As businesses become more and more connected to the internet, the threat of a data breach only increases. A study conducting by the University of Maryland in 2017 discovered that, on average, computers with internet access are attacked every 39 seconds. While this figure may be worrisome, this should come as no surprise to most. As technology continues to progress, becoming more and more a part of not only businesses but individual’s lives as well, criminals will try harder and faster to obtain access to confidential information. These attacks are not cheap either. A study conducted by IBM found that on average, a cyberattack can cost $3.86 million. This number does not just reflect the damage the breach cost, but it also factors in loss of business, time spent on recovering, and damage to reputation. Taking steps to prevent an attack from happening is imperative. One must have the proper equipment and policies set in place in order to counter cyberattacks. However, attackers are becoming smarter, more resourceful, faster, more aggressive. Many of them are also playing the long game as well. Lying dormant in a companies, or individual’s computers or server, waiting for the perfect moment to attack. While cyber security specialists are doing there best to stay 1-step ahead of criminals, there is only so much that can be done. Therefore, instead of playing a game of cat and mouse with attackers, cyber security specialists should be turning their attention towards using machine learning and AI to aid them in this constantly evolving battle. Why Machine Learning and AI Should Be Recruited Cybersecurity usually relies on methods of created static rules and policies that act as barriers to attackers. These barriers, regardless of how strongly built, are susceptible to cracks and leaks, allowing for unwanted guests to enter. This creates a constant game of catch up, rather than enforcing constant protection. This is especially true since cyber criminals are constantly evolving their viruses, making them stronger and harder to detect. If rules are not kept up to date, and scheduled maintenance is not regularly done, disaster can strike at any moment. Machine learning and AI can help level the playing field. Even though cyber security specialists will remain as the last line of defense against attacks, AI and machine learning can be used as the first line of defense. AI and machine learning are constantly updating and learning, feeding off information from databases about cybersecurity and networking, as well as information from its experiences while deployed. AI and machine learning add automation to your cybersecurity team, aiding them in evolving and keeping your data safe from criminals. Hammett Technologies is specialized in cybersecurity, using only the latest cybersecurity software and hardware to keep your data safe. When you partner with Hammett Technologies, you hire a partner who learns your employees, your business, and your process.
Ransomware is one of the most dangerous computer viruses in the computer world today. It would not be surprising if many of you, regardless of your background knowledge of computers, have heard of ransomware to some extent. Perhaps it has been through the numerous cities that have been hit, or maybe it was because of the few schools that have begun to be targeted by this disastrous virus. With ransomware on the rise, more and more businesses are being targeted. In order to keep your business’s sensitive information safe, taking preventative measures immediately is the best course of action to ensure your computer systems are not held for ransom. Setting up your Defenses Running Backups One of the most important steps, one often disregarded by many businesses, is ensuring that all computer systems are backed up daily. In the event that your network becomes infected with ransomware, having backups of critical information systems and configurations can save millions of dollars in lost revenue. Educate and Reinforce Basic Cybersecurity Awareness Ransomware needs a human element in order to infect a computer system or network. Therefore, proper and regular training of staff on how to spot phishing emails and suspicious files is essential to a business’s overall cybersecurity. Ensure that staff understands “think before click” and the dangers of downloading attachments from unknown senders. Make sure staff are browsing safely as well and know how to spot fake websites. Fake websites can look strikingly similar to the real ones but often have variations in their URL, which give away their true identities. Make sure employees are suspicious of anyone on the phone or email asking for sensitive information. Always ensure you are communicating with a trusted individual before divulging sensitive information. Have a Plan in Place in the Event of an Attack Make sure a clear plan is established in the event an attack does occur. Ensure response plans outline how to request outside assistance from cyber first responders (state agencies, CISA, and MS-ISAC). Update and Patch Systems Regularly updating and patching computer systems not only keeps the systems running smoothly, but it also protects against viruses such as ransomware. Additional Resources Once all the above is completed, consider reviewing the following articles: MS-ISAC Security Primer – Ransomware CISA Tip Sheet on Ransomware NGA Disruption Response Planning Memo NASCIO Cyber Disruption Planning Guide Each article outlines further steps you can take to protect yourself from ransomware. A Trusted Defense If any of the above worries you, consider calling Hammett Technologies. We are a trusted IT company and are well versed in the dangers of all computer viruses, not just ransomware. We use only the latest technology to ensure your business’s safety, regularly backup all your systems, and train your staff on safety procedures when handling information online. When you partner with Hammett Technologies you do not become just a partner, you become a priority. If you want more information as to what we can do to assist your company, click here!
If you are in the health care business, chances are you have heard the phrase “HIPAA Compliance” before. However, what you may not know is how truly important HIPAA Compliance is for your business, or even what HIPAA Compliance is. No need to worry; Hammett Technologies is here to help! What is HIPAA Compliance HIPAA or the Health Insurance Portability and Accountability Act was is a set of rules and restrictions established to outline the lawful use and disclosure of Protected Health Information (PHI). *a more complex outline of HIPAA can be found here: https://www.hammett-tech.com/how-we-protect-you/hippa-compliance/ Why Being HIPAA Compliant Is Important If you are in the healthcare business, there are numerous reason you should be HIPAA Compliant. From lawsuits to fines from the government, HIPAA Compliance is to be taken seriously and followed completely. Some of the most important reason to be HIPAA Complaint are: Fines Fines for not meetings HIPAA Compliance have increased substantially. These caps on these fines have increased from $25,000 per year to $1,500,000 per year. Furthermore, if you ignore HIPAA Compliance and encounter a breach or receive a complaint, your business can be investigated for breaches, compliance failures, and other issues which can lead to further fines. Other Organizations Other organizations that work with you are most likely HIPAA Compliant themselves, especially if they are a larger corporation. Each Business Associate or Covered Entity your healthcare business works with must following HIPAA Privacy and Security Rules. This, in turn, means that if your business if not HIPAA Compliant you will lose their assistance, as well as, lose business in general. Blacklisted If a breach does occur, and the breach results in more than 500 individual’s Protected Health Information being affected, your business is required by law to report it to the Health & Human Services Department, as well as, the public and media. Other companies will not hold back comparing their HIPAA Compliant organization to yours, stealing both business in the present and future. If you are fearful that you do not meet all the HIPAA guidelines and regulations or are having trouble understanding HIPAA Compliance and how to become compliant, call Hammett Technologies! We have a devoted, professional IT team that can help you meet all HIPAA requirements stress free! HIPAA Compliance is essential for any business that handles Protect Health Information. Hammett Technologies will ensure that your business meets every requirement.
Microsoft is pulling the plug on its widely loved operating system (OS), Windows 7, in January 2020. Therefore, it is important that you know how to upgrade to their latest OS, Windows 10. Why should you upgrade? Well, when Windows 7 gets discontinued, Microsoft will no longer offer support or update the OS, leaving you vulnerable to exploits and other security risks. Those of you that are worried that Windows 10 will have a steep learning curve, fret not! Windows 10 is very similar to its older brother Windows 7. I have to admit, there are a few differences between the two, such as Windows 10’s revamped settings panel, and the new start menu. However, if you are worried that Windows 7 and Windows 10 would be polar opposites like Windows 7 and Windows 8, rest easy, nothing could ever be that bad again. This guide aims to ease you through upgrading your OS. Once you finish with these steps, you’ll be well on your way to Windows 10! Check List Minimum Requirements for Windows 10 If you are worried you may be on this list, think about the following question. Did you purchase your computer after 2014? If you answered yes to this question, chances are your machine is more than capable of running Windows 10. For those of you running older machines, consider purchasing a new computer. Many of them come preloaded with Windows 10, and besides the upgraded OS, you will also be greeted with high speeds, better resolution, and overall better user experience. Processor 1GHz or Faster CPU or System on a Chip (SoC) RAM 1GB for 32-bit or 2GB for 64-bit Hard Drive Space Existing installations: 16GB for 32-bit or 20GB for 64-bit. Clean installation or new PC: 32GB or larger Graphics DirectX9 or later with WDDM 1.0 driver Display Resolution 800 x 600 Network Wi-Fi or Ethernet connection Before upgrading it is also important that you have the latest version of Windows 7 installed on your machine as well. Be sure to check for updates on your machine and to download the “Windows 7 Service Pack 1” if you do not have that already installed on your machine. Also, and it pains me to say this to you if you have waited this long to upgrade to Windows 10, it is no longer free. However, online retailer Newegg will make the upgrade expense less painful for you by offering both the Home edition and Pro edition of Windows 10 at a discounted price! The cost of a new Windows 10 license goes for $109.99 (Home) and $149.99 (Pro) on Newegg. Furthermore, make sure you have an up-to-date backup or system image of your computer before upgrading. Microsoft has certainly improved in its upgrade process, but it is better to be safe than sorry. Follow this guide on Bleeping Computer to learn how to create a backup of your Windows 7 computer! One last thing, I promise. Before you start, it is recommended that any anti-virus software you have installed be removed as this can sometimes cause interference with this upgrade. Make sure that all peripherals are also unplugged from the computer while it is updating, as these too can sometimes cause errors. Upgrading Download and Install the Media Creation Tool Make sure you have your Windows 10 license activation code ready Double-click on the MediaCreationTool.exe to begin the Windows 10 upgrade setup Accept the licensing agreement Select “Upgrade this PC now” option and the necessary files will begin downloading to begin the upgrade. Once finished, click Next Enter your valid Windows 10 product key (Home or Pro) Select Next Accept the licensing agreement Select “Keep personal files and apps” option Select Install Are you wondering what Hammett Technologies can do to continue to help your company grow? Our team of trained professionals works diligently to ensure that your network continues to run smoothly and securely! Click here to learn more about what we do!
If you are like many users, you visit many different sites and have a plethora of passwords between those sites. The idea of creating a strong password consisting of letters, numbers, special characters, symbols, etc., can be quite daunting. Not to mention it is recommended that you have a different password for each site your register an account on. With all of this considered, it is no wonder many become overwhelmed when trying to think of a secure password. I mean, who can remember “J%^dh@udS!@#$”? Because of this, you may have fallen victim to using the same password for most, if not all, of the websites you hold an account on. This is not only a safety hazard, it also spells disasters if one of these websites gets compromised. Or perhaps you use numerous passwords, but they consist of simple words and numbers that relate to your life. These kinds of passwords are easier to guess than you can imagine. Maybe you do have long, complicated passwords, but in an attempt to remember them you have written them down and placed them next to your computers. This is dangerous as well, especially if other use your computer as well! However, with this guide, we hope to guide you down the right path to making safe, secure, and easy to remember passwords! First, to understand what a strong password is, we must understand what makes a password strong. The key features of a strong password are its length, a variety of letters (using both upper and lower case), symbols, and numbers. Make sure you leave all personal information out of your password. However, what is the use of a complicated strong password, if you cannot remember it? Not to worry, we will arm you with advanced password creating techniques that will not only keep your online identity secure! Your first strategy in creating a strong password is to make it easy to remember but hard to guess. Avoid the pitfalls of making your password “password”. This password is laughably weak. A password this simple is easily guessed by both humans and machines and will leave your online identity in shambles. Some of you may be asking, “Who on Earth is using “password” as a password?”. Well you would be surprised to know that it is one of the most commonly used passwords to date. There are also the passwords that use a persons last name and birth date. These kinds of passwords are also easy to crack by those who are close to you. I know your neighbor Bill seems like a nice guy, but maybe he’s too nice. However, perhaps you have been trying to make a strong password and have created “P0W3Rful”. First you must be aware of the length. Length of this password is far to short and the substitutions you have made are easily guessed by both human and machine as well. Now that we are aware of the numerous pitfalls, we can begin to discuss how to create a strong password! Here are a few examples of good passwords: G00D_2H4v3_$$: You could use this one for a bank account (Good to have money). 4sh00Ping_0NAMZ: This could be used for your Amazon account (4 shopping on amazon). Having now thought of a password that is perfect in length and randomness, you have begun your march down the correct path to internet safety. However, you are not safe yet. You must remember to not reuse the password, write them down anywhere, or share them. After spending all that time thinking of a good password, last thing you want is for someone to crack it by seeing it written down next to your computer. Or if you are to get hacked, at least you can rest easy knowing your other accounts are still locked away because you used a different password for each site! The last rule is extremely important but can also be given some slack. If you are to share your password, make sure that you only do so with someone you trust 100%. If you have even a shred of doubt that they do not take internet security as seriously as you, do not share your password with them. Another option for those who have too many accounts, or are too nervous to create their own passwords, is to use a password manager! Password managers like LastPass can generate completely random passwords up too 100 characters in length. All you must do is think of a super secure master password and you are ready to go! Now that you have been armed with the tools to create smarter, safer passwords, go forth and secure your defenses! If you have any questions about cyber security or want a partner that will take your businesses cyber security seriously, consider Hammett Technologies! At Hammett Technologies we put your online security as a top priority. Be with a team you can trust, become a Hammett Technologies Partner today!
As the demand for experienced cyber security workers increases, our national security decreases. Some analysts believe that by as early as next year there could be a global shortage of cybersecurity professionals. With cyber-attacks becoming an increasing threat, enlisting and training a new generation of well-versed cyber security experts, as well as training current workers in the field, will aid in not only restoring the confidence of those who use the internet, but those who are just starting to experience the world wide web. Rebuilding our defenses online is the first step to a stronger, more confident nation. Some of you may be wondering what you can do to help, and the answer is simple! The National Cyber Security Alliance and the U.S. Department of Homeland Security both urge parents, teachers, and employers to motivate potential talent to pursue a career in cyber security. A cyber security professional needs an understanding that goes deeper than just math and technology. They need to be curious, passionate about learning, have a strong ethic and moral compass and be aware of the risks that come with the job. While all these ideas play an important role, at the end of the day, a profession in cyber security means having a passion in keeping our online world more secure and safer for all. To those who are worried about a boring job, fret not, for you will be at the front lines. While cyber security experts are behind the scenes, the roles they play impact our digital lives in big ways. Cyber security experts tackle catastrophic issues before they can detonate, causing massive issues for the internet. This profession is dedicated to protecting those online, keeping them more secure and safer from any threats they may face. A profession in cyber security builds important team-based skills and provides an environment for one to continue to learn and improve in skill. If you believe your student or child to be interesting in cyber security, there are steps you can take to aid them! You could volunteer at school or set up community workshops that help to teach children and adults about online safety and a career in cyber security. Try exposing students or your children to the opportunities in the field of cyber security by hosting an open house at your company to talk about what your cyber security department does. Inspire children to learn about cyber security by mentoring a team in a cyber challenge or hosting events and after school programs. Work with schools or community organizations to create an internship program for hands-on learning. For parents, become knowledgeable about the educational steps to a career in cyber security and about organizations that host events for cyber security. For those in college searching for a job in cyber security, get credentials. Four out of five cyber security jobs require a college degree. Do volunteer work and internships so that you can become more experienced in the field itself. Offer help to you IT professors at college or employer to gain more experience. Read about the latest advancements and breaches regarding cyber security. Pay attention to how these breaches occur and how they were fixed. If you are interested but not sure if cyber security is right for you, take a look at the National Initiative for Cyber security Careers and Studies (NICCS). NICCS has career resources for learning more about jobs in the field, as well as guides for learning about how to join a cyber security team! At Hammett Technologies we put your online security as a top priority. We treat your network as our own, with regular maintenance and updates to keep your company’s data secure. Be with a team you can trust, become a Hammett Technologies Partner today! Still curious as to what we can do to help your company grow? Click here to find out more!
If you are like most computer users, you have a small armada of passwords for the plethora of accounts you have. With that many accounts and passwords surely, things will be forgotten and lost. Then you must go through the hassle of continually resetting the password every time this occurs! Now you could opt to use similar passwords for all your accounts, but then you run the risk of not just one but all your accounts being compromised. Or you could use different passwords for every website and always click the “Remember Me” button. Still, again, if some unauthorized user accesses to your machine, they have no issue logging in to all your accounts. I know what you are thinking, “Why don’t I just write them all down?” That is a good idea; however, are you willing to carry that book with you everywhere you go? What if you lose it at the house or lose it when you are out in public? Thankfully, there is help. Password managers enable you to keep track of your passwords and accounts without having to remember them all. The added benefit is that password managers can create extremely complex passwords for your accounts, ranging from 20+ characters, including symbols, numbers, and capital letters! Furthermore, most password managers have an autofill feature, meaning you no longer have to use “Remember Me.” What’s the catch? There is none! The only password you are responsible for is your “Master Password,” so make sure it is incredibly secure! You will use this master password to log yourself into the password manager, granting you access to all your passwords and accounts. One of our personal favorites is LastPass. LastPass flawlessly integrates with most browsers (Chrome, Firefox, Opera, etc.) as a browser extension. But don’t take our word for it, go and give them a try! If you are worried about LastPass getting breached, a legitimate concern to have, worry not. LastPass does not personally store your passwords. While they may be stored on a server LastPass owns, the passwords are encrypted to ensure that even in the event of a data breach, hackers cannot uncover anything that may damage users. If you are worried about password managers, please do not hesitate to reach out to us! We are more than willing to answer any questions you may have to help ease your concerns. I think password managers are great. They allow the user to create extremely complex passwords without the worry of having to keep them written down or stored in one’s memory. They make the day-to-day web browsing much more comfortable and more convenient.
Have you ever wanted a little more background information on an image you’ve seen online? Have you ever found an image and wished you could find others similar to it? Well, Google Images has a feature that allows just that, and it does its job quite well! Their engine allows users to reverse image search, letting users find the original image and ones similar! For instance, let’s say you stumble across this image of a mountain. You find the particular image quite stunning, but the website or post you found it on does not provide any information about its location or name! Here is where Google’s reverse image search engine comes in handy! To access Google’s reverse image search engine, first, you must navigate to Google Images. Once there, click on the little camera icon found within the search bar. From there, you get two options: You could paste an image’s URL, or you could upload an image from your computer. I find that downloading the image to my computer and then uploading it is much more convenient. Once completed, Google scours the internet in search of images similar to the one you upload, as well as attempt to locate its name for you! As you can see from our search results, the picture in question was Mount Everest! Now I know the name of this mysterious mountain as well as have the ability to view images that are similar to the one I uploaded! It is important to note that Google’s reverse image search is not perfect. When someone posts a picture online, any slight changes made to the picture could throw off the engine’s ability to accurately detect what the image is conveying. However, I find it quite useful from time to time and recommend that the next time you want to find a little more information about a picture, you give it a try!
When it comes to saving money, it is vital that you have an overview of all your company’s expenses. While this may seem obvious to some, there are many who believe they already have a good idea of their company’s expenses. We cannot stress enough, no matter how much of an idea you believe to have of your organization’s expenses, consult with your financial partner. You may be surprised with how much money your organization actually spends. Consulting with Your Financial Partner Even though you may feel certain that you have a good idea of how much money your organization is spending, it is important to ensure that you are accurate in your estimates. By consulting with your business’s financial partner, you can ensure that your company’s funds are being spent accordingly and efficiently, without leaving anything up in the air. When getting the big picture of your company’s expenses, leave no stone unturned. Review all expenses, making sure you know exactly how much money is being spent and which areas need to be focused on the most in order to save the most money. By doing this, you can ensure your company can remain in good financial standing, without the worry of unnecessary expenses. Hammett Technologies is Your Company’s IT Department As we have stated multiple times before, when it comes to understanding cybersecurity and technology, Hammett Technologies is the expert. Our team has worked with numerous organizations, from government contracts to small, family-owned, businesses. We understand how important it is to balance the budget to ensure that a company, regardless of size, is able to operate efficiently and securely. Therefore, by choosing Hammett Technologies, you not only gain a powerful cybersecurity team and IT support, but you also gain a partner who is conscious of your business budget and will work with you to obtain the best materials that are within your price range.
New ransomware, Nemty, has been discovered according to the report from BleepingComputer. Nemty, as security researchers are calling it, has the possibility to spread using compromised Remote Desktop Protocol (RDP) connections. Nemty, like all other ransomware, holds the victim’s files hostage, deleting all shadow versions of the files while disabling the victim from any attempted recovery options. Payment is then required via bitcoins, which average about $1,000. Those infected will be prompted with this message: Unfortunately, being so new, a known fix is not available, but security researchers are working diligently to find a fix. While RDP is suspected to be the method of distribution for the ransomware, researchers have not yet confirmed this finding. Most ransomware is distributed through phishing emails. If RDP is the method of distribution, confirming hackers have gained higher access to the machine, cutting out the middleman, and giving them full control of the computer. If you would like to find out more about how Hammett Technologies can keep your company safe, click here!