ongoing monitoring, management, support and planning of your IT systems, as well as support for your employees using those systems. These services are priced on a flat monthly fee for unlimited service – providing budget predictability and ease of access to our services. provides an array of essential IT management services on a flat rate subscription basis to small and medium sized businesses, including PC Management Services as well as Server and Network Management, on a flat rate subscription basis to small and medium sized businesses. Starting as low as $50/mo. Per Computer.

IT MANAGEMENT SERVICES

Desktop Management: Desktop optimization, maintenance and support – Starting at $50/mo
Server Management: Manage & protect the most vital components of your business – Starting at $250/mo
Network Management: Protect your Network (Computers/Servers/Mobile devices) against hackers, viruses, & spyware + ensure productivity – Starting at $250/mo
Learn More – Call 888-404-8282 Today.

At Lord & Griffin IT Solutions we offer cutting edge business technology solutions. Our Cloud and Managed IT Services offer  for your business that are secure, easier to use and often times more affordable for small businesses.

Why Lord & Griffin IT Solutions Cloud and Managed IT Services?

  • Cost. Cloud and Managed IT Services and productivity applications can offer predictable monthly costs based on usage, much more affordable upfront costs versus traditional on-premise solutions, and help minimize ongoing operation expenses.
  • Implementation Time. Cloud and Managed IT Services solutions can be deployed in a matter of hours or days compared to weeks or months for most on-premise solutions. With no hardware or software procurement, Lord & Griffin It Solutions can get right to work setting up your cloud based applications and backups today.
  • Perfect for small to medium size businesses. With its ease of use, low cost, and scalability; our Cloud and Managed IT Services are often a great fit for small to medium sized companies while still offering all the benefits of traditional, onsite solutions.
  • Built-in protection. Our Cloud and Managed IT Services solutions generally have built in backup and recovery options that you never have to worry about or invest in.

Cloud and Managed IT Services

Lord & Griffin IT Solutions offers a variety of Cloud and Managed IT Services, productivity, and data backup solutions that are tailored specifically for your business’ needs. We not only help with the selection and implementation of cloud-based email and data backup solutions, but also provide 24 hour support for all your new or existing cloud-based software applications.

Contact Lord & Griffin IT Solutions today to see how our Cloud and Managed IT Services can help your business. 888-404-8282

Heartbleed – Open SSL

Open SSL - HeartbleedWith the widespread use of OpenSSL across enterprise applications and servers, the newly announced OpenSSL Heartbleed Vulnerability has introduced a level of risk that organizations need to take seriously.

What is the Heartbleed bug and are you vulnerable?

The Heartbleed bug is a serious vulnerability in the popular OpenSSL cryptographic software library. OpenSSL is an implementation of the SSL/TLS encryption protocol used to protect the privacy of Internet communications. OpenSSL is used by many web sites and other applications like email, instant messaging, and VPNs.

The Heartbleed vulnerability allows an attacker to read the memory of systems using certain versions of OpenSSL, potentially allowing them to access user names, passwords, or even the secret cryptographic keys of the server used for SSL. Obtaining these keys would allow malicious users to observe all communications on that system, allowing further exploit.

Who is affected by Heartbleed?

According to Netcraft data: although 66% of sites use OpenSSL, only 17% are susceptible to the Heartbleed Bug, as of April 8th, 2014.

Given that this vulnerability has existed for at least two years, an organization that has deployed servers running OpenSSL (versions 1.0.1 through 1.0.1f) during this timeframe is likely vulnerable to the Heartbleed Bug and should take immediate steps to remediate.

Although there have been no successful Heartbleed attacks documented to date, but that does not mean they have not happened. Accordingly, even if your organization is not currently vulnerable, it may have been so in the past and it should be assumed that remediation is required if you have deployed the vulnerable OpenSSL versions.

While the use of OpenSSL is widespread, the impact of Heartbleed is mitigated depending on the configuration of the systems using it.

You are not vulnerable if you are:

  • not using OpenSSL (there are alternatives and many organizations use Hardware Security Modules instead of software implementation of SSL)
  • using OpenSSL compiled without the heartbeat function enabled (this excludes the heartbeat function being exploited in this attack)
  • using OpenSSL 1.0.0 or earlier (this bug was introduced following this release)

How to check for the Heartbleed vulnerability

If you use OpenSSL and are unsure if you are affected, a public test tool is available to quickly confirm if you have the vulnerability. Customers of Lord & Griffin IT Solutions and Trend Micro* customers with the Deep Security for Web Apps can run a full vulnerability scan on their web applications to check for the Heartbleed bug.

Wondering if you are vulnerable? Not sure what to do next? Go to www.trendmicro.com/heartbleed to find out what you need to know now. learn how Trend Micro’s proven security capabilities can help to secure your modern data center and cloud deployments. This includes application vulnerability scanning, SSL certificates, targeted attack detection, and comprehensive server security with critical capabilities like virtual patching to help you quickly address this and other potential issues.

As a IT Solutions and IT Systems leader in security, Lord & Griffin IT Solutions is here to help your Business or Organization better understand the threat of Open SSL Heartbleed and address the possibility of vulnerability, including:

  • Facts about the OpenSSL vulnerability
  • How to find out if you’re affected
  • And what to do if you are impacted

Lord & Griffin IT Solutions is an all-inclusive IT and Web Solutions Company.  We offer services in the following areas: IT Systems Management, IT Systems/Network Service, the utmost in Customer Service, Rural Outsourcing and Web Support in Jackson, MS and Greater Jackson Metro Area (Philadelphia & Choctaw, MS, Meridian, MS and East Mississippi and West Alabama) as well as  and New Orleans, LA and Greater New Orleans-Metairie-Kenner Metro Area (including Baton Rouge, LA).

*Trend Micro -Trusted Lord & Griffin IT Solutions Vendor.

To See IT & Web Services – Services Page

Contact Us –

  1. P.O. Box 6445, Choctaw, MS 39350
  2. 232 Market Street, Flowood, MS 39232 – 3339
  3. 201 St. Charles Avenue, Suite 2500, New Orleans , LA 70170

Phone: 1-888-404-8282
E-Mail: felixg@lordgriffinits.com