Antivirus Software and an Expert to Monitor it – the Perfect Combo

Antivirus software has come a long way – but then again, so have viruses! Even though PCs are no longer as susceptible to attacks as they may have been in the past, it’s just as important as ever to have antivirus software running on your computer. Here’s why.

 

Viruses aren’t the only threat anymore

We may feel like we have better control over viruses these days, but viruses are no longer the only threat to our computers and cyber security! Ransomware often enters our computers through phishing emails, and can stop you accessing your files or even disable the PC altogether (and free antivirus software doesn’t protect against ransomware!)

Spyware and Trojans are other modern forms of malware that can severely disable your computer.

Why do I need an Expert monitoring things if I have antivirus software?

Even though software has come a long way and is sometimes smart enough to detect and fix any issues that arise on its own, that’s not always the case and that’s when we would take manual control of things to remove whatever virus or malware found its way onto your computer.

At Info-Tech, we have a dedicated specialist (Harry!) whose first task every morning is to ensure all client systems are in as good of shape as they were when we left the day before.

 

What about laptops?

Previously, any off-site computer could only be scanned once it was back in the office. However, with our solution, every single computer is monitored as soon as it comes online – including laptops, and including those that are off-site (for example, for salespeople or those who work from home). This way everyone is protected and monitored all day, every day.

 

How do I choose the right software for my needs?

We have chosen a software that is good for corporations or individuals, with a console management interface that we monitor for you – ensuring you’re always protected without even realizing it.

There are a lot of options, but we ultimately choose ESET for our clients because of its monitoring capabilities, ease of installation and removal, as well as the fact that the software takes into account available resources on your computer – so it protects, while still maintaining speed and performance of your device. You won’t even know it’s there!

For less than your daily lunch spend, we can have your business protected with a top-of-the-line antivirus software – and monitored by our own in-house expert! The risk of losing all of your data because of a virus or malware is just too great to rely on the free antivirus software pre-installed on your computer. If you’re ready to take the next step and protect your data and your device, send us an email or give us a call today at 514-634-INFO (6436) x 101.

Getting Hacked Isn’t Something That Only Happens to ‘Someone Else’

With the ongoing pandemic affecting almost all businesses, we’ve been talking a lot about cyber security and the importance of ensuring your data is protected to help prevent you from being hacked. Cyber attacks typically increase during chaotic times, so it’s important to ensure your security systems are up-to-date.

It’s also common to think it won’t happen to you and your business. That attacks like that happen to large companies in the states or overseas, or to those dealing with sensitive information. But in early March, the City of Châteauguay, Quebec was the victim of a cyber attack.

Hackers often target municipalities or other organizations by sending phishing emails and using them to gain access to their systems, holding it hostage until they receive a financial payout.

Given that this pandemic is ongoing and there is likely to be more attempted attacks, we thought it was a good time to remind everyone of our top security tips to keep your business from getting hacked, especially with employees working from home.

Ensure All Employees Understand Company Policy

If you read our February blog, you’ll have seen our recommendation to implement an Employee Policy for Safe Use. If you’ve recently made changes to or if it’s been a while since you’ve unveiled yours, now is a good time to have all employees re-read the policy and ensure they are aware of what is expected of them. Your policy should include things like mandatory strong passwords and not opening files sent from emails you don’t recognize.

Ensure All Staff Are Working on Devices With Proper Anti-Malware and Anti-Virus Software

While staff are in your office and working on company computers, it’s easy to ensure data is being accessed and shared across secure devices, but it’s more difficult to manage if employees are working from personal computers at home, making them more susceptible to being hacked. Make it mandatory for all staff to have up-to-date virus and malware protection on their home office equipment.

Ensure Proper Back-up and Recovery Systems Are in Place

You absolutely must have a cloud back-up solution that saves data for you at frequent, regular intervals; this is a minimum for protecting your business. Ideally, you should have a Back-up and Disaster Recovery Device (BDR) with a cloud component. This is the best way to ensure your business is protected in the event of an attack or damage.

Some places are slowly beginning the process of reopening, but it will be a while before it’s ‘business as usual’ again. Take these steps to protect your business from cyber attacks and hopefully we can all get back there sooner rather than later. If you have any questions, give us a call at (514) 634-4636 x 101. We’re always happy to help.

Protect Your Business from a Data Breach With These 5 Tips

If you think the risk of a data breach or cyberattack is low, think again. According to the 2019 Data Breach Investigations Report by Verizon, every industry is at risk: last year, attacks were present from manufacturing to retail and from healthcare to administration, and everything in between. To safeguard your company from data breaches, it’s crucial to understand that not all attacks are from external sources – some are internal, and of course sometimes viruses get through accidentally due to employee mistakes.

No matter your industry, you have a lot to lose: your data, customer base, industry secrets, and proprietary information are all targets for attacks. As a cybersecurity expert in Montreal with 25 years of experience, I’ve put together five easy tips you can implement right away to help protect your business from a data breach.

  1. Implement an Employee Policy for Safe Use (anchor links)
  2. Remote Monitoring and Management Agents
  3. Install Proper Anti-Virus and Anti-Malware Software
  4. Have a Proper Off-Site or Cloud Back-up of All Data
  5. Install a Backup & Disaster Recovery Device

1. Implement an Employee Policy for Safe Use

Many businesses do not have any type of policy in place that sets boundaries for what employees can and cannot do on the internet and in e-mail accounts. To shield your organization from data breaches, your company should create a formal policy which all employees (current and future) need to sign which details information like e-mail best practices, rules for internet browsing, accessing social media sites, and completing personal tasks (like banking) on company time.

2. Remote Monitoring and Management Agents

Having managed IT services, such as Remote Monitoring and Management (RMM) on every computer and server allows your business to be in a proactive rather than reactive position with security threats. Acting as a safeguard against potential data breaches, the RMM can automatically advise your IT support team that there is an imminent disk failure, low disk space, overutilization, and more to ensure it is fixed before you face an IT emergency that prevents your staff from getting work done. Depending on your anti-virus software, RMM can also alert your off-site tech experts when malware is present. Which leads us to…

3. Install Proper Anti-Virus and Anti-Malware Software

When you have a team of IT experts monitoring your network security, a proper business class anti-virus solution will have the ability to alert a central web portal when a virus or malware is present. This is a critical step in protecting your business from data breaches. Because we are monitoring that portal, we’ll be able to tell when a machine has any kind of problem before you or your employees notice. We can then push commands to that computer system to clean it of the virus, and update the anti-virus software if needed. In the case that a virus can’t be cleared through a command sent via the portal, we’ll be able to notify you and your employee, connect manually, and remove it that way.

4. Have a Proper off-site or Cloud Back-up of all Data

At the absolute minimum, your business should have a cloud backup that can safely copy your data for you at regular, frequent intervals. This backup strategy is essential to protect your business from the consequences of a data breach. This way, you have access to a backup in case of a ransomware attack, hardware failure, computer damage, or theft.

5. Install a Backup & Disaster Recovery Device

Hands down, the best thing you can do to make sure your business is protected in the event of any kind of attack or damage, is to install a Backup & Disaster Recovery (BDR) device with a cloud backup component. This comprehensive approach will significantly enhance your ability to protect your business from data breaches. If you have onsite servers, this is especially important. In fact, in our opinion here at Info-Tech Montreal, it’s crucial.

Protect Your Business From a Data Breach Today

Don’t wait for a data breach to strike. Protect your business today! Contact Info-Tech Montreal now for a free security assessment and learn how we can safeguard your valuable data and take the first step towards robust IT security & cybersecurity.

Cyber Crime Stats from BroadbandSearch

cyber crime

10 Things to Know About Cybercrime in 2024

Cybersecurity has become a vital part of online life. At Info-Tech Montreal, an IT security company, we have seen first hand how the landscape of cyber threats continues to evolve, presenting new challenges for individuals and businesses alike. Learn about the scale and scope of these threats and use it to improve your defense. Here are ten alarming cybercrime statistics for 2024 from Broadband Search that highlight the urgency of bolstering online security measures.

1. Cybercrime Damages Predicted to Reach $10.5 Trillion Annually by 2025

A study by Cybersecurity Ventures predicts that cybercrime damages will cost the world $10.5 trillion annually by 2025. This staggering figure underscores the pervasive and escalating nature of cyber threats. It’s a clear indication that both businesses and individuals must prioritize cybersecurity to mitigate potential losses.

2. 15% Increase in Cybercrime Incidents

Cybercrime incidents have climbed by 15% year-over-year, marking a stark escalation from 2022. This increase isn’t just about the numbers; the nature of the threats themselves is changing, with tactics becoming increasingly insidious and outsmarting traditional security protocols.

3. Most Targeted Sectors

Certain sectors are more vulnerable to cyber attacks due to the high value of the data they hold. The most targeted sectors in 2024 include:

  • Government and Administration: Bearing the brunt with 69% of ransomware attacks.
  • Technology: Breach statistics have swelled by 80%.
  • Healthcare: A 167% rise in sophisticated email attacks.
  • Telecommunications: Over 4.5 billion compromised records in 2023.
  • Education: Ransomware attacks surged, hitting 80% of lower and 79% of higher education institutions.

4. Ransomware Attacks on the Rise

Ransomware incidents have skyrocketed by an alarming 40% year-on-year. Attackers are now engaging in “double extortion,” threatening to publish stolen data unless additional demands are met. The average ransom demand has nearly doubled, reaching $1.54 million in 2024.

5. Phishing Attacks Remain Prevalent

Phishing attacks have evolved and now represent an alarming 36% of total cybercrimes. They target a wide range of demographics, including older generations, new internet users, high-level executives, and small business employees. The most common techniques include deceptive phishing, spear phishing, whaling, smishing (SMS phishing), and pharming.

6. Economic Impact of Cybercrimes

The economic shockwaves of cybercrime have been staggering, with global losses estimated to surpass $8 trillion. The United States alone reported losses exceeding $10 billion in 2022. These financial impacts are compounded by diminished productivity, tarnished reputations, and significant recovery costs.

7. Increase in Insider Threats

Insider threats have risen alarmingly, constituting up to 34% of all cyber incidents. These threats exploit trust and access within an organization, making them particularly pernicious. Common types of insider threats include espionage, fraud, terrorism, theft, and negligence.

8. Exploitation of Remote Work

The shift to remote work has extended corporate perimeters into the more vulnerable terrain of home networks. This has led to increased cyberattacks on home networks, with misconfigured firewalls and the use of personal devices presenting significant vulnerabilities. The data points to a critical need for enhanced cybersecurity measures tailored for remote workers.

9. Growing Use of AI in Cyberattacks

Cybercriminals are leveraging artificial intelligence to orchestrate more sophisticated attacks. AI-driven methods include deepfake phishing, AI-powered malware, automated brute-force attacks, social engineering campaigns, and supply chain attacks. This highlights the dual role of AI in both facilitating and combating cyber threats.

10. Increase in Mobile Cyberattacks

Mobile devices have become prime targets for cybercriminals. The increase in mobile cyberattacks underscores the need for robust security measures to protect against vulnerabilities in mobile devices and applications.

Strengthen Your Cybersecurity with Info-Tech Montreal

In light of these alarming statistics, it’s evident that proactive cybersecurity measures are more important than ever. At Info-Tech Montreal, we specialize in managed IT services, including comprehensive cybersecurity solutions tailored to small and medium-sized businesses. Whether you need co-managed support for your existing IT team or a complete managed services package, we have the expertise to protect your organization against evolving cyber threats. Our team of experts is dedicated to making IT simple and accessible, without the jargon.

Contact us now to schedule a consultation and take the first step towards robust cybersecurity.

For more detailed insights and statistics on cybercrime in 2024, visit the original article at BroadbandSearch.

Windows 7 Dies Today: Here’s What You Need to Know

“Microsoft released Windows 7 in October 2009. Now, more than a decade later, it’s being retired. Your Windows 7 PCs will keep working, but Microsoft is no longer issuing security patches as of January 14, 2020.

Windows 7 will keep working normally, just like Windows XP does. If you have a PC running Windows 7 or Windows XP, you can use it on January 15, 2020, just as you could on January 13, 2020. Microsoft won’t stop you from using your PC. You may see some nags informing you that “Your Windows 7 PC is out of support,” but that’s it.

We recommend you avoid using Windows 7. If you do keep using this operating system, it’s now especially important that you have security software (like an antivirus) installed and take steps to secure your PC.”

Click on the link below for more information.

 

Why A Back-Up Disk Alone Isn’t Good Enough to Secure Your Business

If you’re like most business owners, you likely have a back-up disk to restore your server data in the event of an emergency. But did you know a back-up disk isn’t enough to keep you fully protected and minimize downtime? This type of backup is referred to as a ‘data-based’ backup and is simply not good enough anymore. Whether you experience a total loss or repairable damage to your server, having an ‘image-based’ backup device that saves data to the cloud every hour is your best opportunity for getting your team back to work quickly. Here’s why.

Even With A Back-Up Disk, A Total Loss Could Have You Down for 10 Days or more!

If your server is housed in house, you probably have your back-up disk stored in a different location to protect against incidents like theft or water damage. Theoretically, this keeps your data safe in the event of a total loss of the server. However, even if your back-up disk survives the incident that took out your server, it could take as many as 10 business days to get a new server – then we’ve got to re-install everything and THEN restore the data; and without a server, the back-up disk isn’t any help!

We know you can’t be down for that long, but unfortunately that’s how long it takes to:

  1. Receive your new server
  2. Reconfigure the server
  3. Restore/reinstall all the software
  4. Restore the data
  5. Reconnect all of your business’s computers

Even if your server isn’t a total loss, if it isn’t working properly for one reason or another a technician will need to visit your workplace to address those issues before installing the back-up disk. Depending on the problem, this could take a couple days to complete.

Downtime is Expensive

Even if we can fix your server quickly, copying data from the backup disk to your server can take hours. During this time, no one on your team can do anything. That’s time that you are paying your employees while no work is being completed.

According to IBM, the average infrastructure failure costs businesses $100,000 an hour! Talk about a real pull-your-hair-out nightmare

Protect Your Business With An Image-based Backup and Disaster Recovery (BDR) System

At Info-Tech Montreal, we always recommend that our clients move away from a data-based disk backup solution to an image-based BDR solution.

This BDR device creates images of your server – not just the raw data! – and stores it in on the device itself AND in the cloud. If your server goes down for any reason, we can simply ‘startup’ your server with the image we have of it. It is also able to copy images of the server each hour, as opposed to the back-up disk which usually only backs up each evening, sometimes only each week.

This means if, for example, an employee accidentally downloads a virus that affects everything, we can restore everyone’s files up to the most recent hour.

If you have questions about your disaster recovery plan, need to know how much it would cost you to be down, or if you’re simply interested in learning more about our services to help minimize your downtime, contact us today! We’re always happy to chat and find a solution that works best for you.

How to Use One Drive’s “Personal Vault” to Secure Your Files

“Microsoft’s OneDrive cloud storage service now includes a “Personal Vault” for your sensitive files. These files are encrypted and protected with additional two-factor verification, even when they’re synced to your Windows 10 PC.

OneDrive’s Personal Vault became available worldwide on September 30, 2019. It works on Windows 10, Android, iPhone, iPad, and the web.”

Click on the link below to learn more.

 

customized solutions for your business

Why You Need A Virtual I.T. Guy And Remote Monitoring

When it comes to technology, we expect it to do its main job – make our lives easier and make it easier now. So when you’re sitting in the office and something suddenly pops up that puts a wrench in your busiest day of the week (because that’s when it always happens) what do you do? Who do you call? With Info-Tech, one of the most popular services we offer is remote monitoring and management. Our remote monitoring and management services ensure you are never alone. We offer an entire team of I.T. experts for less than the cost of a full time ‘generalist’. Not convinced? Here are a few main benefits to our remote monitoring and management services.

Get More For Less

If your business has grown beyond a handful of employees and you’re considering hiring a full-time tech to keep things running smoothly, you may want to consider our remote monitoring services instead. For less than the cost of a full-time salaried employee, with Info-Tech Montreal you get a full team of experts, including a dedicated support technician, to handle all of your I.T. needs. The best part? Because we work remotely, you never have to see us!

Solutions Without Disrupting Your Day

Not only can we keep your systems running smoothly, we do our work behind the scenes to minimize the disruption on your day-to-day work. When needed, your support-tech simply connects to your server or PC using remote access software. This allows us to trouble-shoot whatever issues your systems may be having, while you continue to go about your day – you and your employees won’t even know we’re there! Of course, we always check beforehand to make sure we can connect and not disturb some work in progress!

We know that time is money when it comes to running a business, so if there is ever any downtime, we understand the negative impact that can have on your company and your bottom line. Our team of I.T. professionals work quickly and efficiently to get you back up to speed as soon as possible, with pro-active monitoring and ease of remote connections; minimizing that downtime is our priority!

Stay Focused On Your Business

Let’s face it – as a business owner, you have a million things on your plate. Worrying about why your computers and servers aren’t working properly shouldn’t be one of them, so let us take that off your hands. We design and set-up remote monitoring to detect and quickly repair problems, so we can be repairing any issues that might arise before you are even aware of them. In the meantime, your day continues without any of the speed bumps traditionally caused by those system failures. Plus, not only are we watching your system’s back-end, but we’re always keeping an eye on changes occurring in the industry, so you don’t have to worry about your environment staying up-to-date. Let us be the experts for your I.T. services, so you can continue being the expert for your clients.

When your staff are able to work without disruption and any issues that do arise are taken care of quickly, quietly, and remotely, you get peace of mind.

Curious about what may be going on with your company’s I.T.? Do not hesitate to contact us today! Let us help you relieve that unnecessary stress with our remote monitoring services.

How to Tighten all your iPhone’s Privacy Settings

It is always a good idea to review your privacy settings on any device. Most often with apps, when you download them, they always need access to something before being able to work. You would almost always grant the access to use the app properly, but there are ways to control your data and how it is shared. Here is a detailed article on how to review and change your privacy settings specific to iPhone. Click on the link below.

Desjardins Files Leaked

Call Now Button