+353 49 4360080

Cinnte Technologies Achieves IT Security Cyber Essentials Award- Global Industry Standard in IT Security and data protection

We at Cinnte Technologies are pleased to announce our recent award in being a certified IT Security Cyber Essentials’ company. 

The reason we the went through this rigorous IT security and data protection process, is to reassure customers that we take cyber security seriously. We recently wrote about mobile IT security for mobile phones used for businss purposes here.

We want to help  small and medium sized businesses (SMEs) who can be assured that we are serious and ceritfied in providing  IT security.

We have numerous  IT security measures in place which we then help our clients implement. We are GDPR experts and help new and established small businesses to implement GDPR compliant policies to protect their data and their client’s data. We are serious about IT security and about data protection here at Cinnte Technologies.

 

The Crest Cyber Essentials’ includes five important control pillars which can shield organisations from data breaches, hacking and internal data leaks. These are; firewall and internet gateways, secure configuration, access control, malware protection and patch management and software updates.

You can learn more about the entire specifics of the Cyber Essentials here. Do you want the best IT security and data protection in your business here and what it means to protect your business from IT security threats?

If the answer is yes, then, we at Cinnte Technologies, recommend this certification for all businesses.

We can advise and help to implement many or all Cyber Essentials for IT security and data protection. Please get in touch if you would like help setting up stronger IT security, data protection and GDPR policies and mechanisms in your business. If you are based in Cavan, Monaghan, Meath or West Dublin, please get in touch with us today to book a FREE CONSULTATION. This is guaranteed to improve your IT security and get your business Cyber Essentials certified.

Email us at danny@cinnte.ie or call 0494360080. Alternatively, click the link below and sign up for your free IT Security consultation!

Fill out the Form below to Book Your Free IT Security Consultation today

5 Overlooked IT Security Measures All Small Businesses Must Have in Place When Using Mobile Devices

1. You must implement a mobile device policy –

If you as a small business owner want a safe network, we are of the view that you must have strong IT security for mobile phones.We at Cinnte think tahat this is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone?

If your phone is lost or stolen, are you permitted to remotely wipe the device – which would delete all of that employee’s photos, videos, texts, etc. This is to ensure YOUR clients’ information isn’t compromised? Cisco have written about mobile device security for business recently.

Further, if your data in your organization is highly sensitive, such as patient records, credit card information, financial information and the likes, you may not be legally permitted to allow employees to access it. Especially on devices that are not secured, but that doesn’t mean an employee might not innocently “take work home.” If it’s a company-owned device, you need to detail what an employee can and cannot do with that device. This is including “rooting” or “jail-breaking” the device to get around security procedures you put in place.

2. You require STRONG passwords and passcodes to lock mobile devices-

We recommend that passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number. On a cell phone, requiring a passcode to be entered will go a long way in preventing a stolen device from being compromised. IT security for mobile has never been more important of over 50% of businesses using mobile to access work related data.

3. Require all mobile devices be encrypted-

We believe that encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that unlocks. We recently wrote about how hackers can access and use your business data on thr dark web here.

 

 4. Implement a remote wipe software for lost or stolen devices-

If you find a laptop was taken or a cell phone lost, remote “kill” or wipe software will allow you to disable the device and erase any and all sensitive data remotely.

5. You must backup remote devices-

If you implement step 4, you’ll need to have a backup of everything you’re erasing. To that end, make sure you are backing up all MOBILE devices including laptops so you can quickly restore the data. IT security for mobile phones is critical in any small business in the current technological era.

While these 5 are a good start, many organizations that are heavily using mobile devices or are handling highly sensitive data such as credit card numbers, financial information, social security numbers or medical records need to be far more diligent about monitoring and securing all mobile devices. For those of you who fit into that category, we have a special report that details X more security measures and strategies that you need to implement and know about that most IT firms don’t know or won’t tell you.

For a free copy, simply call my office at 0494360080, or shoot us an e-mail to danny@cinnte.ie with “Mobile security report” in the subject line. We look forward to hearing from you before August 31st to get your free report!

Fill Out the Form Below to Get Your Free Mobile Report

How IT managed services can stop Hackers damaging your business

IT Security
Are you an easy target for hackers as a small business owner:

 

You, the owner or managaing director of a small business, are under attack. We as an IT Managed Services Provider, want to alert businesses to these real risks and help stop them. This can be done with adequate IT security measures and IT managed services.

Right now, dangerous, well-funded cybercrime rings in China, Russia and the Ukraine are using high-end software. They are using it to hack into thousands of small businesses like yours. We recently wrote about the dark web and the risks cyber criminals pose to small businesses here.

They do this to steal credit cards and client information, and swindle money directly out of your bank account. In fact, it was reported last year by Silicon Republic that cyber crime is growing faster in Ireland than anywhere else in the world- frigtening news!

Don’t think you’re in danger because you’re “small” and not a big target like a J.P. Morgan or Home Depot?

Think again. 82,000 NEW malware threats are being released every single day and HALF of the cyber-attacks occurring are aimed at small businesses.

You just don’t hear about it because it’s kept quiet for fear of attracting bad PR, lawsuits and data-breach fines.

 

What can your IT Managed Services Provider do for you to prevent being hacked:

We can do a number of key hacking and security preventative measures or advise you on how on best practice or implement measures for you.

 

1.  Strong Password Policies: So many people are still using easy-to-guess passwords like “password” or other words or phrases. Guess what: hackers have sophisticated software programs that can try to log in to your PC, account, web site, etc. This at the rate of 8 million login attempts per SECOND.

If your password is easy, they’re in. Your password should contain at least 8 characters, uppercase and lowercase letters, a number and a symbol (! or #, for example). We can also install two-factor authentication to make dual login necessary for users periodically. We can also put a system in place whereby we ensure passwords must be updated at least monthly.

2• Install a “unified threat management” (UTM) system. Firewalls and antivirus aren’t enough to stop the sophisticated tools hackers now have. A UTM allows an IT administrator to monitor and manage a wide variety of security-related applications and devices to make sure you’re protected on all fronts.

3. Cyber Awareness Training for  your employees- Educating employees is crucial for any small business in terms of their IT useage. An IT useage policy is highly advised by us at Cinnte Technologies.

Employees clicking on phishing e-mails or downloading virus-laden files is still the #1 way hackers gain access to and control of business networks.

Therefore, you need to outline an Acceptable Use Policy (AUP) that details what employees can and cannot do with company-owned devices, files, software, etc. Plus, you need to make them aware of how to spot a phishing e-mail or attack so they can avoid it altogether.

 

Do you want to learn more about IT managed services, security and how to stop your IT systems being hacked?:

We want to help you to achieve ultimate security for your IT and your business. We have over 20 years’ Security and disaster recovery among our team here at Cinnte. You can sign up for a free Network security assessment here with one of our senior Engineers. All you need to do is fill out our Network Assessment form.

Please do this before June 30th to avail of this free service which takes 30 minutes to complete.

 

 

 

What is the dark web & is your small business at risk?

What is the dark web & is your small business at risk?

Do you know what the dark web is and how it could out your small business at risk? If the answer is no to either or both questions, please read on. You may be familiar with the ‘dark web’ as a place online somewhere where illegal or dangerous activities take place. This is correct but there is much more to the dark- or ‘deep web’ than you may think.

Especially if you are a small business owner. Part of the “Deep Web”, the Dark Web is, where illegal activity takes place (Drug deals, hacking, counterfeit money, etc.) The dark web term emerged with the advent of the internet search engine over 20 years ago.

The information contained on this ‘hidden’ part of the internet would shock most people. However, small business owners should be very aware of the pitfalls of not having correct security measures in their IT setup in place.

 

Characteristics of the Dark Web:

 

  • Information that is INTENTIONALLY hidden from search engines is qualified to be in the Dark Web
  • Most websites are on the .Onion domain and only accessible through a Tor browser
  • The information found on the Dark Web is technically public information…just not found by the general public (visiting the Dark Web is NOT Recommended!)
  • It is mostly community based…web sites go up/down/up again overnight and this is where financial details are sold- credit card info, identity information, child pornography and illegal drugs

 

How can hackers target small businesses and why they at risk:

 

They can do this by gaining access to sensitive data of a target’s IT network in a manner of ways. George Torsten has summarised it well in Secuity Week in 2018, see here for full article. ”The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials.

 

Things get even worse if a stolen identity belongs to a privileged user, who has even broader access, and therefore provides the intruder with “the keys to the kingdom”. …it’s not surprising that most of today’s cyber-attacks are front-ended by credential harvesting campaigns. Common methods for harvesting credentials include the use of password sniffers, phishing campaigns, or malware attacks.”

Why should small business owners be concerned about hacking and dark web criminals:

 

We know that small businesses are at great risk from hackers. These criminals sell their information on the dark web. According to the Federal Trade Commission in the US. In 2017, the Federation found that, data stolen from businesses ends up on the dark web. Then these criminals buy and sell it to commit fraud, get fake identity documents, or fund their criminal organizations.”

 

We can say that this is not good news for small business. This is why we need to make sure we are careful in our security measures. We can help in this regard as IT Security experts.

 

Information available for sale on the dark web is up to 20 times more likely to come from an entity whose breach wasn’t reported in the media. Many of these are smaller retailers, restaurant chains, medical practices, school districts, etc. In fact, most of the breaches the U.S. Secret Service investigates involve small businesses.

This is also becoming more common in Ireland where we have seen high profile data breaches. Even in organisations such as the HSE, a Government Department and many small businesses. A very worrying trend overall for every small business and organization who have less resources than larger, richer ones.

 

What we can do at Cinnte to help you:

We have posted recently about the importance of cyber security for small businesses. We want to help educate businesses like ourselves, about how they can keep employees and clients’ information secure online. You can subscribe to our blog for updates on all areas of IT and keeping your business secure, productive and free of disaster.

 

You can start by signing up for our free dark web scan by emailing us at darkweb@cinnte.ie before June 15th. We will perform this for free for small businesses and give you a detailed report afterwards. We can advise on measures to help protect and prevent your credentials being hacked or stolen by cyber criminals.

Move to the cloud & save money on IT Infrastructure

If you’re planning an IT upgrade within the next 6 months, listen up. You could save yourself lots of money on your next IT infrastructure upgrade. You can ALSO give yourself a more productive workplace by switching to the cloud. This could be an alternative to an on-premises server. We agree with NW technology about the logic of outsourcing to an MSP or IT support provider if you are an SME owner.

Is Cloud Computing a good for your business:

However, cloud computing is NOT a good fit for every company. So you should get all the facts to fully understand the pros and cons

That said, for some clients, cloud IT upgrades can actually lower their IT costs a lot. This is as well as improving the ability for remote workers to connect and work from home. You can read about our tips for checking that your IT provider is doing what is necessary to protect your business here.

 

Pros Of Cloud Computing:

  • Never upgrade your systems again which saves you cash. When you’re hosting in someone’s cloud, it’s the equivalent of renting an apartment. You get all the benefits of living there but none of the hassle of maintenance. One of the reasons the ‘cloud’ can save your business a lot of money is that the cloud provider is “pooling” the money of many organizations to host and maintain. This means you’re paying for a fraction of what it’d cost you to host and maintain the same infrastructure.

 

  • Lowered IT costs. This is probably the single most compelling reason why companies choose to move their network to the cloud. Not only do you save money on software licenses, but also on hardware (servers and workstations). As well as IT support and upgrades.

 

  • Ability to access your desktop and/or applications from anywhere and any device. If you travel lots, have remote workers or prefer to use an iPad, cloud computing will give you more flexibility.

 

  • Disaster recovery and backup are automated. Of course, check the small print of your cloud provider. Some will only back up your data for a period of 3 days prior. Then some will waive all responsibility for backing up and securing your data. Not good in either case, of course.

 

  • It’s faster, cheaper and easier to set up new employees. If you have a seasonal workforce or a lot of turnover, cloud computing will lower your costs of setting up new accounts. It will also make it much faster.

 

  • It’s a “greener” technology that will save on power and your electric bill. For some smaller companies, the power savings will be too small to measure. However, for larger companies with multiple servers who are cooling a hot server room and keep their servers running 24/7/365, the savings are considerable.

Is your IT support provider keeping your business safe- 5 ways to know

Is your IT support provider keeping your business safe- 5 ways to know

How well do you know your IT provider and what they are doing in the background to protect and ensure your IT runs smoothly:

Do you know if your IT support provider is keeping your information and your business safe? We at Cinnte Technologies have come up with a 5-point checklist to help you figure this out.

You know that in 2019, any small business needs secure, fast and reliable IT support and IT services to function and to be successful. Because over and over again we are shocked when one of our Engineers does an audit.

Common Problems we see in IT networks that we audit:

In 98% of the computer networks we review, we are finding a number of problems. These include faulty or non-existent backups, poor security, shoddy reporting and flawed systems that are very costly to maintain. These IT systems are usually not aligning with the business operations. We have written before about why we do it better than most other companies, read this piece here

The 5 top questions you must ask your IT support provider:

We believe that there a few basic important questions you need to ask your IT provider and yourself.

  1. Do they answer their phones “live” and respond to support issues in a guaranteed time frame?
  2. Are they remotely monitoring your network 24-7-365 to keep
    critical security settings, virus definitions, and security patches up
    to date?
  3. Do they INSIST on monitoring an offsite as well as an onsite
    backup, or are they letting you rely on outdated tape backups?
  4. Do they consistently offer new ways to improve
    your network’s performance, or do they wait until you have a
    problem?
  5. Do they provide detailed invoices that clearly explain what you are
    paying for?
These are just five critical questions you need to ask your IT provider. We have came up with a full, detailed list of 16 that you should put to them and you can download this here- 

Why regular IT Audits and IT Network checks with an IT provider are important:

We know that you’re busy running your business, so forget to think about the security of your IT network until disaster strikes. What else in your business is more valuable than the data on your network? Just imagine how devastating it would be to lose it! That’s why a regular network check or IT Audit is so important. You can sign up to this for free with us here

We’ll conduct a comprehensive review of your network’s security settings to make sure your data is safe and secure!