Wednesday, March 30, 2022

Your employee quit your organization Make sure your data hasn’t

Your employee quit your organization. Make sure your data hasn’t

When someone new joins your organization, how do you manage their onboarding? Chances are, you already have processes in place for everything. The employee paperwork is taken care of by the HR, the on-floor assistance and other training is probably provided by a senior team member or the training and development team, and your IT team or MSP handles their IT/computer setup. But, what happens when they are leaving the organization. Is your off-boarding process just as meticulous?

Businesses pay a lot of attention to data safety and security when employees are handling their data, but often overlook the same when it comes to outgoing employees. But, outgoing employees can be a threat to your organization’s data security.You never know when a disgruntled employee may actually go out of their way to intentionally harm your business by stealing (and later misusing or selling) or destroying your data. Even if an employee is parting ways with your company on good terms, and you trust them, there’s still a need to ensure your data security is not compromised at the time of their off-boarding. Some ways to do this are
  • Revoke access to any company accounts that the outgoing employee may have. This includes email addresses, applications and software used for work purposes, server, shared drives/folders etc. You can revoke access, restrict access to their user ID or delete their account.
  • Change any shared passwords
  • Inform vendors and other organizations that they have been dealing with on your company’s behalf, that they will no longer be working with you, so they shouldn’t be entertaining any requests for data or access, and also let them know of the person who will be taking over their role
  • Take charge of their computer and other devices and perform an audit to ensure there has been no unauthorized data sharing or transfer
  • Ensure they are not leaving the premises with any hardware such as pen drives that may contain sensitive information
  • Monitor your IT network for any unusual activity
You need to implement the above mentioned steps to ensure your data stays safe irrespective of who leaves your organization. While some may argue that it may seem like not trusting their own employees, it is essential. At the end of the day, when it comes to data security and safety, you can’t leave anything to chance, because the stakes are far too high. A single data leak or misuse may cost you a lot--not just in terms of penalties, lawsuit settlements and fines, but also your brand image and customers.

Wednesday, March 23, 2022

VPN 101: Remote access and safety

VPN 101: Remote access and safety

As we know, the Coronavirus pandemic has brought about a paradigm shift in the way businesses function. Home is now, ‘The Office’. With WFH taking root, companies and employees alike are experiencing so many benefits that it looks like it is here to stay. This has given a boost to various technologies that enable businesses to operate smoothly in the WFH environment. Examples include video conferencing applications such as Zoom, Microsoft Teams, Google Meet, Cloud data storage options, VoIP, etc., In this blog, we discuss one such technology, Virtual Private Networks, more commonly known as VPN.

A VPN or virtual private network is a mechanism to connect to private IT networks using the internet. This gives you the ability to access private networks remotely, yet safely. Thus VPNs play a key role in the remote operations model. Using remote access VPN, employees can access their ‘work computers’ using the remote desktop mechanism. Plus, using VPNs to access data adds an additional layer of security. Here’s how-
  • VPNs don’t allow third parties to track the user’s IP, location from which they are accessing or their online activity
  • Unlike the regular browsers, VPNs don’t store browsing history, recent activity logs, log-in credentials, etc.,
  • If there is a glitch in the secure connection offered by the VPN, the connection is automatically cut instantly, instead of allowing the user to browse unsafely
VPNs need not be limited for work purposes alone. As you can see, considering the various benefits discussed above, it makes sense to use a VPN when online for personal purposes. Especially if you are using a public network such as the WiFi network at airports, malls, coffee shops, etc. Also, since home networks are less secure compared to business networks, it is a good idea to use VPN when performing activities that may involve financial transactions such as online banking, insurance renewals, or even when shopping online. (Your credit card details could be stolen as you are busy purchasing that pair of shoes on sale!)

A word of caution, though. There are many VPN services available in the market, and a lot of free ones too. While some are genuine, there have been cases where cyber criminals have masked a malware to seem like a VPN application and used it to steal sensitive information. So, make sure you do your research before downloading a ‘Free VPN’ application for personal use. If you are a business owner, then you should absolutely opt for a paid, trusted VPN service. Your MSP will be able to recommend one that’s right for you.

Wednesday, March 16, 2022

System and software updates: Why you shouldn’t be skipping them for later

System & software updates: Why you shouldn’t be skipping them for later

We all know how annoying it can be when you get a pop-up asking if you’d like to update it or worse still, your system starts to update itself. The general tendency is to put it off until the next time you log onto your device, when you put it off again. We have all experienced it at some point or another, when we are on that important call or have to reply to an urgent email and decide a system update is just not worth the time. But, did you know that it is important to update your computer’s operating system in a timely manner? And that’s not just for your computer, the same applies to your mobile phones, iPads and other tablets too. In fact, there are updates for various software programs and apps that should be installed too.

System and application vendors such as Microsoft, Apple, Adobe, etc., release security updates and patches almost every month, and sometimes, several times during a month.

What are the benefits of installing these patches/system updates?

Safety and security of your data
Cybercriminals are constantly on the lookout to exploit any weakness that software programs may have, to gain entry into your IT network or system. Vendors, on the other hand, have teams that are constantly on the lookout for such weaknesses and work on developing security patches that plug these gaps, so your device/network remains safe and secure. Skipping system/software updates can make you vulnerable to cyber attacks and compromise on the safety and security of your data.

Ensures your device is working at its best
Apart from the security patches, there may also be bug-fixes and enhancements that may be released as a part of the software/system update. Not installing bug-fixes and enhancements means your device won’t be performing at its optimal level and may crash or slow things down. It may also result in compatibility issues when it comes to other programs or applications.

As a business it can be difficult to keep up with software updates, security patches and upgrades, and implement it across your entire organization. Having a service level agreement with an MSP will ensure that all your business devices are updated, patched and secure.

Wednesday, March 9, 2022

A “Free” Covid Vaccine can give you a virus (and infect your IT network)

A “Free” Covid Vaccine can give you a virus (and infect your IT network)

With the pandemic still raging in most parts of the world, cybercriminals have come up with yet another novel technique to lure unsuspecting victims and steal their data--the free Covid-19Vaccine scam. This is how it typically works.

You get an email or a text message that says you are eligible to receive the vaccine for Covid-19 free of cost. The message will have a link which will take you to a form, where you may be asked for your personal information. Once you fill that in and hit submit, cybercriminals have access to your PII (Personally identifiable information) and can virtually wreck havoc now.

There have been some variations of this message, one being a rebate offer, where you are asked to “book” or “preorder” your vaccine by paying for it online, with a promise of credit/rebate/refund in a week. Not only will your card be charged for the “cost of the vaccine”, your card details may also be stolen using secret key loggers, and the damage to your credit may be much more than the amount you were actually billed for.

Why should you be wary of this, as a business?

So, if the scam seems to target individuals, why is it important for businesses to be aware of this? Well, for the simple reason that you need to alert your employees to this. With the pandemic having almost completely changed the typical office set up and more and more people working remotely, using their own devices for work purposes, there’s a chance that an employee who falls for the vaccine scam may end up compromising your company’s data unknowingly. If a cybercriminal gets access to their device, chances are high that they will most likely have a gateway to your IT network and subsequently, your data.

What can you do?

Data safety is not just about getting the best antivirus software, it is also about people who have access to your data. Apart from installing anti-malware software programs and firewalls, educate your employees about the COVID-19 vaccine scams that are in play. Help them identify phishing scams and conduct mock drills and tests to assess their understanding of the concept.

No time to do all this by yourself? NetWerks Strategic Services, LLC is an experienced Managed service provider with extensive experience in cybersecurity. We can help you keep your data safe by deploying the latest technology and also by training your employees to identify hacking and phishing attempts BEFORE they become a victim.

Wednesday, March 2, 2022

Cyber Security training basics: Password best practices

Cyber Security training basics: Password best practices & phishing identification

As a business you know the importance of ensuring that your data is safe from the prying eyes of cyber criminals. While anti malware software programs and firewalls are essential to doing this, another important element is, training your employees to identify the traps laid by cyber criminals. This blog offers a list of what you should cover in cybersecurity awareness training.

Password best practices

This should be number one on your list. The easiest way to steal your data is by stealing your password. Hence you should educate your employees on password best practices. They should know
  • Not to share passwords
  • How to share passwords safely (if at all it has to be done)
  • How to set strong passwords
  • The importance of changing passwords often
  • Your organization’s rules regarding passwords, i.e. your password policy and associated penalties/actions that will be taken if they fail to adhere to it
You could also invest in a password tool as it will help you enforce your password policy better.


Train your employees to identify phishing attempts. Phishing is when cyber criminals pose as someone trustworthy and attempt to steal data. Studies show that the number one reason businesses become victims of cybercrime is because their employees fail to recognize a phishing attempt. For example an email may be disguised to look as though it came from a coworker or vendor, or even a government agency such as the IRS, and may contain a request for sensitive information. Some may have attachments that the receiver may open unknowingly and end up infecting the whole network with malware. Though anti-malware software programs generally identify such communication and either mark them as spam or issue warnings when the receiver tries to open them or download the attachment, training your employees to recognize phishing attempts is very important, because even a single email that slips through the crack can result in a huge disaster.

Remember this is not a one-time thing. Cybercriminals are always at work devising new strategies to steal your data. You need to train new employees as they join your organization and update your existing employees with any new cybercrime modus operandi. You can offload this task to an experienced managed service provider who specializes in cyber security. Being a part of the industry, they would generally be up-to-date with the latest risks and advise you and your team accordingly.