<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Security Archives | CCI Managed Services | IT Services &amp; Support</title>
	<atom:link href="https://ccimanaged.com/blog/category/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://ccimanaged.com/blog/category/data-security/</link>
	<description></description>
	<lastBuildDate>Mon, 26 Aug 2024 15:28:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>The Growing Imperative of Managed IT Security for Small and Medium Enterprises</title>
		<link>https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/</link>
					<comments>https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/#respond</comments>
		
		<dc:creator><![CDATA[Administrator]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 15:05:35 +0000</pubDate>
				<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Managed IT Services]]></category>
		<guid isPermaLink="false">https://ccimanaged.com/?p=917</guid>

					<description><![CDATA[<p>Small Business and Big Threats The integrity and security of data are now paramount concerns for businesses of all sizes. Recent high-profile incidents, such as the National Public Data breach, the CrowdStrike outage and the CDK data security breach, have underscored the vulnerabilities that large enterprises face. However, small and medium enterprises (SMEs) are often… <span class="read-more"><a href="https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/">Read More &#187;</a></span></p>
<p>The post <a href="https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/">The Growing Imperative of Managed IT Security for Small and Medium Enterprises</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong><a href="https://ccimanaged.com/wp-content/uploads/Picture1.jpg"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-928" src="https://ccimanaged.com/wp-content/uploads/Picture1.jpg" alt="" width="624" height="350" srcset="https://ccimanaged.com/wp-content/uploads/Picture1.jpg 624w, https://ccimanaged.com/wp-content/uploads/Picture1-300x168.jpg 300w" sizes="(max-width: 624px) 100vw, 624px" /></a></strong></h2>
<h2><strong>Small Business and Big Threats</strong></h2>
<p>The integrity and security of data are now paramount concerns for businesses of all sizes. Recent high-profile incidents, such as the <a href="https://www.usatoday.com/story/news/2024/08/21/social-security-data-breach-florida-lawsuit-national-public/74884775007/">National Public Data breach</a>, the CrowdStrike outage and the <a href="https://www.reuters.com/legal/transactional/automotive-tech-company-cdk-must-face-antitrust-class-action-judge-says-2024-07-24/">CDK</a> data security breach, have underscored the vulnerabilities that large enterprises face. However, small and medium enterprises (SMEs) are often at a greater risk due to limited resources and expertise. This is where comprehensive managed IT security services, like what clients of CCI Managed Services get, come into play.</p>
<h3><strong>The Growing Threat Landscape</strong></h3>
<p>Cybercriminals are becoming more sophisticated in their methods. SMEs are particularly vulnerable due to a lack of robust cybersecurity measures. In many cases, they are seen as easy targets because they may not have the same level of defenses as large corporations. And let’s face it, not every manager and employee can possibly understand all the risks when they are online, and often, even offline.</p>
<h3><strong>High-Profile Breaches: A Wake-Up Call</strong></h3>
<p>The National Public Data breach, the <a href="https://techcrunch.com/2024/07/19/what-we-know-about-crowdstrikes-update-fail-thats-causing-global-outages-and-travel-chaos/">CrowdStrike outage</a> and the CDK data security breach serve as stark reminders of the potential consequences of inadequate cybersecurity. These incidents affected millions of people and businesses worldwide, leading to significant financial losses and reputational damage. For SMEs, such breaches can be devastating, potentially leading to business closure. A recent industry analysis revealed that 60% of small businesses close or cease operating following a major security breach.</p>
<h2><strong>Why Small and Medium Businesses Need <em>Managed IT Security</em></strong></h2>
<p><a href="https://ccimanaged.com/wp-content/uploads/Picture3-2.jpg"><img decoding="async" class="alignright wp-image-926 size-medium" src="https://ccimanaged.com/wp-content/uploads/Picture3-2-300x225.jpg" alt="" width="300" height="225" srcset="https://ccimanaged.com/wp-content/uploads/Picture3-2-300x225.jpg 300w, https://ccimanaged.com/wp-content/uploads/Picture3-2.jpg 652w" sizes="(max-width: 300px) 100vw, 300px" /></a>Most SMEs do not have the luxury of a dedicated IT security team. Employees often juggle multiple roles, and cybersecurity may not be their primary focus or expertise. This lack of specialized knowledge can lead to common gaps in security that cybercriminals know about and can exploit.</p>
<h3><strong>Cost-Effectiveness</strong></h3>
<p>Hiring an in-house IT security team can be prohibitively expensive for SMEs and especially small businesses. Managed IT services offer a cost-effective solution by providing access to a team of experts without the overhead costs associated with full-time employees. This allows businesses to allocate resources more efficiently while still maintaining robust security measures.</p>
<h3><strong><em>Proactive</em></strong><strong> Threat Management</strong></h3>
<p>Managed IT service providers like CCI employ a proactive approach to cybersecurity. They (we) continuously monitor networks for potential threats and vulnerabilities, ensuring that any issues are addressed before they can cause significant damage. This proactive stance is crucial in today&#8217;s threat landscape because waiting to react can result in severe consequences.</p>
<h2><strong>You Need an<em> IT</em> <em>Security Partner</em></strong></h2>
<p>CCI Managed Services offers comprehensive network protection tailored to the unique needs of SMEs. Their services include firewall management, intrusion detection and prevention, and regular security audits. By employing advanced technologies and best practices, CCI ensures that your network remains secure against a wide range of threats.</p>
<h3><strong>Data Security and Compliance</strong></h3>
<p>Data security is not just about protecting against external threats; it also involves ensuring compliance with industry regulations. CCI helps businesses navigate the complex landscape of data protection laws, ensuring that they remain compliant while securing sensitive information. This dual focus on security and compliance provides peace of mind for business owners.</p>
<h3><strong>Disaster Recovery and Business Continuity</strong></h3>
<p>In the event of a cyber-attack or data breach, having a robust disaster recovery plan is essential. CCI Managed Services provides comprehensive disaster recovery solutions that ensure business continuity. Their team works to quickly restore systems and data, minimizing downtime and reducing the impact on business operations.</p>
<h2><strong>The CCI Security Advantage</strong></h2>
<p><a href="https://ccimanaged.com/wp-content/uploads/Picture5.jpg"><img decoding="async" class="alignright wp-image-924 size-medium" src="https://ccimanaged.com/wp-content/uploads/Picture5-300x200.jpg" alt="" width="300" height="200" srcset="https://ccimanaged.com/wp-content/uploads/Picture5-300x200.jpg 300w, https://ccimanaged.com/wp-content/uploads/Picture5-660x439.jpg 660w, https://ccimanaged.com/wp-content/uploads/Picture5.jpg 694w" sizes="(max-width: 300px) 100vw, 300px" /></a>Every business is unique, and a customized approach to cybersecurity is often the only right approach. CCI offers custom solutions tailored to the specific needs and risks of each client. This personalized focus ensures that businesses receive the protection they need without unnecessary services or costs.</p>
<h3><strong>24/7 Support</strong></h3>
<p>Cyber threats do not adhere to business hours, and neither does CCI. Our 24/7 support ensures that businesses are protected around the clock. Whether it&#8217;s a minor issue or a major incident, CCI&#8217;s team is always available to help and provide support.</p>
<h3><strong>Know-how and Experience</strong></h3>
<p>With hundreds of combined years of experience in the IT industry, CCI&#8217;s team of experts is well-equipped to handle the most complex cybersecurity challenges. Our deep understanding of the threat landscape and commitment to continuous learning ensures that we stay ahead of emerging threats for you.</p>
<h3><strong>Your Complete Care Solution</strong></h3>
<p>Robustly managed IT security is truly a necessity for small and medium enterprises today. The recent high-profile breaches serve as a stark reminder of the potential risks and the importance of having a trusted IT partner.</p>
<p>CCI offers <a href="https://ccimanaged.com/services/it-services/">Complete Care IT Services</a>; cost-effective solutions that ensure the security and continuity of your business. By partnering with CCI, SMEs and small businesses can focus on growth and innovation, knowing that their IT security and system performance are in capable hands.</p>
<p>The post <a href="https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/">The Growing Imperative of Managed IT Security for Small and Medium Enterprises</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ccimanaged.com/blog/the-growing-imperative-of-managed-it-security-for-small-and-medium-enterprises/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Network Access Controls</title>
		<link>https://ccimanaged.com/blog/understanding-network-access-controls/</link>
					<comments>https://ccimanaged.com/blog/understanding-network-access-controls/#respond</comments>
		
		<dc:creator><![CDATA[Chuck Sink]]></dc:creator>
		<pubDate>Fri, 20 Jan 2023 16:13:06 +0000</pubDate>
				<category><![CDATA[Access Controls]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Hiring and Firing Policies]]></category>
		<category><![CDATA[network access controls]]></category>
		<guid isPermaLink="false">https://ccimanaged.com/?p=534</guid>

					<description><![CDATA[<p>How IT Hiring and Firing Policies Could Expose Your Business to Risk It was Pauline’s first day at “HiTech Software, Inc.” where she would be a new hire software engineer. She was happy to be introduced to her new cubicle and new colleagues, but disappointed when she discovered the computer equipment and applications she would… <span class="read-more"><a href="https://ccimanaged.com/blog/understanding-network-access-controls/">Read More &#187;</a></span></p>
<p>The post <a href="https://ccimanaged.com/blog/understanding-network-access-controls/">Understanding Network Access Controls</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3></h3>
<p><img loading="lazy" decoding="async" class=" wp-image-763 aligncenter" src="https://ccimanaged.com/wp-content/uploads/understanding-network-access-controls.jpg" alt="understanding network access controls" width="736" height="506" srcset="https://ccimanaged.com/wp-content/uploads/understanding-network-access-controls.jpg 800w, https://ccimanaged.com/wp-content/uploads/understanding-network-access-controls-300x206.jpg 300w, https://ccimanaged.com/wp-content/uploads/understanding-network-access-controls-768x528.jpg 768w, https://ccimanaged.com/wp-content/uploads/understanding-network-access-controls-660x454.jpg 660w" sizes="auto, (max-width: 736px) 100vw, 736px" /></p>
<h3>How IT Hiring and Firing Policies Could Expose Your Business to Risk</h3>
<p>It was Pauline’s first day at “HiTech Software, Inc.” where she would be a new hire software engineer. She was happy to be introduced to her new cubicle and new colleagues, but disappointed when she discovered the computer equipment and applications she would be using were delayed because IT hadn’t finished the appropriate configuration and credentials. She needs to work initially from her own computer.</p>
<p>Unfortunately, the lack of synchronous policies and procedures between HR and IT for effective onboarding of new hires not only frustrates eager new employees, but also adds unnecessary costs and risks to company projects.</p>
<h4><strong>Sensitivity and Timing</strong></h4>
<p>Consider another scenario. As Joe P sat in his cubicle typing away on his company computer at “Acme Electronics,” he received a phone call from his manager who said the company was letting him go. He was told to gather is personal belongings and a security representative would stop by his cubicle to walk him to the door. As his manager hung up, Joe’s initial feeling of being stunned changed to anger, then rage. Within the next 10 minutes before the security guard arrived, he rampaged through the software files had been working on for the past few weeks, corrupting everything of value.</p>
<p>Unfortunately, the company had not setup HR and IT policies and procedures that would immediately remove active access roles and credentials applications and data stores prior to employee firings or leaving the company. Even with backups, it would take some time for IT and his colleagues to piece together the project damage he had done.</p>
<h4><strong>Access Control is No Simple Matter</strong></h4>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-540" src="https://ccimanaged.com/wp-content/uploads/enter-key-300x201.jpg" alt="" width="300" height="201" srcset="https://ccimanaged.com/wp-content/uploads/enter-key-300x200.jpg 300w, https://ccimanaged.com/wp-content/uploads/enter-key-660x441.jpg 660w, https://ccimanaged.com/wp-content/uploads/enter-key.jpg 764w" sizes="auto, (max-width: 300px) 100vw, 300px" />Hiring and firing employees are not easy tasks for businesses these days. Networks, data storage and retrieval have significantly evolved since pre-COVID days. Back then, these resources were almost exclusively on-premise and under lock and key by IT departments. It was much easier to give a new hire access credentials, modify those credentials for an employee with a new role, or remove all access when they left the company or were fired.</p>
<p>These days, IT must offer more flexible access to applications and data spread across different clouds. Employees need to able to work from anywhere. Unfortunately, this increase in flexible access has significantly complicated access control management for your IT professionals. Their policies must reduce risks to the company while keeping up-to-date with the increasingly complex steps required to add access to new hires, change access as employee roles change, and remove access when employees leave the company whether fired or resigned.</p>
<p>Let’s face it, access control management has become complicated. An approved process needs to be followed and reviewed for adjustment regularly. Mistakes will cause new hires to have a negative experience and expose company and personnel data to loss and theft, as well as compliance penalties.</p>
<h4><strong>Ask yourself these pertinent questions:</strong></h4>
<ol>
<li>What does “hiring” and “firing” really mean for your manual and automated IT processes and procedures?</li>
<li>What happens when steps in your policy procedures are missing or not followed by your HR and IT staffs?</li>
<li>Can you afford delays in employees having the right access for the work they do?</li>
<li>Can you afford to have employees who are in the process of being fired or leaving the company still having access to critical data and resources, including servers, laptops, applications, emails, and data repositories?</li>
</ol>
<p>As noted by itglue.com, “IT policies and procedures establish guidelines for the use of information technology within an organization. In other words, it outlines what everyone is expected to do while using company assets. With the help of strong policies and procedures, you can incorporate actions that are consistent, effective and efficient. In addition to helping you combat security threats by creating proper awareness, documented policies and procedures can also define how you incorporate and manage technology in your corporate environment.”</p>
<h4><strong>Implementing the Right Access for Your Teams</strong></h4>
<p>The best way to limit risk to your business when hiring, changing, or firing personnel is to ensure your IT policies are set up properly for your business. To accomplish this, we recommend you follow <strong>CIS Control 6.1 &amp; 6.2</strong>, which recommends, “Securely dispose of data as outlined in the enterprise’s data management process. Ensure the disposal process and method are commensurate with the data sensitivity. Establish and follow a process, preferably automated, for revoking access to enterprise assets, through disabling accounts immediately upon termination, rights revocation, or role change of a user. Disabling accounts, instead of deleting accounts, <img loading="lazy" decoding="async" class="alignright size-medium wp-image-541" src="https://ccimanaged.com/wp-content/uploads/internal-access-300x212.jpg" alt="" width="300" height="212" srcset="https://ccimanaged.com/wp-content/uploads/internal-access-300x212.jpg 300w, https://ccimanaged.com/wp-content/uploads/internal-access-660x466.jpg 660w, https://ccimanaged.com/wp-content/uploads/internal-access-200x140.jpg 200w, https://ccimanaged.com/wp-content/uploads/internal-access.jpg 686w" sizes="auto, (max-width: 300px) 100vw, 300px" />may be necessary to preserve audit trails.”</p>
<p>Your business will be safer and more secure, as well as more productive by following CIS industry recommendations. The <a href="https://readthedocs.org/">readthedocs.org</a> organization notes that the CIS Control 6 focuses on “managing who has access to IT accounts, ensuring users only have access to the data or enterprise assets appropriate for their role, and ensuring that there is strong authentication for critical or sensitive enterprise data or functions. Accounts should only have the minimal authorization needed for the role. Developing consistent access rights for each role and assigning roles to users is a best practice. Developing a program for complete provision and de-provisioning access is also important. Centralizing this function is ideal.”</p>
<p>Since 1987, CCI Managed Services has been providing local network management expertise. Our experts can inspect, test, and fine tune this process as part of a network security assessment. This is just one of dozens of practical steps we will take to help your organization know and improve your cybersecurity and digital access controls report card.</p>
<p>For further information about how we can help you define and implement your IT policies for your entire business, contact us <a href="https://ccimanaged.com/contact/">online</a> or give us a call today at &#40;&#54;&#48;&#51;&#41;&#32;&#53;&#52;&#50;&#45;&#53;&#49;&#48;&#57;.</p>
<p>The post <a href="https://ccimanaged.com/blog/understanding-network-access-controls/">Understanding Network Access Controls</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ccimanaged.com/blog/understanding-network-access-controls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Secure Data Destruction</title>
		<link>https://ccimanaged.com/blog/secure-data-destruction/</link>
					<comments>https://ccimanaged.com/blog/secure-data-destruction/#respond</comments>
		
		<dc:creator><![CDATA[Chuck Sink]]></dc:creator>
		<pubDate>Fri, 30 Dec 2022 22:21:04 +0000</pubDate>
				<category><![CDATA[Data Destruction]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[data destruction]]></category>
		<category><![CDATA[Disposing IT equipment]]></category>
		<guid isPermaLink="false">https://ccimanaged.com/?p=516</guid>

					<description><![CDATA[<p>Disposing IT equipment may create high risk to your organization You decided it’s time to finally upgrade your company servers. The old ones got removed, the new ones installed, and now they are already being used in operations. Everyone is happy and reporting improvements in critical application performance. But wait, where did the old servers… <span class="read-more"><a href="https://ccimanaged.com/blog/secure-data-destruction/">Read More &#187;</a></span></p>
<p>The post <a href="https://ccimanaged.com/blog/secure-data-destruction/">Understanding Secure Data Destruction</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2></h2>
<h2>Disposing IT equipment may create high risk to your organization</h2>
<h2><img loading="lazy" decoding="async" class="alignnone size-full wp-image-522" src="https://ccimanaged.com/wp-content/uploads/Picture2.jpg" alt="" width="654" height="463" srcset="https://ccimanaged.com/wp-content/uploads/Picture2.jpg 654w, https://ccimanaged.com/wp-content/uploads/Picture2-300x212.jpg 300w" sizes="auto, (max-width: 654px) 100vw, 654px" /></h2>
<p>You decided it’s time to finally upgrade your company servers. The old ones got removed, the new ones installed, and now they are already being used in operations. Everyone is happy and reporting improvements in critical application performance.</p>
<p>But wait, where did the old servers go? What happened to them, and more importantly, all the data? If you don’t know and have chains of custody documented, your organization could be exposed to data loss or theft, or worse, being held hostage for Ransomware by cyber terrorists. And you could face business continuity interruptions as well devastating regulatory compliance penalties. Heavens! Who knew getting rid of old equipment could cause so much trouble?</p>
<h3><strong>What Most People Don’t Know about Offline Electronics</strong></h3>
<p>Unfortunately, most employees have no idea what needs to be done with old equipment to properly ensure the safety of private and proprietary information. They assume that IT picks it up and simply gives them new equipment. Out with the old and in with the new replacement. But ask yourself these key questions which can impact what could happen to the information on your old equipment:</p>
<ol>
<li>Do you know for sure what happens to the data on older equipment when it gets recycled? You should have a log of what has been performed. You will need this ensure your data is safe and secure as well comply with any regulatory audit your industry requires.</li>
<li>Why not Just delete the data off older systems before disposal? Because online and consumer-oriented applications often do not completely “wipe” the data, leaving traces of data that an expert thief can access.</li>
</ol>
<p>Disposing IT equipment without following the latest industry standards that take into consideration the today’s significant risks associated with cyber security issues and data theft, can jeopardize your organization’s ability to operate securely. It can also lead to potential legal risks for failure to comply with regulatory laws covering theft and loss of privacy data.</p>
<p>Can your business afford to have all of its customer, partner, and vendor data held hostage by some crook? Or, face the news that your customers’ private information has been exposed to the world? Probably not.</p>
<h3><strong>Common Equipment Data Breaches</strong></h3>
<p>Costly scenarios are easily possible when you don’t know the best practices for securing data on devices. For example, here are just two common mistakes businesses make. A company simply throws its old printers out in the dumpster. How smart can these devices be? Well, many old printers, copiers, and faxes often still contain electronic proprietary data, from phone numbers to passwords, which anybody could easily retrieve and use. Another innocent-seeming scenario is companies giving away old laptops and computers to employees which contain privacy data and company network access details. Not only do these practices expose private information to the public but also opens the organization to legal and financial risks if the equipment falls into to the wrong hands.</p>
<p>Here are a few recent regulatory penalties applied to companies that failed to properly secure data as required by regulatory laws:</p>
<ul>
<li><img loading="lazy" decoding="async" class="alignright size-medium wp-image-519" src="https://ccimanaged.com/wp-content/uploads/legal-compliance-300x165.jpg" alt="" width="300" height="165" srcset="https://ccimanaged.com/wp-content/uploads/legal-compliance-300x165.jpg 300w, https://ccimanaged.com/wp-content/uploads/legal-compliance-768x422.jpg 768w, https://ccimanaged.com/wp-content/uploads/legal-compliance-1536x845.jpg 1536w, https://ccimanaged.com/wp-content/uploads/legal-compliance-660x363.jpg 660w, https://ccimanaged.com/wp-content/uploads/legal-compliance.jpg 1920w" sizes="auto, (max-width: 300px) 100vw, 300px" />Morgan Stanley <a href="https://www.complianceweek.com/regulatory-enforcement/occ-fines-morgan-stanley-60m-for-data-inventory-risk-failures/29590.article">fined $60 million</a></li>
<li>Home Depot <a href="https://www.reuters.com/article/us-home-depot-california/home-depot-in-27-84-million-california-hazardous-waste-privacy-settlement-idUSKCN1GK2QW/" target="_blank" rel="noopener">fined $28 million</a></li>
<li>Target fined <a href="https://www.marketwatch.com/story/target-to-pay-74-million-to-settle-california-suit-over-dumping-hazardous-waste-2018-12-05">$7.4 million</a></li>
<li>Big Lots fined <a href="https://www.environmentenergyleader.com/2017/05/big-lots-nailed-wfines-hazardous-waste-abuses-like-dollar-general-last-month/">$3.5 million</a></li>
<li>Walgreens fined <a href="https://resource-recycling.com/e-scrap/2020/12/24/stores-pay-millions-in-california-hazardous-waste-disposal-suits/">$3.5 million</a></li>
<li>Dollar General fined <a href="https://www.stoelrivesenvironmentallawblog.com/causes-and-issues/environmental-contamination/another-hazardous-waste-enforcement-action-costs-a-major-retailer-millions/">$1.1 million</a></li>
</ul>
<h3><strong>Proper Disposal of IT Assets</strong></h3>
<p>The Center for Internet Security (CIS) recommends how to properly dispose of equipment potentially containing private data. CIS Control 3.5 calls for “Securely dispose of data as outlined in the enterprise’s data management process. Ensure the disposal process and method are commensurate with the data sensitivity.”</p>
<p>Having a data disposal policy and teaming up with a reputable vendor that can professionally handle the end-of-life process for your older systems is a smart decision. This policy should define who oversees the process, what practices are employed, and it should include documentation and a chain of custody from the rack to the scrap heap, so you know everything about how the data has been handled. The key advice is to not leave your sensitive data to chance. Ensure the data is removed and properly document this has occurred.</p>
<h3><strong>We’ve got your back!</strong></h3>
<p>Since 1987, CCI Managed Services has been sharing its network management expertise with our clients. As part of our network security assessment, we can evaluate and make recommendations for improving your existing security policy. If you don’t have a policy, we can work with you to create one that effectively protects your organization from today’s data security risks – online and offline.</p>
<p>For further information about IT asset disposal and how you can properly secure your data, give us a call today at &#40;&#54;&#48;&#51;&#41;&#32;&#53;&#52;&#50;&#45;&#53;&#49;&#48;&#57; or <a href="https://ccimanaged.com/contact/">contact us online</a> for a free IT assessment.</p>
<p>The post <a href="https://ccimanaged.com/blog/secure-data-destruction/">Understanding Secure Data Destruction</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ccimanaged.com/blog/secure-data-destruction/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Importance of Multifactor Authentication</title>
		<link>https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/</link>
					<comments>https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/#respond</comments>
		
		<dc:creator><![CDATA[Chuck Sink]]></dc:creator>
		<pubDate>Fri, 30 Dec 2022 19:51:15 +0000</pubDate>
				<category><![CDATA[Data Security]]></category>
		<category><![CDATA[company security breaches]]></category>
		<category><![CDATA[misuse of passwords]]></category>
		<category><![CDATA[password breach]]></category>
		<guid isPermaLink="false">https://ccimanaged.com/?p=508</guid>

					<description><![CDATA[<p>&#160; Did you know that most company security breaches are caused by employee misuse of passwords? You would think that, with all the security training programs companies require their employees to sit through these days, password problems would no longer be a major cause of security intrusions. Perhaps employees should do more than “sit through”… <span class="read-more"><a href="https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/">Read More &#187;</a></span></p>
<p>The post <a href="https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/">Importance of Multifactor Authentication</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-759 aligncenter" src="https://ccimanaged.com/wp-content/uploads/importance-of-multifactor-authentication.jpg" alt="importance of multifactor authentication" width="703" height="483" srcset="https://ccimanaged.com/wp-content/uploads/importance-of-multifactor-authentication.jpg 800w, https://ccimanaged.com/wp-content/uploads/importance-of-multifactor-authentication-300x206.jpg 300w, https://ccimanaged.com/wp-content/uploads/importance-of-multifactor-authentication-768x528.jpg 768w, https://ccimanaged.com/wp-content/uploads/importance-of-multifactor-authentication-660x454.jpg 660w" sizes="auto, (max-width: 703px) 100vw, 703px" /></p>
<p>&nbsp;</p>
<p>Did you know that most company security breaches are caused by employee misuse of passwords? You would think that, with all the security training programs companies require their employees to sit through these days, password problems would no longer be a major cause of security intrusions. Perhaps employees should do more than “sit through” such important training. Unfortunately, most employees are probably thinking more about convenience than securing data. Fortunately, there is an efficient solution to securing your enterprise data.</p>
<h3><strong>Why Passwords Can be a Problem</strong></h3>
<p>Security and password training programs have been around for years. They continue <a href="https://www.hooksecurity.co/blog/3-reasons-your-security-awareness-training-program-isnt-working-and-how-to-fix-it">failing</a> because of inconsistency, lack of planning, and unengaging content. Employees are bored with having to constantly complete security trainings. They’d rather just do their work.</p>
<p>Let’s face it, it is much easier to use the same old password, or a short, simple one. The corporate password policies that automatically require changing passwords every 60 or 90 days can raise havoc with employees doing their jobs by impeding access to servers and data. (Of course, these occurrences increase the number of IT Support tickets.) Also, sharing passwords with co-workers to “get the job done” can be a problem as well, especially with employee turnover.</p>
<p>You may find the statistics about passwords and data risk particularly useful at this link: <a href="https://financesonline.com/password-statistics/">55 Important Password Statistics You Should Know: 2022 Breaches &amp; Reuse Data &#8211; Financesonline.com</a></p>
<p>Consider these basic questions about passwords:</p>
<ul>
<li>Which cybersecurity process is over 99% effective at preventing breaches and incidents? Answer: Multifactor Authentication (MFA).</li>
<li>How many passwords are on the dark web? Answer: Over 555 million! Password reuse is the most common reason for company data breaches.</li>
<li>How many office workers admit to sharing passwords over email or writing them on sticky notes? Answer: 60%</li>
</ul>
<h3><strong>What’s the Remedy?</strong></h3>
<p>The biggest data breach risk to your company comes from using poor passwords. By poor, we mean passwords that are too short, too simple, too easy to guess, and are used over and over by staff for different purposes. These passwords are ripe for any skilled intruder to easily discover. Unfortunately, just telling staff to use complex and unique passwords is an uphill battle.</p>
<p>So, what are the experts suggesting? The Center for Internet Security’s CIS Controls® recommends implementing CIS Control 5.2, which calls for using unique and complex passwords to protect all enterprise assets, and implementing, at a minimum, an 8-character password for accounts using MFA and a 14-character password for accounts not using MFA. So, what’s MFA all about?</p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-511" src="https://ccimanaged.com/wp-content/uploads/Picture3-300x215.jpg" alt="" width="300" height="215" srcset="https://ccimanaged.com/wp-content/uploads/Picture3-300x215.jpg 300w, https://ccimanaged.com/wp-content/uploads/Picture3-660x474.jpg 660w, https://ccimanaged.com/wp-content/uploads/Picture3.jpg 666w" sizes="auto, (max-width: 300px) 100vw, 300px" />MFA (Multifactor Authentication) is a process where you not only specify a username and a password, but you also reply to a text message with an automated, secret 6-digit authentication code. By requiring MFA for access to your company network and email, you can expect a 99% or greater reduction in costly and embarrassing breaches. Your IT professionals will ideally implement software policies across your organization that require at least 8-character passwords with some degree of complexity combined with MFA to log in. <a href="https://techbeacon.com/security/state-mfa-4-trends-portend-end-solo-password">Industry trends</a> show that MFA is becoming a widely accepted and often expected mode for reducing risk.</p>
<h3><strong>Reliable Password Management Systems</strong></h3>
<p>By the way, how can you manage all of this? The best way is to implement an enterprise password management system which makes it easy to generate, store, secure, and use unique and complex passwords. Ask us about this effective and easy-to-use system as part of your <a href="https://ccimanaged.com/services/network-security/">network security stack</a>.</p>
<p>Since 1987, CCI Managed Services has provided local businesses with secure network management services. CCI can help you with all aspects of password management by independently and affordably assessing your organizations network security. Let our experts assess your setup. We will provide you with a clear and concise report card that spells out the risks you have now and how to solve them.</p>
<p>Feel free to call us today with your questions about password security and MFA. Or contact us <a href="https://ccimanaged.com/contact/">online</a> to request a password security assessment.</p>
<p>The post <a href="https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/">Importance of Multifactor Authentication</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ccimanaged.com/blog/multifactor-authentication-mitigates-password-breach-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Critical Nature of Endpoint Data Encryption</title>
		<link>https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/</link>
					<comments>https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/#respond</comments>
		
		<dc:creator><![CDATA[Chuck Sink]]></dc:creator>
		<pubDate>Thu, 15 Dec 2022 15:16:49 +0000</pubDate>
				<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Data Encryption Solutions]]></category>
		<category><![CDATA[endpoint data encryption]]></category>
		<category><![CDATA[private data on your laptop]]></category>
		<guid isPermaLink="false">https://ccimanaged.com/?p=497</guid>

					<description><![CDATA[<p>How easily can a thief grab private data on your laptop? Have you or somebody you know ever had this something similar happen? &#8230;You are sitting in a busy cafe talking on your phone and don’t notice that a person walks behind you and stealthily lifts your laptop out of your open bag near you.… <span class="read-more"><a href="https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/">Read More &#187;</a></span></p>
<p>The post <a href="https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/">The Critical Nature of Endpoint Data Encryption</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_683" style="width: 793px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-683" class="wp-image-683 " src="https://ccimanaged.com/wp-content/uploads/cci-cyber-security.jpg" alt="Cyber Security Services by CCI Managed Services" width="783" height="470" srcset="https://ccimanaged.com/wp-content/uploads/cci-cyber-security.jpg 1280w, https://ccimanaged.com/wp-content/uploads/cci-cyber-security-300x180.jpg 300w, https://ccimanaged.com/wp-content/uploads/cci-cyber-security-768x461.jpg 768w, https://ccimanaged.com/wp-content/uploads/cci-cyber-security-660x396.jpg 660w" sizes="auto, (max-width: 783px) 100vw, 783px" /><p id="caption-attachment-683" class="wp-caption-text">Cyber Security Services</p></div>
<h3>How easily can a thief grab private data on your laptop?</h3>
<p>Have you or somebody you know ever had this something similar happen? &#8230;You are sitting in a busy cafe talking on your phone and don’t notice that a person walks behind you and stealthily lifts your laptop out of your open bag near you. Later, when you get up to leave, you notice something is wrong. Your bag feels lighter, and you discover your laptop is missing. Are you frantic? Of course you are. Are you worried about losing and exposing sensitive data? You should be.</p>
<p>Millions of laptops get stolen each year. If you are one of the unfortunate owners, I bet you didn’t know how easy it is for the thief to access your private, sensitive information quickly and easily passwords or not. The typical reason is that data on the hard drive didn’t get encrypted.</p>
<h3><strong>Never Assume Your Data is Protected</strong></h3>
<p>How protected is your data? Ask yourself these few questions:</p>
<ul>
<li>How easy would it be to access sensitive information on your laptop if it were one of the millions that get stolen every year? It is very easy if not encrypted!</li>
<li>Did you know that many versions of Windows include the capability to encrypt your sensitive information, but that the feature isn’t enabled by default?</li>
<li>If your notebook computer is lost or stolen, did you know in most cases the information can be accessed without any need for your login and password?</li>
</ul>
<p>According to the FBI, approximately <strong>2 million</strong> <strong>laptops are stolen each year</strong>. Most victims believe their information is secure. Often it is not. Here’s why.</p>
<p>Most computers sold each year are running <a href="https://gs.statcounter.com/os-market-share/all/united-states-of-america">Windows</a>. You would think that Windows PCs would be automatically set up for data encryption. According to <a href="https://www.pcworld.com/article/624593/is-your-windows-11-pc-encrypted-the-answer-is-surprisingly-complex.html">PCWorld.com</a>, “Security is such a big focus for Microsoft’s latest operating system that automatically keeping stored data scrambled unless the computer is unlocked seems sensible. In fact, the mechanisms to do exactly that are already in place.” Some versions of Windows already support automatic device encryption. You just have to sign into the machine with a Microsoft account, which nearly all people do during setup. Sounds simple enough.</p>
<p>However, what interferes with automatically setting up your laptop is the hardware itself. “If a PC doesn’t meet the required standards, device encryption doesn’t automatically kick on, even if your laptop or desktop system is brand new. That doesn’t mean your computer can’t be encrypted, but you may have to do some work or pony up more money to make it happen.”</p>
<p>Unless your computer is using software that already encrypts your sensitive data, you will be at risk. Here are examples of data that could be left unsecured:</p>
<ol>
<li>Files that are saved on your desktop or locally in folders are not automatically secure and are fully exposed.</li>
<li>Cached copies of files used with One Drive, Google Drive or other cloud file storage services are fully exposed.</li>
<li>Worse yet, emails stored in local cache for offline use are easy to access.</li>
<li>Let’s hope you didn’t keep passwords in a spreadsheet or email because that could open an even broader series of risk issues.</li>
</ol>
<p>In reality, it is easy for a thief to pull out the device’s hard drive and simply access all this sensitive data with no need to even enter your Windows password. Yikes!</p>
<p>You could hope you’re never a victim. But is hope really an appropriate strategy? A more beneficial approach to encrypt data all on all of your end-user devices that contain sensitive data to prevent its readability without the assigned decryption software.</p>
<p>This corresponds to the “CIS Control 3.6 standard, Endpoint Encryption”, one of the many security actions recommended by <a href="https://www.cisecurity.org/controls">CIS Controls</a> (CIS stands for the Center for Internet Security) which sets the standards for cyber security. Having these business controls in place ensures that <a href="https://ccimanaged.com/services/pcs-notebooks/">your laptop is secure</a> at all times.</p>
<h3><strong>Endpoint Data Encryption Solutions</strong></h3>
<p>CIS Control 3.6 describes the importance of encrypting data on end-user devices containing sensitive data. Examples of encryption solutions for different operating systems include using such software as Windows BitLocker®, Apple FileVault®, Linux® dm-crypt.</p>
<p>At CCI Managed Services, we recommend whole disk encryption to ensure your data cannot be accessed by anyone other than you. Keep in mind that this capability may already be included with your operating system but not set up yet for your use.</p>
<p>Just like taking your car or truck to your mechanic once a year to inspect its safety, it is a good practice to visit your security advisor periodically to inspect your network and tackle any issues found. You’ll have the peace of mind knowing what’s really going on.</p>
<p>Learn just how exposed your data could be to constantly changing cybersecurity threats, and potential loss or theft with a security audit. CCI Managed Services has the experience and knowledge to provide you with a thorough security inspection and solution to safeguard your business.</p>
<p>We understand that keeping your data safe is crucially important. In fact, good network security means better productivity, less drama, and fewer disruptions to your organization.</p>
<p><a href="https://ccimanaged.com/contact/">Contact CCI</a> today and ask about our practical security assessment and report card. It&#8217;s short money for that priceless piece-of-mind feeling.</p>
<p>The post <a href="https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/">The Critical Nature of Endpoint Data Encryption</a> appeared first on <a href="https://ccimanaged.com">CCI Managed Services | IT Services &amp; Support</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://ccimanaged.com/blog/the-critical-nature-of-endpoint-data-encryption/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
