Archive for August, 2016

Are you prepared for a data breach?

Are you prepared for a data breach?

Uncategorized | 0 comments

19196909 - hacker typing on a laptop with binary code in backgroundIt seems just about everyday a new business gets hacked. And while thieves tend to go where it’s easiest to steal, even those that have robust security solutions in place end up experiencing a data breach.

Companies such as T-Mobile, Target, Home Depot, Sony, P.F. Chang’s and even the Democratic National Committee have all been hacked. News like this may make it seem that it’s nearly impossible to avoid every security breach, which is why you need to be prepared in case it happens to you.

The best way you can prepare your business is through a Disaster Recovery and Business Continuity plan. This plan will help you stop information from getting stolen, prevent further damage and restore operations as quickly as possible. If you don’t have a disaster recovery plan, you will end up losing a lot of money and may even lose your entire business in the process. In fact, research shows 40 percent of companies that do not have a disaster recovery plan end up going out of business within a year or less of a data breach.

Exactly how the plan will look like is different for every company. At CloudTech1, we will work with you to put a comprehensive plan in place for your entire organization. It will include key components crucial to your recovery and establish a step-by-step formal process to restore business continuity.

The Disaster Recovery and Business Continuity Plan will clearly outline the process for you and your staff. You will do things like contacting your local authorities and insurance carriers, re-establishing phone service, restoring data, sourcing equipment, and anything else needed to restore your organization’s operational capability.

The process of creating such a plan may seem daunting and with so many steps to incorporate, you don’t want to risk missing anything that would be important for your business to include. We can help you get started and work with you to create a plan that will meet the needs of your organization when a disaster hits.

Interested in learning more? Visit our Disaster Recovery and Business Continuity page for more information.

Gotta catch em’ all? Watch out for these security concerns of Pokemon GO.

Gotta catch em’ all? Watch out for these security concerns of Pokemon GO.

Uncategorized | 0 comments

26907504 - happy african american career woman using cell phoneUnless you’ve been hiding under a rock, you know something about Pokemon GO, the new mobile game app from Niantic that allows you to search and capture adorable virtual creatures anywhere in the world.

Due to its high popularity, Pokemon GO is now literally everywhere and chances are, your employees already play the game. According to multiple reports, the game has several security concerns for BYOD. This means that the next time your employees catch Squirtle, Charmander and others, your company’s data could be at risk.

There are two key security concerns of Pokemon GO, including:

Potential Android malware issues

According to Fortune magazine, Pokemon GO has only launched so far in a few countries. This means several mirror apps have been created, which could confuse people into downloading the wrong app. With mirror apps, Android mobile devices have a greater risk for malware. These third-party mirror apps can then in turn use malware to create a backdoor to the smartphone and steal any private data from the user. This could be even more dangerous if the smartphone is a company device or if it’s using company WiFi.

According to a statement in Fortune magazine, a version of the Pokemon GO app “included a remote access tool, or RAT, called Droidjack, which they say can give an attacker ‘full control over a victim’s phone.’”

Possible privacy issues
Multiple reports in early June pointed to a potential flaw when users sign in with their Google account to play the game on an iOS device. The flaw is that when a user signs in, the app then has access to everything in the Google account, including email, pictures and documents without the user’s permission.

According to a statement from Google and Niantic, the two companies are working to remedy the problem. The statement also says Google has verified that only basic profile information (user ID and email address) have been accessed by Google and Niantic.

If you have multiple employees in your company, there is a greater risk that someone is playing Pokemon GO and also doing business on the same mobile device. This may create security issues, but you can safeguard your business with the right tools. CloudTech1 offers network security solutions that can help. Learn more about our solutions here.

Do you have questions about Pokemon GO or any other security concerns? Let us know by leaving a comment.