Cyber Security Best Practices to Protect Against Hackers

1. Thousands of Los Angeles police caught up in data breach

The Los Angeles Police Department personnel records were hacked into in July. The breach went undetected until the cybercriminals contacted them to let them know names, partial Social Security numbers, dates of birth and other personally identifying information from the department were now available through “external sources.” PII for 2,500 LAPD officers was compromised along with about 17,500 records of LAPD’s Candidate Applicant program.

Every day, more experienced hackers and sophisticated phishing schemes invade businesses across California. You can’t afford to sit back and hope you have enough protection against hackers. Download your free copy of DiamondIT’s ebook: “Detect and Prevent Cybersecurity Threats to Your Business.”

2.  City of Lodi confirms ransomware behind computer troubles

Lodi city employees received ransomware emails with attachments appearing to be invoices. The malware disabled the city’s phone lines, financial data systems and other computer systems. The hackers demanded $400,000 in Bitcoin as ransom; Lodi officials declined to pay.

Balancing limited resources with cyber security best practices is complex. DiamondIT works with city and county organizations across Central and Southern California to secure government entities: Check out our solutions here.

Ransomware & Fines – Consequences of Ignoring Microsoft End-of-Support

If history is any guide, we could be seeing more news articles about ransomware attacks in early 2020. On January 14, 2020, Microsoft Windows 7 and Server 2008 will enter end-of-support. Microsoft will stop offering security patches, leaving any organization running these systems exposed to cyberthreats. An infamous example of what can go wrong is the May 2017 WannaCry attack.

WannaCry: A Microsoft End-of-Support Worst-Case Scenario

On May 12, 2017, the National Health Service (NHS) in the United Kingdom was paralyzed by a ransomware attack when cybercriminals exploited a flaw in WindowsXP. Support for WindowsXP had ended in April 2014, but the NHS continued relying on the system.

5 Cyber Incidents You Need to Know About

1. Thousands of patients exposed in L.A. County Dept. of Health data breach

A recent phishing attack on the Los Angeles County Department of Health released names, addresses, dates of birth and Medi-Cal identification numbers to third-party hackers. Although the county reports there is no evidence at this time that this information is being misused, you should enroll in the provided credit and identity monitoring services being offered.

SMBs: It is possible to check if your company has information for sale on the Dark Web. Once you know if your credentials are compromised, you can act. Sign up for a Free Dark Web Scan here.

Lightning Can Strike Twice: Prepare for Cyberattacks

The adage “lightning never strikes the same place twice” doesn’t apply to cyberattacks. The experience of our client John Balfanz Homes, a premier homebuilder based in Bakersfield, illustrates why.

Saved by the backup

The first attack took place right after we completed offsite backups as part of our BackupCentric solution and as we were setting up SecureCentric, our next-generation security stack. Before SecureCentric was completely installed, a cryptocurrency attack encrypted the builder’s on-premise servers. Because we had offsite backups, we were able to restore files without paying ransomware.

The incident grabbed the owner’s attention, and he asked what else he could be doing. We assured him with SecureCentric and BackupCentric fully installed, he had the right tools in place. Our promise was tested a few months later.

Disasters are Unpredictable – Do You Have a Recovery Plan?

A business owner runs through the street as buildings burn around him. He clutches his business’ server in his hands as he runs, searching for safety.

Sounds like the opening to an end-of-the-world movie, right? Unfortunately, this happened last year to a large medical center with numerous locations around California during the Santa Barbara fires. Because he didn’t have a disaster recovery plan in place, this business manager did the only thing he could think of to protect his data – unplug his server, grab it and run.

Ready to Grow Your Business? Start with an IT Assessment

Strategically managing your technology can create the competitive edge you’ve been looking for.

Conversely, failing to maximize the power of technology can result in huge losses. You might even lose your business – 60% who experience a data breach close their doors within 6 months. If their cybersecurity technology had been up to speed, they’d probably still be in business.

Just about every business relies on technology for day-to-day operations but not every business owner pays attention to how IT influences overall business goals and growth. If you’re not sure where your network stands in terms of security and performance ability, you can’t take advantage of the strategic benefits of technology.

Whether you want to reduce expenses, ramp up productivity or gain market share, knowing where you are in terms of your technology will get you there faster.

A thorough assessment of your IT environment by a knowledgeable, business-savvy managed services partner is the best way to determine your technology needs. A deep look into your strategic alignment of technology, people and processes identifies areas where enhancement can propel your company toward faster growth, operational efficiencies and increased revenues.

When you look at your technology needs through a business leader lens, you can align your strategic goals with your technology functions and features. Our Central and Southern California clients have relied on us for decades to optimize their networks. DiamondIT does a thorough strategic assessment of your system to confirm that it is running optimally, is secure and has the tools and apps in place to facilitate your objectives.

Assess your network performance and security

If your network isn’t functioning at optimal level, it could be costing you valuable time and energy. To go forward you must first know where you are.

During an assessment, DiamondIT looks at the design, security and performance of your IT environment and the day-to-day operation of your technology infrastructure. An initial interview with leadership includes learning your technology pain points. The network assessment services include a baseline security assessment and additional security reports, such as a Dark Web scan.

Chronic IT issues, hardware maintenance and critical pieces of technology may be causing problems due to support issues or aging out. Findings during the IT assessment may include:

1. Security pitfalls like not having a good password policy, breach detection or Dark Web scanning

Security, of course, is a huge issue with any network and it’s important to stay on top of it. During the assessment, DiamondIT evaluates your network for vulnerabilities and determines your Risk Score, based on a standard set of reports and tools, from 1 to 100.

2. End of life and out-of-warranty technology

When manufacturer warranties do not protect servers and other hardware, a hardware failure can result in extended downtime while you search for parts and someone to repair the equipment. End-of-Life devices such as firewalls and workstations decrease in effectiveness and may result in data breaches, data loss and, most likely, a decrease in employee morale.

3. Inadequate backup storage

Data backups can save your business from considerable downtime and data loss in the event of a disaster. When your backup device is full recovering enough information to keep your business operating – or even to stay in business! – will be a long, expensive ride.

At the end of your assessment you will know the capabilities, vulnerabilities and resources of your IT infrastructure. This tells you the direction you need to go with your technology so it is working in tandem with your strategic goals.

Partner with DiamondIT to assess your network and enhance your ability to get the job done with an optimized IT infrastructure. Schedule your assessment online or call us at 877-716-8324.

Anyone Can Be a Victim of Identity Theft: How to Protect Yourself If Your Identity Has Been Breached

David Rice, COO of DiamondIT, is technically sophisticated and knows how to protect his personal and professional data.

But not long ago, David found that he had become a victim of identity theft.

Here is the rub.  People do not always have control over their personal data.

2019 Cyberthreat Predictions

Cybercrime is not a new problem, but one that keeps evolving as technology itself progresses.  As we enter into 2019, the cybercrime conundrum continues: it is not a matter of IF a company or institution will be targeted by cybercriminals, but WHEN.

3 Ways Technology Facilitates Your Growth

Most strategic business plans include a growth goal. Whether your goal is to increase sales by 10 percent this year or to land two new accounts every month, technology is your go-to resource to achieving your goals.

Because technology is always evolving, it provides new relevant tools to apply toward innovative processes to save your business time and money. Using technology to do more and propel your business toward growth takes strategic planning and vision to ensure you stay on track without over- or underbuilding your IT.

How Blockchain Technology Is Being Used to Improve Identity Management and MORE

When many of us hear the word “blockchain” we automatically associate it with bitcoin.  But today, blockchain technology is so much more than the platform behind the bitcoin cryptocurrency – as it is now becoming a serious asset in identity management.